Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:3383-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 15 SP6, SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE Linux Enterprise Real Time 15 SP6, SUSE openSUSE Leap 15.6, SUSE Basesystem Module 15-SP6, SUSE Development Tools Module 15-SP6, SUSE Linux Enterprise Workstation Extension 15 SP6, SUSE Linux Enterprise High Availability Extension 15 SP6, SUSE Legacy Module 15-SP6, SUSE Linux Enterprise Live Patching 15-SP6
Datum: Mo, 23. September 2024, 22:51
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075
Applikationen: Linux

Originalnachricht

--===============0241071922796769080==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3383-1
Rating: important
References:

* bsc#1012628
* bsc#1193454
* bsc#1194869
* bsc#1205462
* bsc#1208783
* bsc#1213123
* bsc#1214285
* bsc#1215199
* bsc#1220066
* bsc#1220252
* bsc#1220877
* bsc#1221326
* bsc#1221630
* bsc#1221645
* bsc#1221652
* bsc#1221857
* bsc#1222254
* bsc#1222335
* bsc#1222350
* bsc#1222364
* bsc#1222372
* bsc#1222387
* bsc#1222433
* bsc#1222434
* bsc#1222463
* bsc#1222625
* bsc#1222633
* bsc#1222634
* bsc#1222808
* bsc#1222967
* bsc#1222973
* bsc#1223053
* bsc#1223074
* bsc#1223191
* bsc#1223395
* bsc#1223635
* bsc#1223720
* bsc#1223731
* bsc#1223742
* bsc#1223763
* bsc#1223767
* bsc#1223777
* bsc#1223803
* bsc#1224105
* bsc#1224415
* bsc#1224485
* bsc#1224496
* bsc#1224510
* bsc#1224535
* bsc#1224631
* bsc#1224636
* bsc#1224690
* bsc#1224694
* bsc#1224700
* bsc#1224711
* bsc#1225475
* bsc#1225582
* bsc#1225607
* bsc#1225717
* bsc#1225718
* bsc#1225744
* bsc#1225745
* bsc#1225751
* bsc#1225814
* bsc#1225832
* bsc#1225838
* bsc#1225903
* bsc#1226031
* bsc#1226127
* bsc#1226502
* bsc#1226530
* bsc#1226588
* bsc#1226604
* bsc#1226743
* bsc#1226751
* bsc#1226765
* bsc#1226798
* bsc#1226801
* bsc#1226834
* bsc#1226874
* bsc#1226885
* bsc#1226920
* bsc#1227149
* bsc#1227182
* bsc#1227383
* bsc#1227437
* bsc#1227492
* bsc#1227493
* bsc#1227494
* bsc#1227618
* bsc#1227620
* bsc#1227623
* bsc#1227627
* bsc#1227634
* bsc#1227706
* bsc#1227722
* bsc#1227724
* bsc#1227725
* bsc#1227728
* bsc#1227729
* bsc#1227732
* bsc#1227733
* bsc#1227734
* bsc#1227747
* bsc#1227750
* bsc#1227754
* bsc#1227758
* bsc#1227760
* bsc#1227761
* bsc#1227764
* bsc#1227766
* bsc#1227770
* bsc#1227771
* bsc#1227772
* bsc#1227774
* bsc#1227781
* bsc#1227784
* bsc#1227785
* bsc#1227787
* bsc#1227790
* bsc#1227791
* bsc#1227792
* bsc#1227796
* bsc#1227798
* bsc#1227799
* bsc#1227802
* bsc#1227808
* bsc#1227810
* bsc#1227811
* bsc#1227812
* bsc#1227815
* bsc#1227816
* bsc#1227818
* bsc#1227820
* bsc#1227823
* bsc#1227824
* bsc#1227826
* bsc#1227828
* bsc#1227829
* bsc#1227830
* bsc#1227832
* bsc#1227833
* bsc#1227834
* bsc#1227839
* bsc#1227840
* bsc#1227846
* bsc#1227849
* bsc#1227851
* bsc#1227853
* bsc#1227863
* bsc#1227864
* bsc#1227865
* bsc#1227867
* bsc#1227869
* bsc#1227870
* bsc#1227883
* bsc#1227884
* bsc#1227891
* bsc#1227893
* bsc#1227929
* bsc#1227950
* bsc#1227957
* bsc#1227981
* bsc#1228020
* bsc#1228021
* bsc#1228114
* bsc#1228192
* bsc#1228195
* bsc#1228202
* bsc#1228235
* bsc#1228236
* bsc#1228237
* bsc#1228247
* bsc#1228321
* bsc#1228409
* bsc#1228410
* bsc#1228426
* bsc#1228427
* bsc#1228429
* bsc#1228446
* bsc#1228447
* bsc#1228449
* bsc#1228450
* bsc#1228452
* bsc#1228456
* bsc#1228457
* bsc#1228458
* bsc#1228459
* bsc#1228460
* bsc#1228462
* bsc#1228463
* bsc#1228466
* bsc#1228467
* bsc#1228468
* bsc#1228469
* bsc#1228470
* bsc#1228472
* bsc#1228479
* bsc#1228480
* bsc#1228481
* bsc#1228482
* bsc#1228483
* bsc#1228484
* bsc#1228485
* bsc#1228486
* bsc#1228487
* bsc#1228489
* bsc#1228491
* bsc#1228492
* bsc#1228493
* bsc#1228494
* bsc#1228495
* bsc#1228496
* bsc#1228499
* bsc#1228500
* bsc#1228501
* bsc#1228502
* bsc#1228503
* bsc#1228505
* bsc#1228508
* bsc#1228509
* bsc#1228510
* bsc#1228511
* bsc#1228513
* bsc#1228515
* bsc#1228516
* bsc#1228518
* bsc#1228520
* bsc#1228525
* bsc#1228527
* bsc#1228530
* bsc#1228531
* bsc#1228539
* bsc#1228561
* bsc#1228563
* bsc#1228564
* bsc#1228565
* bsc#1228567
* bsc#1228568
* bsc#1228572
* bsc#1228576
* bsc#1228579
* bsc#1228580
* bsc#1228581
* bsc#1228582
* bsc#1228584
* bsc#1228586
* bsc#1228588
* bsc#1228590
* bsc#1228591
* bsc#1228599
* bsc#1228615
* bsc#1228616
* bsc#1228617
* bsc#1228625
* bsc#1228626
* bsc#1228633
* bsc#1228635
* bsc#1228636
* bsc#1228640
* bsc#1228643
* bsc#1228644
* bsc#1228646
* bsc#1228649
* bsc#1228650
* bsc#1228654
* bsc#1228655
* bsc#1228656
* bsc#1228658
* bsc#1228660
* bsc#1228662
* bsc#1228665
* bsc#1228666
* bsc#1228667
* bsc#1228672
* bsc#1228673
* bsc#1228674
* bsc#1228677
* bsc#1228680
* bsc#1228687
* bsc#1228705
* bsc#1228706
* bsc#1228707
* bsc#1228708
* bsc#1228709
* bsc#1228710
* bsc#1228718
* bsc#1228720
* bsc#1228721
* bsc#1228722
* bsc#1228723
* bsc#1228724
* bsc#1228726
* bsc#1228727
* bsc#1228733
* bsc#1228737
* bsc#1228743
* bsc#1228748
* bsc#1228754
* bsc#1228756
* bsc#1228757
* bsc#1228758
* bsc#1228764
* bsc#1228766
* bsc#1228779
* bsc#1228801
* bsc#1228849
* bsc#1228850
* bsc#1228857
* bsc#1228959
* bsc#1228964
* bsc#1228966
* bsc#1228967
* bsc#1228973
* bsc#1228977
* bsc#1228978
* bsc#1228979
* bsc#1228986
* bsc#1228988
* bsc#1228989
* bsc#1228991
* bsc#1228992
* bsc#1229005
* bsc#1229024
* bsc#1229042
* bsc#1229045
* bsc#1229046
* bsc#1229054
* bsc#1229056
* bsc#1229086
* bsc#1229134
* bsc#1229136
* bsc#1229154
* bsc#1229156
* bsc#1229160
* bsc#1229167
* bsc#1229168
* bsc#1229169
* bsc#1229170
* bsc#1229171
* bsc#1229172
* bsc#1229173
* bsc#1229174
* bsc#1229239
* bsc#1229240
* bsc#1229241
* bsc#1229243
* bsc#1229244
* bsc#1229245
* bsc#1229246
* bsc#1229247
* bsc#1229248
* bsc#1229249
* bsc#1229250
* bsc#1229251
* bsc#1229252
* bsc#1229253
* bsc#1229254
* bsc#1229255
* bsc#1229256
* bsc#1229287
* bsc#1229290
* bsc#1229291
* bsc#1229292
* bsc#1229294
* bsc#1229296
* bsc#1229297
* bsc#1229298
* bsc#1229299
* bsc#1229301
* bsc#1229303
* bsc#1229304
* bsc#1229305
* bsc#1229307
* bsc#1229309
* bsc#1229312
* bsc#1229313
* bsc#1229314
* bsc#1229315
* bsc#1229316
* bsc#1229317
* bsc#1229318
* bsc#1229319
* bsc#1229320
* bsc#1229327
* bsc#1229341
* bsc#1229342
* bsc#1229344
* bsc#1229345
* bsc#1229346
* bsc#1229347
* bsc#1229349
* bsc#1229350
* bsc#1229351
* bsc#1229353
* bsc#1229354
* bsc#1229355
* bsc#1229356
* bsc#1229357
* bsc#1229358
* bsc#1229359
* bsc#1229360
* bsc#1229365
* bsc#1229366
* bsc#1229369
* bsc#1229370
* bsc#1229373
* bsc#1229374
* bsc#1229379
* bsc#1229381
* bsc#1229382
* bsc#1229383
* bsc#1229386
* bsc#1229388
* bsc#1229390
* bsc#1229391
* bsc#1229392
* bsc#1229395
* bsc#1229398
* bsc#1229399
* bsc#1229400
* bsc#1229402
* bsc#1229403
* bsc#1229404
* bsc#1229407
* bsc#1229409
* bsc#1229410
* bsc#1229411
* bsc#1229413
* bsc#1229414
* bsc#1229417
* bsc#1229444
* bsc#1229451
* bsc#1229452
* bsc#1229455
* bsc#1229456
* bsc#1229480
* bsc#1229481
* bsc#1229482
* bsc#1229484
* bsc#1229485
* bsc#1229486
* bsc#1229487
* bsc#1229488
* bsc#1229489
* bsc#1229490
* bsc#1229493
* bsc#1229495
* bsc#1229496
* bsc#1229497
* bsc#1229500
* bsc#1229503
* bsc#1229707
* bsc#1229739
* bsc#1229743
* bsc#1229746
* bsc#1229747
* bsc#1229752
* bsc#1229754
* bsc#1229755
* bsc#1229756
* bsc#1229759
* bsc#1229761
* bsc#1229767
* bsc#1229781
* bsc#1229784
* bsc#1229785
* bsc#1229787
* bsc#1229788
* bsc#1229789
* bsc#1229792
* bsc#1229820
* bsc#1229827
* bsc#1229830
* bsc#1229837
* bsc#1229940
* bsc#1230056
* bsc#1230350
* bsc#1230413
* jsc#PED-10029
* jsc#PED-10045
* jsc#PED-10055
* jsc#PED-10105
* jsc#PED-10108
* jsc#PED-8491
* jsc#PED-8779
* jsc#PED-8954


Cross-References:

* CVE-2023-52489
* CVE-2023-52581
* CVE-2023-52668
* CVE-2023-52688
* CVE-2023-52735
* CVE-2023-52859
* CVE-2023-52885
* CVE-2023-52886
* CVE-2023-52887
* CVE-2023-52889
* CVE-2024-26590
* CVE-2024-26631
* CVE-2024-26637
* CVE-2024-26668
* CVE-2024-26669
* CVE-2024-26677
* CVE-2024-26682
* CVE-2024-26683
* CVE-2024-26691
* CVE-2024-26735
* CVE-2024-26808
* CVE-2024-26809
* CVE-2024-26812
* CVE-2024-26835
* CVE-2024-26837
* CVE-2024-26849
* CVE-2024-26851
* CVE-2024-26889
* CVE-2024-26920
* CVE-2024-26944
* CVE-2024-26976
* CVE-2024-27010
* CVE-2024-27011
* CVE-2024-27024
* CVE-2024-27049
* CVE-2024-27050
* CVE-2024-27079
* CVE-2024-27403
* CVE-2024-27433
* CVE-2024-27437
* CVE-2024-31076
* CVE-2024-35854
* CVE-2024-35855
* CVE-2024-35897
* CVE-2024-35902
* CVE-2024-35913
* CVE-2024-35939
* CVE-2024-35949
* CVE-2024-36270
* CVE-2024-36286
* CVE-2024-36288
* CVE-2024-36489
* CVE-2024-36881
* CVE-2024-36907
* CVE-2024-36909
* CVE-2024-36910
* CVE-2024-36911
* CVE-2024-36929
* CVE-2024-36933
* CVE-2024-36939
* CVE-2024-36970
* CVE-2024-36979
* CVE-2024-38548
* CVE-2024-38563
* CVE-2024-38609
* CVE-2024-38662
* CVE-2024-39476
* CVE-2024-39483
* CVE-2024-39484
* CVE-2024-39486
* CVE-2024-39488
* CVE-2024-39489
* CVE-2024-39491
* CVE-2024-39493
* CVE-2024-39497
* CVE-2024-39499
* CVE-2024-39500
* CVE-2024-39501
* CVE-2024-39505
* CVE-2024-39506
* CVE-2024-39508
* CVE-2024-39509
* CVE-2024-39510
* CVE-2024-40899
* CVE-2024-40900
* CVE-2024-40902
* CVE-2024-40903
* CVE-2024-40904
* CVE-2024-40905
* CVE-2024-40909
* CVE-2024-40910
* CVE-2024-40911
* CVE-2024-40912
* CVE-2024-40913
* CVE-2024-40916
* CVE-2024-40920
* CVE-2024-40921
* CVE-2024-40922
* CVE-2024-40924
* CVE-2024-40926
* CVE-2024-40927
* CVE-2024-40929
* CVE-2024-40930
* CVE-2024-40932
* CVE-2024-40934
* CVE-2024-40936
* CVE-2024-40938
* CVE-2024-40939
* CVE-2024-40941
* CVE-2024-40942
* CVE-2024-40943
* CVE-2024-40944
* CVE-2024-40945
* CVE-2024-40954
* CVE-2024-40956
* CVE-2024-40957
* CVE-2024-40958
* CVE-2024-40959
* CVE-2024-40962
* CVE-2024-40964
* CVE-2024-40967
* CVE-2024-40976
* CVE-2024-40977
* CVE-2024-40978
* CVE-2024-40981
* CVE-2024-40982
* CVE-2024-40984
* CVE-2024-40987
* CVE-2024-40988
* CVE-2024-40989
* CVE-2024-40990
* CVE-2024-40992
* CVE-2024-40994
* CVE-2024-40995
* CVE-2024-40997
* CVE-2024-41000
* CVE-2024-41001
* CVE-2024-41002
* CVE-2024-41004
* CVE-2024-41007
* CVE-2024-41009
* CVE-2024-41010
* CVE-2024-41011
* CVE-2024-41012
* CVE-2024-41015
* CVE-2024-41016
* CVE-2024-41020
* CVE-2024-41022
* CVE-2024-41024
* CVE-2024-41025
* CVE-2024-41028
* CVE-2024-41032
* CVE-2024-41035
* CVE-2024-41036
* CVE-2024-41037
* CVE-2024-41038
* CVE-2024-41039
* CVE-2024-41040
* CVE-2024-41041
* CVE-2024-41044
* CVE-2024-41045
* CVE-2024-41048
* CVE-2024-41049
* CVE-2024-41050
* CVE-2024-41051
* CVE-2024-41056
* CVE-2024-41057
* CVE-2024-41058
* CVE-2024-41059
* CVE-2024-41060
* CVE-2024-41061
* CVE-2024-41062
* CVE-2024-41063
* CVE-2024-41064
* CVE-2024-41065
* CVE-2024-41066
* CVE-2024-41068
* CVE-2024-41069
* CVE-2024-41070
* CVE-2024-41071
* CVE-2024-41072
* CVE-2024-41073
* CVE-2024-41074
* CVE-2024-41075
* CVE-2024-41076
* CVE-2024-41078
* CVE-2024-41079
* CVE-2024-41080
* CVE-2024-41081
* CVE-2024-41084
* CVE-2024-41087
* CVE-2024-41088
* CVE-2024-41089
* CVE-2024-41092
* CVE-2024-41093
* CVE-2024-41094
* CVE-2024-41095
* CVE-2024-41096
* CVE-2024-41097
* CVE-2024-41098
* CVE-2024-42064
* CVE-2024-42069
* CVE-2024-42070
* CVE-2024-42073
* CVE-2024-42074
* CVE-2024-42076
* CVE-2024-42077
* CVE-2024-42079
* CVE-2024-42080
* CVE-2024-42082
* CVE-2024-42085
* CVE-2024-42086
* CVE-2024-42087
* CVE-2024-42089
* CVE-2024-42090
* CVE-2024-42092
* CVE-2024-42093
* CVE-2024-42095
* CVE-2024-42096
* CVE-2024-42097
* CVE-2024-42098
* CVE-2024-42101
* CVE-2024-42104
* CVE-2024-42105
* CVE-2024-42106
* CVE-2024-42107
* CVE-2024-42109
* CVE-2024-42110
* CVE-2024-42113
* CVE-2024-42114
* CVE-2024-42115
* CVE-2024-42117
* CVE-2024-42119
* CVE-2024-42120
* CVE-2024-42121
* CVE-2024-42122
* CVE-2024-42124
* CVE-2024-42125
* CVE-2024-42126
* CVE-2024-42127
* CVE-2024-42130
* CVE-2024-42131
* CVE-2024-42132
* CVE-2024-42133
* CVE-2024-42136
* CVE-2024-42137
* CVE-2024-42138
* CVE-2024-42139
* CVE-2024-42141
* CVE-2024-42142
* CVE-2024-42143
* CVE-2024-42144
* CVE-2024-42145
* CVE-2024-42147
* CVE-2024-42148
* CVE-2024-42152
* CVE-2024-42153
* CVE-2024-42155
* CVE-2024-42156
* CVE-2024-42157
* CVE-2024-42158
* CVE-2024-42159
* CVE-2024-42161
* CVE-2024-42162
* CVE-2024-42223
* CVE-2024-42224
* CVE-2024-42225
* CVE-2024-42226
* CVE-2024-42227
* CVE-2024-42228
* CVE-2024-42229
* CVE-2024-42230
* CVE-2024-42232
* CVE-2024-42236
* CVE-2024-42237
* CVE-2024-42238
* CVE-2024-42239
* CVE-2024-42240
* CVE-2024-42241
* CVE-2024-42244
* CVE-2024-42245
* CVE-2024-42246
* CVE-2024-42247
* CVE-2024-42250
* CVE-2024-42253
* CVE-2024-42259
* CVE-2024-42268
* CVE-2024-42269
* CVE-2024-42270
* CVE-2024-42271
* CVE-2024-42274
* CVE-2024-42276
* CVE-2024-42277
* CVE-2024-42278
* CVE-2024-42279
* CVE-2024-42280
* CVE-2024-42281
* CVE-2024-42283
* CVE-2024-42284
* CVE-2024-42285
* CVE-2024-42286
* CVE-2024-42287
* CVE-2024-42288
* CVE-2024-42289
* CVE-2024-42290
* CVE-2024-42291
* CVE-2024-42292
* CVE-2024-42295
* CVE-2024-42298
* CVE-2024-42301
* CVE-2024-42302
* CVE-2024-42303
* CVE-2024-42308
* CVE-2024-42309
* CVE-2024-42310
* CVE-2024-42311
* CVE-2024-42312
* CVE-2024-42313
* CVE-2024-42314
* CVE-2024-42315
* CVE-2024-42316
* CVE-2024-42318
* CVE-2024-42319
* CVE-2024-42320
* CVE-2024-42322
* CVE-2024-43816
* CVE-2024-43817
* CVE-2024-43818
* CVE-2024-43819
* CVE-2024-43821
* CVE-2024-43823
* CVE-2024-43824
* CVE-2024-43825
* CVE-2024-43826
* CVE-2024-43829
* CVE-2024-43830
* CVE-2024-43831
* CVE-2024-43833
* CVE-2024-43834
* CVE-2024-43837
* CVE-2024-43839
* CVE-2024-43840
* CVE-2024-43841
* CVE-2024-43842
* CVE-2024-43846
* CVE-2024-43847
* CVE-2024-43849
* CVE-2024-43850
* CVE-2024-43851
* CVE-2024-43853
* CVE-2024-43854
* CVE-2024-43855
* CVE-2024-43856
* CVE-2024-43858
* CVE-2024-43860
* CVE-2024-43861
* CVE-2024-43863
* CVE-2024-43864
* CVE-2024-43866
* CVE-2024-43867
* CVE-2024-43871
* CVE-2024-43872
* CVE-2024-43873
* CVE-2024-43874
* CVE-2024-43875
* CVE-2024-43876
* CVE-2024-43877
* CVE-2024-43879
* CVE-2024-43880
* CVE-2024-43881
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-43884
* CVE-2024-43885
* CVE-2024-43889
* CVE-2024-43892
* CVE-2024-43893
* CVE-2024-43894
* CVE-2024-43895
* CVE-2024-43897
* CVE-2024-43899
* CVE-2024-43900
* CVE-2024-43902
* CVE-2024-43903
* CVE-2024-43905
* CVE-2024-43906
* CVE-2024-43907
* CVE-2024-43908
* CVE-2024-43909
* CVE-2024-43911
* CVE-2024-43912
* CVE-2024-44931
* CVE-2024-44938
* CVE-2024-44939


CVSS scores:

* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52886 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52887 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26682 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-26849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27049 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27050 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36881 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36910 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-36911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36970 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36979 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38563 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39483 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-39483 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39484 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39486 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39491 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39510 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-39510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40899 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40899 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40913 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40922 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40936 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-40938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-40981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40994 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41001 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41012 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41020 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41022 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41024 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41024 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41025 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41028 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41040 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41057 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41058 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41061 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-41061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41063 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41065 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41066 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41069 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41070 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-41071 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41075 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41094 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42064 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42086 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-42093 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42097 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42105 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42117 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42125 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42132 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42133 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42136 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42136 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-42136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42143 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-42144 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42155 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42159 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42161 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42161 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42227 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42236 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42253 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42259 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42274 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42278 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42314 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43881 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-43881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43884 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43902 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43906 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43912 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44938 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6



An update that solves 394 vulnerabilities, contains eight features and has 85
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in
starting tx ba session (bsc#1229827).
* CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c
(bsc#1229754).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct
objagg_ops (bsc#1229481).
* CVE-2024-43866: net/mlx5: Always drain health in shutdown callback
(bsc#1229495).
* CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header
context (bsc#1229496).
* CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio
(bsc#1229342).
* CVE-2024-43854: block: initialize integrity buffer to zero before writing
it
to media (bsc#1229345)
* CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during
bwmon_remove (bsc#1229316).
* CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb
structures (bsc#1229301).
* CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map
(bsc#1229297).
* CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy()
(bsc#1229314)
* CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi
(bsc#1229309).
* CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference
(bsc#1229315).
* CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service
(bsc#1229347)
* CVE-2024-42318: landlock: Do not lose track of restrictions on
cred_transfer
(bsc#1229351).
* CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level()
(bsc#1229353).
* CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357)
* CVE-2024-42308: Update DRM patch reference (bsc#1229411)
* CVE-2024-42301: dev/parport: fix the array out-of-bounds risk
(bsc#1229407).
* CVE-2024-42295: nilfs2: handle inconsistent state in
nilfs_btnode_create_block() (bsc#1229370).
* CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters
(bsc#1229374).
* CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management
correctly (bsc#1229379).
* CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on
error (bsc#1229382)
* CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops
(bsc#1229383)
* CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size
(bsc#1229386).
* CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en
(bsc#1229409).
* CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in
iptable_nat_table_init() (bsc#1229404).
* CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in
ip6table_nat_table_init() (bsc#1229402).
* CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload
(bsc#1229391).
* CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory
accesses (bsc#1228988).
* CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in
xs_tcp_setup_socket (bsc#1228989).
* CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least
one
movable task" (bsc#1228978).
* CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed
(bsc#1228986).
* CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723).
* CVE-2024-42162: gve: Account for stopped queues when reading NIC stats
(bsc#1228706).
* CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD
(bsc#1228756).
* CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys (bsc#1228754).
* CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings
(bsc#1228720).
* CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727).
* CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure
(bsc#1228722).
* CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys
(bsc#1228733).
* CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds
(bsc#1228487).
* CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743).
* CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed
(bsc#1228491).
* CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503).
* CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in
case of invalid INI file (bsc#1228500).
* CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705).
* CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc
(bsc#1228591).
* CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx
interrupts
(bsc#1228568).
* CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call
netif_rx() from __netif_rx() (bsc#1228501).
* CVE-2024-42109: netfilter: nf_tables: unconditionally flush pending work
before notifier (bsc#1228505).
* CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494).
* CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2
(bsc#1228493).
* CVE-2024-42096: x86: stop playing stack games in profile_pc()
(bsc#1228633).
* CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level
check
(bsc#1228446).
* CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack
(bsc#1228680).
* CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model()
(bsc#1228482).
* CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).
* CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on
Spectrum-4 systems (bsc#1228457).
* CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on
store
to data registers (bsc#1228470).
* CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup
(bsc#1228472).
* CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
* CVE-2024-41080: io_uring: fix possible deadlock in
io_register_iowq_max_workers() (bsc#1228616).
* CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable
failure (bsc#1228655).
* CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label
(bsc#1228649).
* CVE-2024-41075: cachefiles: add consistency check for copen/cread
(bsc#1228646).
* CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in
copen
(bsc#1228643).
* CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
* CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
* CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure
(bsc#1228579).
* CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
* CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev
changes
(bsc#1228599).
* CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release
(bsc#1228576).
* CVE-2024-41058: cachefiles: fix slab-use-after-free in
fscache_withdraw_volume() (bsc#1228459).
* CVE-2024-41057: cachefiles: fix slab-use-after-free in
cachefiles_withdraw_cookie() (bsc#1228462).
* CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when
dropping object (bsc#1228468).
* CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse
(bsc#1228499).
* CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg
(bsc#1228565).
* CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets
(bsc#1228530).
* CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520).
* CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518).
* CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant
(bsc#1228496).
* CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask
(bsc#1228460).
* CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path
(bsc#1228427).
* CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).
* CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is
detected (bsc#1228247).
* CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021).
* CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).
* CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867).
* CVE-2024-40995: net/sched: act_api: fix possible infinite loop in
tcf_idr_check_alloc() (bsc#1227830).
* CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
(bsc#1227829).
* CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on
teardown (bsc#1227823).
* CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute
(bsc#1227929).
* CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).
* CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net
(bsc#1227812).
* CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in
End.DX4 and End.DX6 behaviors (bsc#1227811).
* CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in
irq_process_work_list (bsc#1227810).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of
region creation fail (bsc#1227799).
* CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840).
* CVE-2024-40921: net: bridge: mst: pass vlan group directly to
br_mst_vlan_set_state (bsc#1227784).
* CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in
br_mst_set_state (bsc#1227781).
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1227798).
* CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from()
(bsc#1227761)
* CVE-2024-39506: liquidio: adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).
* CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623)
* CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating
sockmap/sockhash (bsc#1226885).
* CVE-2024-36979: net: bridge: mst: fix vlan use-after-free (bsc#1226604).
* CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).
* CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs
(bsc#1225814).
* CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
* CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
* CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that
couldn't
be re-encrypted (bsc#1225744).
* CVE-2024-36881: mm/userfaultfd: Fix reset ptes when close() for
wr-protected
(bsc#1225718).
* CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874)
* CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in
instance_destroy_rcu() (bsc#1226801)
* CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if-
IP-has-been-disabled-on.patch (bsc#1226798)
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1224700).
* CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure
(bsc#1224535).
* CVE-2024-35897: netfilter: nf_tables: discard table flag update with
pending
basechain deletion (bsc#1224510).
* CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).
* CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling
path
in clk_mt8135_apmixed_probe() (bsc#1224711).
* CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init()
(bsc#1224415).
* CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release
(bsc#1223742).
* CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down
(bsc#1223777).
* CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path
(bsc#1223803).
* CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion
(bsc#1223720).
* CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length
out of range (bsc#1223074)
* CVE-2024-26837: net: bridge: switchdev: race between creation of new group
memberships and generation of the list of MDB events to replay
(bsc#1222973).
* CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register
failure (bsc#1222967).
* CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808).
* CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only
from destroy path (bsc#1222633).
* CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for
inet/ingress basechain (bsc#1222634).
* CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref
(bsc#1222372).
* CVE-2024-26677: blacklist.conf: Add e7870cf13d20 ("rxrpc: Fix delayed
ACKs
to not set the reference serial number") (bsc#1222387)
* CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload
(bsc#1222350).
* CVE-2024-26668: netfilter: nft_limit: reject configurations that cause
integer overflow (bsc#1222335).
* CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
(bsc#1221630).
* CVE-2024-26590: erofs: fix inconsistent per-file compression format
(bsc#1220252).
* CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during
sock creation (bsc#1229287).
* CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails
(bsc#1225582).
* CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255
elements expired (bsc#1220877).
* CVE-2023-52489: mm/sparsemem: fix race in accessing
memory_section->usage
(bsc#1221326).

The following non-security bugs were fixed:

* ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes).
* ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes).
* ACPI: battery: create alarm sysfs attribute atomically (stable-fixes).
* ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git-
fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
* ALSA: hda/realtek - Fixed ALC285 headphone no sound (stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes).
* ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes).
* ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable-
fixes).
* ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-
fixes).
* ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra
(stable-fixes).
* ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3
Pro 360 (stable-fixes).
* ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable-
fixes).
* ALSA: hda/tas2781: Use correct endian conversion (git-fixes).
* ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes).
* ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-
fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: seq: Skip event type filtering for UMP events (git-fixes).
* ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes).
* ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes).
* ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception
(stable-fixes).
* ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes).
* ALSA: timer: Relax start tick time check for slave timer elements (git-
fixes).
* ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes).
* ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception
(stable-
fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-
fixes).
* ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
* ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
* ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before
suspend (stable-fixes).
* ASoC: SOF: Remove libraries from topology lookups (git-fixes).
* ASoC: SOF: Remove libraries from topology lookups (git-fixes).
* ASoC: SOF: amd: Fix for acp init sequence (git-fixes).
* ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes).
* ASoC: SOF: mediatek: Add missing board compatible (stable-fixes).
* ASoC: allow module autoloading for table board_ids (stable-fixes).
* ASoC: allow module autoloading for table db1200_pids (stable-fixes).
* ASoC: amd: acp: fix module autoloading (git-fixes).
* ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx
(bsc#1227182).
* ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
* ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
* ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
* ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
* ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes).
* ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
* ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
* ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-
fixes).
* ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-
fixes).
* ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
* ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
* ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable-
fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT
(git-fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT
(git-fixes).
* ASoC: nau8822: Lower debug print priority (stable-fixes).
* ASoC: nau8822: Lower debug print priority (stable-fixes).
* Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio
(stable-fixes).
* Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* Bluetooth: MGMT: Add error handling to pair_device() (git-fixes).
* Bluetooth: SMP: Fix assumption of Central always being Initiator (git-
fixes).
* Bluetooth: bnep: Fix out-of-bound access (stable-fixes).
* Bluetooth: btintel: Fail setup on error (git-fixes).
* Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver
unloading (stable-fixes).
* Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable-
fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable-
fixes).
* Bluetooth: hci_conn: Check non NULL function before calling for HFP offload
(stable-fixes).
* Bluetooth: hci_core: Fix LE quote calculation (git-fixes).
* Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
* Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
* Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv
monitor (git-fixes).
* Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-
fixes).
* Drop libata patch that caused a regression (bsc#1229054)
* HID: wacom: Defer calculation of resolution until resolution_code is known
(git-fixes).
* Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table
(bsc#1229056).
* Input: i8042 - add forcenorestore quirk to leave controller untouched even
on s3 (stable-fixes).
* Input: i8042 - use new forcenorestore quirk to replace old buggy quirk
combination (stable-fixes).
* KVM: Always flush async #PF workqueue when vCPU is being destroyed (git-
fixes).
* KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY
(git-
fixes).
* KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
* KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE
(bsc#1215199).
* KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes).
* KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
* KVM: Stop processing _all_ memslots when "null" mmu_notifier
handler is
found (git-fixes).
* KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes).
* KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked()
(git-fixes).
* KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git-
fixes).
* KVM: arm64: AArch32: Fix spurious trapping of conditional instructions
(git-
fixes).
* KVM: arm64: Add missing memory barriers when switching to pKVM's hyp
pgd
(git-fixes).
* KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-
fixes).
* KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
* KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes).
* KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes)
* KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
* KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes).
* KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
* KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table()
(git-fixes).
* KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
* KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-
fixes).
* KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy()
(git-fixes).
* KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes).
* KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes).
* KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes).
* KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector
(git-fixes).
* KVM: nVMX: Check for pending posted interrupts when looking for nested
events (git-fixes).
* KVM: nVMX: Request immediate exit iff pending nested event needs injection
(git-fixes).
* KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).
* KVM: s390: fix validity interception issue when gisa is switched off (git-
fixes bsc#1229167).
* KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE
(git-fixes).
* KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes).
* Move upstreamed powerpc patches into sorted section
* Move upstreamed sound patches into sorted section
* Moved upstreamed ASoC patch into sorted section
* NFSD: Support write delegations in LAYOUTGET (git-fixes).
* NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server
(git-fixes).
* PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes).
* PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-
fixes).
* PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes).
* RDMA/cache: Release GID table even if leak is detected (git-fixes)
* RDMA/device: Return error earlier if port in not valid (git-fixes)
* RDMA/hns: Check atomic wr length (git-fixes)
* RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)
* RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
* RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
* RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
* RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)
* RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
* RDMA/hns: Fix unmatch exception handling when init eq table fails (git-
fixes)
* RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
* RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
* RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
* RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)
* RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
* RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
* RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes)
* Revert "ALSA: firewire-lib: obsolete workqueue for period update"
(bsc#1208783).
* Revert "ALSA: firewire-lib: operate for period elapse event in process
context" (bsc#1208783).
* Revert "KVM: Prevent module exit until all VMs are freed"
(git-fixes).
* Revert "Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in
raid5d"" (git-
fixes).
* Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"
(git-fixes).
* Revert "misc: fastrpc: Restrict untrusted app to attach to privileged
PD"
(git-fixes).
* Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"
(bsc#1230413).
* Revert "mm, kmsan: fix infinite recursion due to RCU critical
section"
(bsc#1230413).
* Revert "mm/sparsemem: fix race in accessing
memory_section->usage"
(bsc#1230413).
* Revert "usb: gadget: uvc: cleanup request when not in correct
state"
(stable-fixes).
* Revert "usb: typec: tcpm: clear pd_event queue in PORT_RESET"
(git-fixes).
* SUNRPC: Fix a race to wake a sync task (git-fixes).
* SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).
* Squashfs: fix variable overflow triggered by sysbot (git-fixes).
* USB: serial: debug: do not echo input by default (stable-fixes).
* Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920)
* Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET
(jsc#PED-8954, bsc#1227834)
* Update patch references for ASoC regression fixes (bsc#1229045,
bsc#1229046)
* afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes).
* apparmor: unpack transition table if dfa is not present (bsc#1226031).
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: Add Neoverse-V2 part (git-fixes)
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: barrier: Restore spec_bar() macro (git-fixes)
* arm64: cputype: Add Cortex-A720 definitions (git-fixes)
* arm64: cputype: Add Cortex-A725 definitions (git-fixes)
* arm64: cputype: Add Cortex-X1C definitions (git-fixes)
* arm64: cputype: Add Cortex-X3 definitions (git-fixes)
* arm64: cputype: Add Cortex-X4 definitions (git-fixes)
* arm64: cputype: Add Cortex-X925 definitions (git-fixes)
* arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
* arm64: dts: imx8mp: Add NPU Node (git-fixes)
* arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes)
* arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes)
* arm64: dts: imx8mp: add HDMI power-domains (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (git-fixes)
* arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update
config files.
* arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git-
fixes)
* ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable-
fixes).
* ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable-
fixes).
* blacklist.conf: Add libata upstream revert entry (bsc#1229054)
* bnxt_re: Fix imm_data endianness (git-fixes)
* bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes)
* bpf, lpm: Fix check prefixlen before walking trie (git-fixes).
* bpf/tests: Remove duplicate JSGT tests (git-fixes).
* bpf: Add crosstask check to __bpf_get_stack (git-fixes).
* bpf: Detect IP == ksym.end as part of BPF program (git-fixes).
* bpf: Ensure proper register state printing for cond jumps (git-fixes).
* bpf: Fix a few selftest failures due to llvm18 change (git-fixes).
* bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
* bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes).
* bpf: Fix kfunc callback register type handling (git-fixes).
* bpf: Fix prog_array_map_poke_run map poke update (git-fixes).
* bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes).
* bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git-
fixes).
* bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes).
* bpf: Set uattr->batch.count as zero before batched update or deletion
(git-
fixes).
* bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git-
fixes).
* bpf: enforce precision of R0 on callback return (git-fixes).
* bpf: extract bpf_ctx_convert_map logic and make it more reusable (git-
fixes).
* bpf: fix control-flow graph checking in privileged mode (git-fixes).
* bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg
(git-fixes).
* bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes).
* bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
* bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git-
fixes).
* bpftool: Align output skeleton ELF code (git-fixes).
* bpftool: Fix -Wcast-qual warning (git-fixes).
* bpftool: Silence build warning about calloc() (git-fixes).
* bpftool: mark orphaned programs during prog show (git-fixes).
* btrfs: add a btrfs_finish_ordered_extent helper (git-fixes).
* btrfs: add a is_data_bbio helper (git-fixes).
* btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes).
* btrfs: copy dir permission and time when creating a stub subvolume
(bsc#1228321).
* btrfs: ensure fast fsync waits for ordered extents after a write failure
(git-fixes).
* btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes).
* btrfs: factor out a can_finish_ordered_extent helper (git-fixes).
* btrfs: fix corruption after buffer fault in during direct IO append write
(git-fixes).
* btrfs: fix double inode unlock for direct IO sync writes (git-fixes).
* btrfs: fix extent map use-after-free when adding pages to compressed bio
(git-fixes).
* btrfs: fix leak of qgroup extent records after transaction abort (git-
fixes).
* btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git-
fixes).
* btrfs: limit write bios to a single ordered extent (git-fixes).
* btrfs: make btrfs_finish_ordered_extent() return void (git-fixes).
* btrfs: merge the two calls to btrfs_add_ordered_extent in
run_delalloc_nocow
(git-fixes).
* btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes).
* btrfs: open code end_extent_writepage in end_bio_extent_writepage (git-
fixes).
* btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes).
* btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes).
* btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes).
* btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes).
* btrfs: remove btrfs_add_ordered_extent (git-fixes).
* btrfs: rename err to ret in btrfs_direct_write() (git-fixes).
* btrfs: uninline some static inline helpers from tree-log.h (git-fixes).
* btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git-
fixes).
* btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes).
* btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes).
* btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git-
fixes).
* btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git-
fixes).
* btrfs: use btrfs_finish_ordered_extent to complete direct writes (git-
fixes).
* btrfs: use irq safe locking when running and adding delayed iputs (git-
fixes).
* cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand-
mode (bsc#1229245).
* cachefiles: add missing lock protection when polling (bsc#1229256).
* cachefiles: add restore command to recover inflight ondemand read requests
(bsc#1229244).
* cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249).
* cachefiles: cancel all requests for the object that is being dropped
(bsc#1229255).
* cachefiles: defer exposing anon_fd until after copy_to_user() succeeds
(bsc#1229251).
* cachefiles: extract ondemand info field from cachefiles_object
(bsc#1229240).
* cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read()
(bsc#1229247).
* cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd()
(bsc#1229246).
* cachefiles: introduce object ondemand state (bsc#1229239).
* cachefiles: make on-demand read killable (bsc#1229252).
* cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode
(bsc#1229243).
* cachefiles: never get a new anonymous fd if ondemand_id is valid
(bsc#1229250).
* cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop
(bsc#1229253).
* cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read()
(bsc#1229248).
* cachefiles: resend an open request if the read request's object is
closed
(bsc#1229241).
* cachefiles: stop sending new request when dropping object (bsc#1229254).
* can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index
erratum (stable-fixes).
* can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of
mcp2518fd (stable-fixes).
* ceph: periodically flush the cap releases (bsc#1230056).
* cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
* cgroup: Add annotation for holding namespace_sem in
current_cgns_cgroup_from_root() (bsc#1222254).
* cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show()
(bsc#1222254).
* cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
* cgroup: Remove unnecessary list_empty() (bsc#1222254).
* cgroup: preserve KABI of cgroup_root (bsc#1222254).
* char: xillybus: Check USB endpoints when probing device (git-fixes).
* char: xillybus: Do not destroy workqueue from work item running on it
(stable-fixes).
* char: xillybus: Refine workqueue handling (git-fixes).
* clk: en7523: fix rate divider for slic and spi clocks (git-fixes).
* clk: qcom: Park shared RCGs upon registration (git-fixes).
* clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git-
fixes).
* clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git-
fixes).
* clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git-
fixes).
* clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable
(git-
fixes).
* clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags
(git-fixes).
* clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's
(git-fixes).
* clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable
(git-
fixes).
* clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error
(git-fixes).
* clk: visconti: Add bounds-checking coverage for struct
visconti_pll_provider
(stable-fixes).
* clocksource/drivers/sh_cmt: Address race condition for clock events
(stable-
fixes).
* cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* dev/parport: fix the array out-of-bounds risk (stable-fixes).
* device property: Add cleanup.h based fwnode_handle_put() scope based
cleanup
(stable-fixes).
* dmaengine: dw: Add memory bus width verification (git-fixes).
* dmaengine: dw: Add peripheral bus width verification (git-fixes).
* docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
* driver core: Fix uevent_show() vs driver detach race (git-fixes).
* drm/admgpu: fix dereferencing null pointer context (stable-fixes).
* drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes).
* drm/amd/display: Add null checker before passing variables (stable-fixes).
* drm/amd/display: Adjust cursor position (git-fixes).
* drm/amd/display: Check for NULL pointer (stable-fixes).
* drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-
fixes).
* drm/amd/display: avoid using null object of framebuffer (git-fixes).
* drm/amd/display: fix cursor offset on rotation 180 (git-fixes).
* drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes).
* drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-
fixes).
* drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
(stable-fixes).
* drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
* drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable-
fixes).
* drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes).
* drm/amdgpu: Actually check flags for all context ops (stable-fixes).
* drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
* drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
* drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes).
* drm/amdgpu: Validate TA binary size (stable-fixes).
* drm/amdgpu: fix dereference null return value for the function
amdgpu_vm_pt_parent (stable-fixes).
* drm/amdgpu: fix potential resource leak warning (stable-fixes).
* drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable-
fixes).
* drm/bridge: analogix_dp: properly handle zero sized AUX transactions
(stable-fixes).
* drm/client: fix null pointer dereference in drm_client_modeset_probe (git-
fixes).
* drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
* drm/etnaviv: do not block scheduler when GPU is still active
(stable-fixes).
* drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(git-fixes).
* drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes).
* drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
(git-fixes).
* drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes).
* drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git-
fixes).
* drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
* drm/mediatek/dp: Fix spurious kfree() (git-fixes).
* drm/msm/dp: fix the max supported bpp logic (git-fixes).
* drm/msm/dp: reset the link phy params before link training (git-fixes).
* drm/msm/dpu: capture snapshot on the first commit_done timeout (stable-
fixes).
* drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
* drm/msm/dpu: do not play tricks with debug macros (git-fixes).
* drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes).
* drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()
(git-fixes).
* drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable-
fixes).
* drm/msm/dpu: take plane rotation into account for wide planes (git-fixes).
* drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes).
* drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable-
fixes).
* drm/msm/mdss: Rename path references to mdp_path (stable-fixes).
* drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes).
* drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes).
* drm/nouveau: prime: fix refcount underflow (git-fixes).
* drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes).
* drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024).
* drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes).
* drm/rockchip: vop2: clear afbc en and transform bit for cluster window at
linear mode (stable-fixes).
* drm/virtio: Fix type of dma-fence context variable (git-fixes).
* drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
* drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
* drm/vmwgfx: Fix prime with external buffers (git-fixes).
* efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes).
* evm: do not copy up 'security.evm' xattr (git-fixes).
* firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid
(stable-fixes).
* fs/netfs/fscache_cookie: add missing "n_accesses" check
(bsc#1229455).
* fuse: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229456).
* genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-
fixes).
* genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-
fixes).
* genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-
fixes).
* gfs2: setattr_chown: Add missing initialization (git-fixes).
* gpio: mlxbf3: Support shutdown() function (git-fixes).
* gpio: prevent potential speculation leaks in gpio_device_get_desc()
(stable-
fixes).
* gpio: sysfs: extend the critical section for unregistering sysfs devices
(stable-fixes).
* gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-
fixes).
* hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
(git-fixes).
* hwmon: (ltc2992) Avoid division by zero (stable-fixes).
* hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes).
* hwmon: (pc87360) Bounds check data->innr usage (stable-fixes).
* i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).
* i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).
* i2c: qcom-geni: Add missing clk_disable_unprepare in
geni_i2c_runtime_resume
(git-fixes).
* i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume
(git-fixes).
* i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume
(git-fixes).
* i2c: riic: avoid potential division by zero (stable-fixes).
* i2c: smbus: Improve handling of stuck alerts (git-fixes).
* i2c: smbus: Send alert notifications to all devices if source not found
(git-fixes).
* i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes).
* i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable-
fixes).
* i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable-
fixes).
* i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes).
* ice: Fix NULL pointer access, if PF does not support SRIOV_LAG
(bsc#1228737).
* io_uring/advise: support 64-bit lengths (git-fixes).
* io_uring: Drop per-ctx dummy_ubuf (git-fixes).
* io_uring: Fix probe of disabled operations (git-fixes).
* io_uring: fix io_match_task must_hold (git-fixes).
* io_uring: tighten task exit cancellations (git-fixes).
* iommu/amd: Convert comma to semicolon (git-fixes).
* iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes).
* iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git-
fixes).
* ip6_tunnel: Fix broken GRO (bsc#1229444).
* ipv6: sr: fix incorrect unregister order (git-fixes).
* irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
* jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes).
* jfs: define xtree root and page independently (git-fixes).
* jfs: fix null ptr deref in dtInsertEntry (git-fixes).
* jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git-
fixes).
* jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes).
* jump_label: Fix the fix, brown paper bags galore (git-fixes).
* jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git-
fixes).
* kABI fix of: virtio-crypto: handle config changed by work queue
(git-fixes).
* kABI workaround for sound core UMP conversion (stable-fixes).
* kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).
* kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).
* kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
* kabi: more build fix without patches.kabi (bsc#1226502)
* kcov: properly check for softirq context (git-fixes).
* kernel-binary.spec.in: Enable klp_symbols on openSUSE Tumbleweed
(boo#1229042).
* kernel-binary: generate and install compile_commands.json (bsc#1228971).
* kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy()
(bsc#1229134).
* kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files
(git-
fixes).
* kprobes: Fix to check symbol prefixes correctly (git-fixes).
* kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
* kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes
bsc#1229168).
* libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API
(git-fixes).
* libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git-
fixes).
* libbpf: Fix faccessat() usage on Android (git-fixes).
* libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes).
* md-cluster: fix hanging issue while a new disk adding (bsc#1223395).
* md-cluster: fix hanging issue while a new disk adding (bsc#1223395).
* md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).
* md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).
* md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26
(bsc#1223395).
* md/md-bitmap: fix writing non bitmap pages (git-fixes).
* md/raid1: set max_sectors during early return from choose_slow_rdev() (git-
fixes).
* md/raid1: support read error check (git-fixes).
* md/raid5: fix deadlock that raid5d() wait for itself to clear
MD_SB_CHANGE_PENDING (git-fixes).
* md/raid5: fix spares errors about rcu usage (git-fixes).
* md/raid5: recheck if reshape has finished with device_lock held
(git-fixes).
* md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git-
fixes).
* md: add a mddev_add_trace_msg helper (git-fixes).
* md: add check for sleepers in md_wakeup_thread() (git-fixes).
* md: change the return value type of md_write_start to void (git-fixes).
* md: do not account sync_io if iostats of the disk is disabled (git-fixes).
* md: do not delete safemode_timer in mddev_suspend (git-fixes).
* md: factor out a helper exceed_read_errors() to check read_errors (git-
fixes).
* md: fix a suspicious RCU usage warning (git-fixes).
* media: Revert "media: dvb-usb: Fix unexpected infinite loop in
dvb_usb_read_remote_control()" (git-fixes).
* media: amphion: Remove lock in s_ctrl callback (stable-fixes).
* media: drivers/media/dvb-core: copy user arrays safely (stable-fixes).
* media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
* media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920
(git-fixes).
* media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes).
* media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes).
* media: uvcvideo: Ignore empty TS packets (stable-fixes).
* media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes).
* media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes).
* memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
* memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes).
* memory: tegra: Skip SID programming if SID registers are not set (stable-
fixes).
* minmax: add a few more MIN_T/MAX_T users (bsc#1229024).
* minmax: avoid overly complicated constant expressions in VM code
(bsc#1229024).
* minmax: do not use max() in situations that want a C constant expression
(bsc#1229024).
* minmax: fix up min3() and max3() too (bsc#1229024).
* minmax: improve macro expansion and type checking (bsc#1229024).
* minmax: make generic MIN() and MAX() macros available everywhere
(bsc#1229024).
* minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024).
* minmax: simplify min()/max()/clamp() implementation (bsc#1229024).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
* mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
* mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes).
* net/iucv: fix the allocation size of iucv_path_table array (git-fixes
bsc#1229451).
* net/iucv: fix use after free in iucv_sock_close() (bsc#1228973).
* net/rds: fix possible cp null dereference (git-fixes).
* net/sched: initialize noop_qdisc owner (git-fixes).
* net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).
* net: ethernet: mtk_wed: fix use-after-free panic in
mtk_wed_setup_tc_block_cb() (git-fixes).
* net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757).
* net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491
bsc#1226530).
* net: mana: Fix RX buf alloc_size alignment and atomic op panic
(bsc#1229086).
* net: mana: Fix doorbell out of order violation and avoid unnecessary
doorbell rings (bsc#1229154).
* net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
fixes).
* net: missing check virtio (git-fixes).
* net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes).
* net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes).
* net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
* net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-
fixes).
* netfs, fscache: export fscache_put_volume() and add
fscache_try_get_volume()
(bsc#1228459 bsc#1228462).
* nfc: pn533: Add poll mod list filling check (git-fixes).
* nfs: do not invalidate dentries on transient errors (git-fixes).
* nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
* nfs: make the rpc_stat per net namespace (git-fixes).
* nfs: pass explicit offset/count to trace events (git-fixes).
* nfs: propagate readlink errors in nfs_symlink_filler (git-fixes).
* nouveau/firmware: use dma non-coherent allocator (git-fixes).
* nvme-multipath: find NUMA path only for online numa-node (git-fixes).
* nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706).
* nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706).
* nvme-pci: Fix the instructions for disabling power management (git-fixes).
* nvme-pci: add missing condition check for existence of mapped data (git-
fixes).
* nvme-pci: do not directly handle subsys reset fallout (bsc#1220066).
* nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857).
* nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857).
* nvme-tcp: check for invalidated or revoked key (bsc#1221857).
* nvme-tcp: sanitize TLS key handling (bsc#1221857).
* nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857).
* nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
* nvme: avoid double free special payload (git-fixes).
* nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA
(git-
fixes).
* nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
* nvme: split off TLS sysfs attributes into a separate group (bsc#1221857).
* nvme: tcp: remove unnecessary goto statement (bsc#1221857).
* nvme_core: scan namespaces asynchronously (bsc#1224105).
* nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
* nvmet: always initialize cqe.result (git-fixes).
* nvmet: do not return 'reserved' for empty TSAS values (git-fixes).
* nvmet: fix a possible leak when destroy a ctrl during qp establishment
(git-
fixes).
* nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes).
* ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).
* padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
* perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-
fixes).
* pinctrl: mediatek: common-v2: Fix broken bias-disable for
PULL_PU_PD_RSEL_TYPE (git-fixes).
* pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git-
fixes).
* pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-
fixes).
* pinctrl: starfive: jh7110: Correct the level trigger configuration of iev
register (git-fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version
(git-
fixes).
* platform/chrome: cros_ec_proto: Lock device when updating MKBP version
(git-
fixes).
* platform/surface: aggregator: Fix warning when controller is destroyed in
probe (git-fixes).
* platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
* platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
(jsc#PED-8779).
* platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
* platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
* platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
* platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
* platform/x86/amd/hsmp: Remove extra parenthesis and add a space
(jsc#PED-8779).
* platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
* platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
* platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes).
* platform/x86: lg-laptop: fix %s null argument warning (stable-fixes).
* power: supply: axp288_charger: Fix constant_charge_voltage writes (git-
fixes).
* power: supply: axp288_charger: Round constant_charge_voltage writes down
(git-fixes).
* power: supply: qcom_battmgr: return EAGAIN when firmware service is not up
(git-fixes).
* powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
(bsc#1194869).
* powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
* powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
* powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
* powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
* powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp
(bsc#1194869).
* powerpc/pseries: Whitelist dtl slub object for copying to userspace
(bsc#1194869).
* powerpc/radix: Move some functions into #ifdef
CONFIG_KVM_BOOK3S_HV_POSSIBLE
(bsc#1194869).
* powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* powerpc/xmon: Check cpu id in commands "c#", "dp#" and
"dx#" (bsc#1194869).
* powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
* powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
* printk/panic: Allow cpu backtraces to be written into ringbuffer during
panic (bsc#1225607).
* reiserfs: fix uninit-value in comp_keys (git-fixes).
* rtc: nct3018y: fix possible NULL dereference (stable-fixes).
* s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes
bsc#1229171).
* s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
bsc#1229173).
* s390/dasd: fix error recovery leading to data corruption on ESE devices
(git-fixes bsc#1229452).
* s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes
bsc#1229174).
* s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes
bsc#1229172).
* s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172).
* s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720).
* s390/pkey: introduce dynamic debugging for pkey (bsc#1228720).
* s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169).
* s390/uv: Panic for set and remove shared access UVC errors (git-fixes
bsc#1229170).
* samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes).
* samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes).
* sbitmap: use READ_ONCE to access map->word (stable-fixes).
* scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE
state (bsc#1228857).
* scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).
* scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk
(bsc#1228857).
* scsi: lpfc: Fix incorrect request len mbox field when setting trunking via
sysfs (bsc#1228857).
* scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
* scsi: lpfc: Relax PRLI issue conditions after GID_FT response
(bsc#1228857).
* scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro
usages (bsc#1228857).
* scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
* scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).
* scsi: qla2xxx: Complete command early within lock (bsc#1228850).
* scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
* scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
* scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).
* scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
* scsi: qla2xxx: Fix flash read failure (bsc#1228850).
* scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
* scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
* scsi: qla2xxx: Indent help text (bsc#1228850).
* scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
* scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
* scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).
* scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
* scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
* scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
* scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
* selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values
(git-fixes).
* selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903).
* selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes).
* selftests/bpf: Add netkit to tc_redirect selftest (git-fixes).
* selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes).
* selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes).
* selftests/bpf: Fix erroneous bitmask operation (git-fixes).
* selftests/bpf: Fix issues in setup_classid_environment() (git-fixes).
* selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes).
* selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes).
* selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes).
* selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes).
* selftests/bpf: Make linked_list failure test more robust (git-fixes).
* selftests/bpf: Relax time_tai test for equal timestamps in tai_forward
(git-
fixes).
* selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not
available (git-fixes).
* selftests/bpf: Wait for the netstamp_needed_key static key to be turned on
(git-fixes).
* selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes).
* selftests/bpf: fix bpf_loop_bench for new callback verification scheme
(git-
fixes).
* selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes).
* selftests/bpf: satisfy compiler by having explicit return in btf test (git-
fixes).
* serial: core: check uartclk for zero to avoid divide by zero
(stable-fixes).
* soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes).
* soc: qcom: pmic_glink: Actually communicate when remote goes down (git-
fixes).
* soundwire: stream: fix programming slave ports for non-continous port maps
(git-fixes).
* spi: Add empty versions of ACPI functions (stable-fixes).
* spi: microchip-core: fix init function not setting the master and motorola
modes (git-fixes).
* spi: microchip-core: switch to use modern name (stable-fixes).
* spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
* spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes).
* squashfs: squashfs_read_data need to check if the length is 0 (git-fixes).
* ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes).
* staging: iio: resolver: ad2s1210: fix use before initialization (stable-
fixes).
* staging: ks7010: disable bh on tx_dev_lock (stable-fixes).
* string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849).
* sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
* swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git-
fixes).
* swiotlb: fix swiotlb_bounce() to do partial sync's correctly
(git-fixes).
* syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
* thermal/drivers/broadcom: Fix race between removal and clock disable (git-
fixes).
* thermal: bcm2835: Convert to platform remove callback returning void
(stable-fixes).
* thunderbolt: Mark XDomain as unplugged when router is removed (stable-
fixes).
* tools/perf: Fix perf bench epoll to enable the run when some CPU's are
offline (bsc#1227747).
* tools/perf: Fix perf bench futex to enable the run when some CPU's are
offline (bsc#1227747).
* tools/perf: Fix timing issue with parallel threads in perf bench wake-up-
parallel (bsc#1227747).
* tools/resolve_btfids: Fix comparison of distinct pointer types warning in
resolve_btfids (git-fixes).
* tools/resolve_btfids: Fix cross-compilation to non-host endianness (git-
fixes).
* tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git-
fixes).
* tools/resolve_btfids: fix build with musl libc (git-fixes).
* trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes).
* tracing: Return from tracing_buffers_read() if the file has been closed
(bsc#1229136 git-fixes).
* tty: atmel_serial: use the correct RTS flag (git-fixes).
* tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git-
fixes).
* usb: cdnsp: fix for Link TRB with TC (git-fixes).
* usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes).
* usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in
remove_power_attributes() (git-fixes).
* usb: dwc3: core: Skip setting event buffers for host only controllers
(stable-fixes).
* usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).
* usb: dwc3: st: add missing depopulate in probe error path (git-fixes).
* usb: dwc3: st: fix probed platform device ref count on probe error path
(git-fixes).
* usb: gadget: core: Check for unset descriptor (git-fixes).
* usb: gadget: fsl: Increase size of name buffer for endpoints
(stable-fixes).
* usb: gadget: u_audio: Check return codes from usb_ep_enable and
config_ep_by_speed (git-fixes).
* usb: gadget: u_serial: Set start_delayed during suspend (git-fixes).
* usb: gadget: uvc: cleanup request when not in correct state (stable-fixes).
* usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes).
* usb: typec: fsa4480: Check if the chip is really there (git-fixes).
* usb: typec: fsa4480: Relax CHIP_ID check (git-fixes).
* usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes).
* usb: typec: fsa4480: rework mux & switch setup to handle more states
(git-
fixes).
* usb: vhci-hcd: Do not drop references before new references are gained
(stable-fixes).
* vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
* vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes).
* vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler
(git-fixes).
* vhost/vsock: always initialize seqpacket_allow (git-fixes).
* vhost: Release worker mutex during flushes (git-fixes).
* vhost: Use virtqueue mutex for swapping worker (git-fixes).
* virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes).
* virtio-crypto: handle config changed by work queue (git-fixes).
* virtio: reenable config if freezing device failed (git-fixes).
* virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).
* virtiofs: forbid newlines in tags (bsc#1229940).
* wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable-
fixes).
* wifi: ath12k: fix soft lockup on suspend (git-fixes).
* wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes).
* wifi: cfg80211: fix reporting failed MLO links status with
cfg80211_connect_done (git-fixes).
* wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
* wifi: mac80211: use monitor sdata with driver only if desired (git-fixes).
* wifi: mwifiex: duplicate static structs used in driver instances (git-
fixes).
* wifi: nl80211: disallow setting special AP channel widths (stable-fixes).
* wifi: nl80211: do not give key data to userspace (stable-fixes).
* wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes).
* wifi: wfx: repair open network AP mode (git-fixes).
* workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
* workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
* x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git-
fixes).
* x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes).
* x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
* x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes).
* x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
* x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git-
fixes).
* x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes).
* x86/numa: Fix the sort compare func used in numa_fill_memblks()
(git-fixes).
* x86/numa: Introduce numa_fill_memblks() (git-fixes).
* x86/pci: Skip early E820 check for ECAM region (git-fixes).
* x86/xen: Convert comma to semicolon (git-fixes).
* xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
* xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
* xfs: allow cross-linking special files without project quota (git-fixes).
* xfs: allow symlinks with short remote targets (bsc#1229160).
* xfs: allow unlinked symlinks and dirs with zero size (git-fixes).
* xfs: attr forks require attr, not attr2 (git-fixes).
* xfs: convert comma to semicolon (git-fixes).
* xfs: do not use current->journal_info (git-fixes).
* xfs: fix unlink vs cluster buffer instantiation race (git-fixes).
* xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes).
* xfs: journal geometry is not properly bounds checked (git-fixes).
* xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes).
* xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item
recovery (git-fixes).
* xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git-
fixes).
* xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
* xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes).
* xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
(git-fixes).
* xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3383=1 openSUSE-SLE-15.6-2024-3383=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3383=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3383=1

* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3383=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3383=1
Please note that this is the initial kernel livepatch without fixes itself,
this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3383=1

* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3383=1

## Package List:

* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-6.4.0-150600.23.22.1
* kernel-macros-6.4.0-150600.23.22.1
* kernel-docs-html-6.4.0-150600.23.22.1
* kernel-source-6.4.0-150600.23.22.1
* kernel-source-vanilla-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-livepatch-devel-6.4.0-150600.23.22.1
* kernel-debug-devel-6.4.0-150600.23.22.1
* kernel-debug-debugsource-6.4.0-150600.23.22.1
* kernel-debug-devel-debuginfo-6.4.0-150600.23.22.1
* kernel-debug-debuginfo-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (x86_64)
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.22.1
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.22.1
* kernel-debug-vdso-6.4.0-150600.23.22.1
* kernel-default-vdso-6.4.0-150600.23.22.1
* kernel-kvmsmall-vdso-6.4.0-150600.23.22.1
* kernel-default-vdso-debuginfo-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3
* kernel-kvmsmall-devel-6.4.0-150600.23.22.1
* kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.22.1
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.22.1
* kernel-kvmsmall-debugsource-6.4.0-150600.23.22.1
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.22.1
* kernel-default-base-rebuild-6.4.0-150600.23.22.1.150600.12.8.3
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kernel-syms-6.4.0-150600.23.22.1
* kernel-default-extra-6.4.0-150600.23.22.1
* cluster-md-kmp-default-6.4.0-150600.23.22.1
* dlm-kmp-default-6.4.0-150600.23.22.1
* kernel-default-optional-6.4.0-150600.23.22.1
* kernel-obs-build-debugsource-6.4.0-150600.23.22.1
* kernel-default-livepatch-6.4.0-150600.23.22.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-livepatch-devel-6.4.0-150600.23.22.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.22.1
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.22.1
* kselftests-kmp-default-6.4.0-150600.23.22.1
* ocfs2-kmp-default-6.4.0-150600.23.22.1
* kernel-obs-build-6.4.0-150600.23.22.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.22.1
* kernel-default-devel-6.4.0-150600.23.22.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1
* gfs2-kmp-default-6.4.0-150600.23.22.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1
* reiserfs-kmp-default-6.4.0-150600.23.22.1
* kernel-obs-qa-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3
* kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3
* kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64)
* kernel-64kb-extra-6.4.0-150600.23.22.1
* kselftests-kmp-64kb-6.4.0-150600.23.22.1
* dtb-apple-6.4.0-150600.23.22.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1
* dlm-kmp-64kb-6.4.0-150600.23.22.1
* kernel-64kb-debugsource-6.4.0-150600.23.22.1
* kernel-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-arm-6.4.0-150600.23.22.1
* kernel-64kb-optional-6.4.0-150600.23.22.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.22.1
* dtb-allwinner-6.4.0-150600.23.22.1
* dtb-broadcom-6.4.0-150600.23.22.1
* dtb-qcom-6.4.0-150600.23.22.1
* dtb-amd-6.4.0-150600.23.22.1
* kernel-64kb-livepatch-devel-6.4.0-150600.23.22.1
* ocfs2-kmp-64kb-6.4.0-150600.23.22.1
* dtb-amazon-6.4.0-150600.23.22.1
* kernel-64kb-devel-6.4.0-150600.23.22.1
* dtb-hisilicon-6.4.0-150600.23.22.1
* gfs2-kmp-64kb-6.4.0-150600.23.22.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-renesas-6.4.0-150600.23.22.1
* dtb-sprd-6.4.0-150600.23.22.1
* dtb-nvidia-6.4.0-150600.23.22.1
* dtb-apm-6.4.0-150600.23.22.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-altera-6.4.0-150600.23.22.1
* dtb-amlogic-6.4.0-150600.23.22.1
* dtb-lg-6.4.0-150600.23.22.1
* dtb-xilinx-6.4.0-150600.23.22.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.22.1
* dtb-marvell-6.4.0-150600.23.22.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-freescale-6.4.0-150600.23.22.1
* dtb-cavium-6.4.0-150600.23.22.1
* cluster-md-kmp-64kb-6.4.0-150600.23.22.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.22.1
* dtb-rockchip-6.4.0-150600.23.22.1
* dtb-mediatek-6.4.0-150600.23.22.1
* reiserfs-kmp-64kb-6.4.0-150600.23.22.1
* dtb-exynos-6.4.0-150600.23.22.1
* dtb-socionext-6.4.0-150600.23.22.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (aarch64)
* kernel-64kb-debugsource-6.4.0-150600.23.22.1
* kernel-64kb-debuginfo-6.4.0-150600.23.22.1
* kernel-64kb-devel-6.4.0-150600.23.22.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-devel-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (noarch)
* kernel-devel-6.4.0-150600.23.22.1
* kernel-macros-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.22.1
* Basesystem Module 15-SP6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1
* Development Tools Module 15-SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.22.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-6.4.0-150600.23.22.1
* kernel-syms-6.4.0-150600.23.22.1
* kernel-obs-build-debugsource-6.4.0-150600.23.22.1
* Development Tools Module 15-SP6 (noarch)
* kernel-source-6.4.0-150600.23.22.1
* Legacy Module 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.22.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.22.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-default-livepatch-6.4.0-150600.23.22.1
* kernel-default-livepatch-devel-6.4.0-150600.23.22.1
* kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3
* kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3
* kernel-default-debugsource-6.4.0-150600.23.22.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1
* gfs2-kmp-default-6.4.0-150600.23.22.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* ocfs2-kmp-default-6.4.0-150600.23.22.1
* cluster-md-kmp-default-6.4.0-150600.23.22.1
* dlm-kmp-default-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.22.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.22.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* kernel-default-extra-debuginfo-6.4.0-150600.23.22.1
* kernel-default-debuginfo-6.4.0-150600.23.22.1
* kernel-default-extra-6.4.0-150600.23.22.1
* kernel-default-debugsource-6.4.0-150600.23.22.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52668.html
* https://www.suse.com/security/cve/CVE-2023-52688.html
* https://www.suse.com/security/cve/CVE-2023-52735.html
* https://www.suse.com/security/cve/CVE-2023-52859.html
* https://www.suse.com/security/cve/CVE-2023-52885.html
* https://www.suse.com/security/cve/CVE-2023-52886.html
* https://www.suse.com/security/cve/CVE-2023-52887.html
* https://www.suse.com/security/cve/CVE-2023-52889.html
* https://www.suse.com/security/cve/CVE-2024-26590.html
* https://www.suse.com/security/cve/CVE-2024-26631.html
* https://www.suse.com/security/cve/CVE-2024-26637.html
* https://www.suse.com/security/cve/CVE-2024-26668.html
* https://www.suse.com/security/cve/CVE-2024-26669.html
* https://www.suse.com/security/cve/CVE-2024-26677.html
* https://www.suse.com/security/cve/CVE-2024-26682.html
* https://www.suse.com/security/cve/CVE-2024-26683.html
* https://www.suse.com/security/cve/CVE-2024-26691.html
* https://www.suse.com/security/cve/CVE-2024-26735.html
* https://www.suse.com/security/cve/CVE-2024-26808.html
* https://www.suse.com/security/cve/CVE-2024-26809.html
* https://www.suse.com/security/cve/CVE-2024-26812.html
* https://www.suse.com/security/cve/CVE-2024-26835.html
* https://www.suse.com/security/cve/CVE-2024-26837.html
* https://www.suse.com/security/cve/CVE-2024-26849.html
* https://www.suse.com/security/cve/CVE-2024-26851.html
* https://www.suse.com/security/cve/CVE-2024-26889.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26944.html
* https://www.suse.com/security/cve/CVE-2024-26976.html
* https://www.suse.com/security/cve/CVE-2024-27010.html
* https://www.suse.com/security/cve/CVE-2024-27011.html
* https://www.suse.com/security/cve/CVE-2024-27024.html
* https://www.suse.com/security/cve/CVE-2024-27049.html
* https://www.suse.com/security/cve/CVE-2024-27050.html
* https://www.suse.com/security/cve/CVE-2024-27079.html
* https://www.suse.com/security/cve/CVE-2024-27403.html
* https://www.suse.com/security/cve/CVE-2024-27433.html
* https://www.suse.com/security/cve/CVE-2024-27437.html
* https://www.suse.com/security/cve/CVE-2024-31076.html
* https://www.suse.com/security/cve/CVE-2024-35854.html
* https://www.suse.com/security/cve/CVE-2024-35855.html
* https://www.suse.com/security/cve/CVE-2024-35897.html
* https://www.suse.com/security/cve/CVE-2024-35902.html
* https://www.suse.com/security/cve/CVE-2024-35913.html
* https://www.suse.com/security/cve/CVE-2024-35939.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36270.html
* https://www.suse.com/security/cve/CVE-2024-36286.html
* https://www.suse.com/security/cve/CVE-2024-36288.html
* https://www.suse.com/security/cve/CVE-2024-36489.html
* https://www.suse.com/security/cve/CVE-2024-36881.html
* https://www.suse.com/security/cve/CVE-2024-36907.html
* https://www.suse.com/security/cve/CVE-2024-36909.html
* https://www.suse.com/security/cve/CVE-2024-36910.html
* https://www.suse.com/security/cve/CVE-2024-36911.html
* https://www.suse.com/security/cve/CVE-2024-36929.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-36939.html
* https://www.suse.com/security/cve/CVE-2024-36970.html
* https://www.suse.com/security/cve/CVE-2024-36979.html
* https://www.suse.com/security/cve/CVE-2024-38548.html
* https://www.suse.com/security/cve/CVE-2024-38563.html
* https://www.suse.com/security/cve/CVE-2024-38609.html
* https://www.suse.com/security/cve/CVE-2024-38662.html
* https://www.suse.com/security/cve/CVE-2024-39476.html
* https://www.suse.com/security/cve/CVE-2024-39483.html
* https://www.suse.com/security/cve/CVE-2024-39484.html
* https://www.suse.com/security/cve/CVE-2024-39486.html
* https://www.suse.com/security/cve/CVE-2024-39488.html
* https://www.suse.com/security/cve/CVE-2024-39489.html
* https://www.suse.com/security/cve/CVE-2024-39491.html
* https://www.suse.com/security/cve/CVE-2024-39493.html
* https://www.suse.com/security/cve/CVE-2024-39497.html
* https://www.suse.com/security/cve/CVE-2024-39499.html
* https://www.suse.com/security/cve/CVE-2024-39500.html
* https://www.suse.com/security/cve/CVE-2024-39501.html
* https://www.suse.com/security/cve/CVE-2024-39505.html
* https://www.suse.com/security/cve/CVE-2024-39506.html
* https://www.suse.com/security/cve/CVE-2024-39508.html
* https://www.suse.com/security/cve/CVE-2024-39509.html
* https://www.suse.com/security/cve/CVE-2024-39510.html
* https://www.suse.com/security/cve/CVE-2024-40899.html
* https://www.suse.com/security/cve/CVE-2024-40900.html
* https://www.suse.com/security/cve/CVE-2024-40902.html
* https://www.suse.com/security/cve/CVE-2024-40903.html
* https://www.suse.com/security/cve/CVE-2024-40904.html
* https://www.suse.com/security/cve/CVE-2024-40905.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40910.html
* https://www.suse.com/security/cve/CVE-2024-40911.html
* https://www.suse.com/security/cve/CVE-2024-40912.html
* https://www.suse.com/security/cve/CVE-2024-40913.html
* https://www.suse.com/security/cve/CVE-2024-40916.html
* https://www.suse.com/security/cve/CVE-2024-40920.html
* https://www.suse.com/security/cve/CVE-2024-40921.html
* https://www.suse.com/security/cve/CVE-2024-40922.html
* https://www.suse.com/security/cve/CVE-2024-40924.html
* https://www.suse.com/security/cve/CVE-2024-40926.html
* https://www.suse.com/security/cve/CVE-2024-40927.html
* https://www.suse.com/security/cve/CVE-2024-40929.html
* https://www.suse.com/security/cve/CVE-2024-40930.html
* https://www.suse.com/security/cve/CVE-2024-40932.html
* https://www.suse.com/security/cve/CVE-2024-40934.html
* https://www.suse.com/security/cve/CVE-2024-40936.html
* https://www.suse.com/security/cve/CVE-2024-40938.html
* https://www.suse.com/security/cve/CVE-2024-40939.html
* https://www.suse.com/security/cve/CVE-2024-40941.html
* https://www.suse.com/security/cve/CVE-2024-40942.html
* https://www.suse.com/security/cve/CVE-2024-40943.html
* https://www.suse.com/security/cve/CVE-2024-40944.html
* https://www.suse.com/security/cve/CVE-2024-40945.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-40956.html
* https://www.suse.com/security/cve/CVE-2024-40957.html
* https://www.suse.com/security/cve/CVE-2024-40958.html
* https://www.suse.com/security/cve/CVE-2024-40959.html
* https://www.suse.com/security/cve/CVE-2024-40962.html
* https://www.suse.com/security/cve/CVE-2024-40964.html
* https://www.suse.com/security/cve/CVE-2024-40967.html
* https://www.suse.com/security/cve/CVE-2024-40976.html
* https://www.suse.com/security/cve/CVE-2024-40977.html
* https://www.suse.com/security/cve/CVE-2024-40978.html
* https://www.suse.com/security/cve/CVE-2024-40981.html
* https://www.suse.com/security/cve/CVE-2024-40982.html
* https://www.suse.com/security/cve/CVE-2024-40984.html
* https://www.suse.com/security/cve/CVE-2024-40987.html
* https://www.suse.com/security/cve/CVE-2024-40988.html
* https://www.suse.com/security/cve/CVE-2024-40989.html
* https://www.suse.com/security/cve/CVE-2024-40990.html
* https://www.suse.com/security/cve/CVE-2024-40992.html
* https://www.suse.com/security/cve/CVE-2024-40994.html
* https://www.suse.com/security/cve/CVE-2024-40995.html
* https://www.suse.com/security/cve/CVE-2024-40997.html
* https://www.suse.com/security/cve/CVE-2024-41000.html
* https://www.suse.com/security/cve/CVE-2024-41001.html
* https://www.suse.com/security/cve/CVE-2024-41002.html
* https://www.suse.com/security/cve/CVE-2024-41004.html
* https://www.suse.com/security/cve/CVE-2024-41007.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41010.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41012.html
* https://www.suse.com/security/cve/CVE-2024-41015.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41020.html
* https://www.suse.com/security/cve/CVE-2024-41022.html
* https://www.suse.com/security/cve/CVE-2024-41024.html
* https://www.suse.com/security/cve/CVE-2024-41025.html
* https://www.suse.com/security/cve/CVE-2024-41028.html
* https://www.suse.com/security/cve/CVE-2024-41032.html
* https://www.suse.com/security/cve/CVE-2024-41035.html
* https://www.suse.com/security/cve/CVE-2024-41036.html
* https://www.suse.com/security/cve/CVE-2024-41037.html
* https://www.suse.com/security/cve/CVE-2024-41038.html
* https://www.suse.com/security/cve/CVE-2024-41039.html
* https://www.suse.com/security/cve/CVE-2024-41040.html
* https://www.suse.com/security/cve/CVE-2024-41041.html
* https://www.suse.com/security/cve/CVE-2024-41044.html
* https://www.suse.com/security/cve/CVE-2024-41045.html
* https://www.suse.com/security/cve/CVE-2024-41048.html
* https://www.suse.com/security/cve/CVE-2024-41049.html
* https://www.suse.com/security/cve/CVE-2024-41050.html
* https://www.suse.com/security/cve/CVE-2024-41051.html
* https://www.suse.com/security/cve/CVE-2024-41056.html
* https://www.suse.com/security/cve/CVE-2024-41057.html
* https://www.suse.com/security/cve/CVE-2024-41058.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-41060.html
* https://www.suse.com/security/cve/CVE-2024-41061.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41063.html
* https://www.suse.com/security/cve/CVE-2024-41064.html
* https://www.suse.com/security/cve/CVE-2024-41065.html
* https://www.suse.com/security/cve/CVE-2024-41066.html
* https://www.suse.com/security/cve/CVE-2024-41068.html
* https://www.suse.com/security/cve/CVE-2024-41069.html
* https://www.suse.com/security/cve/CVE-2024-41070.html
* https://www.suse.com/security/cve/CVE-2024-41071.html
* https://www.suse.com/security/cve/CVE-2024-41072.html
* https://www.suse.com/security/cve/CVE-2024-41073.html
* https://www.suse.com/security/cve/CVE-2024-41074.html
* https://www.suse.com/security/cve/CVE-2024-41075.html
* https://www.suse.com/security/cve/CVE-2024-41076.html
* https://www.suse.com/security/cve/CVE-2024-41078.html
* https://www.suse.com/security/cve/CVE-2024-41079.html
* https://www.suse.com/security/cve/CVE-2024-41080.html
* https://www.suse.com/security/cve/CVE-2024-41081.html
* https://www.suse.com/security/cve/CVE-2024-41084.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41088.html
* https://www.suse.com/security/cve/CVE-2024-41089.html
* https://www.suse.com/security/cve/CVE-2024-41092.html
* https://www.suse.com/security/cve/CVE-2024-41093.html
* https://www.suse.com/security/cve/CVE-2024-41094.html
* https://www.suse.com/security/cve/CVE-2024-41095.html
* https://www.suse.com/security/cve/CVE-2024-41096.html
* https://www.suse.com/security/cve/CVE-2024-41097.html
* https://www.suse.com/security/cve/CVE-2024-41098.html
* https://www.suse.com/security/cve/CVE-2024-42064.html
* https://www.suse.com/security/cve/CVE-2024-42069.html
* https://www.suse.com/security/cve/CVE-2024-42070.html
* https://www.suse.com/security/cve/CVE-2024-42073.html
* https://www.suse.com/security/cve/CVE-2024-42074.html
* https://www.suse.com/security/cve/CVE-2024-42076.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42079.html
* https://www.suse.com/security/cve/CVE-2024-42080.html
* https://www.suse.com/security/cve/CVE-2024-42082.html
* https://www.suse.com/security/cve/CVE-2024-42085.html
* https://www.suse.com/security/cve/CVE-2024-42086.html
* https://www.suse.com/security/cve/CVE-2024-42087.html
* https://www.suse.com/security/cve/CVE-2024-42089.html
* https://www.suse.com/security/cve/CVE-2024-42090.html
* https://www.suse.com/security/cve/CVE-2024-42092.html
* https://www.suse.com/security/cve/CVE-2024-42093.html
* https://www.suse.com/security/cve/CVE-2024-42095.html
* https://www.suse.com/security/cve/CVE-2024-42096.html
* https://www.suse.com/security/cve/CVE-2024-42097.html
* https://www.suse.com/security/cve/CVE-2024-42098.html
* https://www.suse.com/security/cve/CVE-2024-42101.html
* https://www.suse.com/security/cve/CVE-2024-42104.html
* https://www.suse.com/security/cve/CVE-2024-42105.html
* https://www.suse.com/security/cve/CVE-2024-42106.html
* https://www.suse.com/security/cve/CVE-2024-42107.html
* https://www.suse.com/security/cve/CVE-2024-42109.html
* https://www.suse.com/security/cve/CVE-2024-42110.html
* https://www.suse.com/security/cve/CVE-2024-42113.html
* https://www.suse.com/security/cve/CVE-2024-42114.html
* https://www.suse.com/security/cve/CVE-2024-42115.html
* https://www.suse.com/security/cve/CVE-2024-42117.html
* https://www.suse.com/security/cve/CVE-2024-42119.html
* https://www.suse.com/security/cve/CVE-2024-42120.html
* https://www.suse.com/security/cve/CVE-2024-42121.html
* https://www.suse.com/security/cve/CVE-2024-42122.html
* https://www.suse.com/security/cve/CVE-2024-42124.html
* https://www.suse.com/security/cve/CVE-2024-42125.html
* https://www.suse.com/security/cve/CVE-2024-42126.html
* https://www.suse.com/security/cve/CVE-2024-42127.html
* https://www.suse.com/security/cve/CVE-2024-42130.html
* https://www.suse.com/security/cve/CVE-2024-42131.html
* https://www.suse.com/security/cve/CVE-2024-42132.html
* https://www.suse.com/security/cve/CVE-2024-42133.html
* https://www.suse.com/security/cve/CVE-2024-42136.html
* https://www.suse.com/security/cve/CVE-2024-42137.html
* https://www.suse.com/security/cve/CVE-2024-42138.html
* https://www.suse.com/security/cve/CVE-2024-42139.html
* https://www.suse.com/security/cve/CVE-2024-42141.html
* https://www.suse.com/security/cve/CVE-2024-42142.html
* https://www.suse.com/security/cve/CVE-2024-42143.html
* https://www.suse.com/security/cve/CVE-2024-42144.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42147.html
* https://www.suse.com/security/cve/CVE-2024-42148.html
* https://www.suse.com/security/cve/CVE-2024-42152.html
* https://www.suse.com/security/cve/CVE-2024-42153.html
* https://www.suse.com/security/cve/CVE-2024-42155.html
* https://www.suse.com/security/cve/CVE-2024-42156.html
* https://www.suse.com/security/cve/CVE-2024-42157.html
* https://www.suse.com/security/cve/CVE-2024-42158.html
* https://www.suse.com/security/cve/CVE-2024-42159.html
* https://www.suse.com/security/cve/CVE-2024-42161.html
* https://www.suse.com/security/cve/CVE-2024-42162.html
* https://www.suse.com/security/cve/CVE-2024-42223.html
* https://www.suse.com/security/cve/CVE-2024-42224.html
* https://www.suse.com/security/cve/CVE-2024-42225.html
* https://www.suse.com/security/cve/CVE-2024-42226.html
* https://www.suse.com/security/cve/CVE-2024-42227.html
* https://www.suse.com/security/cve/CVE-2024-42228.html
* https://www.suse.com/security/cve/CVE-2024-42229.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42236.html
* https://www.suse.com/security/cve/CVE-2024-42237.html
* https://www.suse.com/security/cve/CVE-2024-42238.html
* https://www.suse.com/security/cve/CVE-2024-42239.html
* https://www.suse.com/security/cve/CVE-2024-42240.html
* https://www.suse.com/security/cve/CVE-2024-42241.html
* https://www.suse.com/security/cve/CVE-2024-42244.html
* https://www.suse.com/security/cve/CVE-2024-42245.html
* https://www.suse.com/security/cve/CVE-2024-42246.html
* https://www.suse.com/security/cve/CVE-2024-42247.html
* https://www.suse.com/security/cve/CVE-2024-42250.html
* https://www.suse.com/security/cve/CVE-2024-42253.html
* https://www.suse.com/security/cve/CVE-2024-42259.html
* https://www.suse.com/security/cve/CVE-2024-42268.html
* https://www.suse.com/security/cve/CVE-2024-42269.html
* https://www.suse.com/security/cve/CVE-2024-42270.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-42274.html
* https://www.suse.com/security/cve/CVE-2024-42276.html
* https://www.suse.com/security/cve/CVE-2024-42277.html
* https://www.suse.com/security/cve/CVE-2024-42278.html
* https://www.suse.com/security/cve/CVE-2024-42279.html
* https://www.suse.com/security/cve/CVE-2024-42280.html
* https://www.suse.com/security/cve/CVE-2024-42281.html
* https://www.suse.com/security/cve/CVE-2024-42283.html
* https://www.suse.com/security/cve/CVE-2024-42284.html
* https://www.suse.com/security/cve/CVE-2024-42285.html
* https://www.suse.com/security/cve/CVE-2024-42286.html
* https://www.suse.com/security/cve/CVE-2024-42287.html
* https://www.suse.com/security/cve/CVE-2024-42288.html
* https://www.suse.com/security/cve/CVE-2024-42289.html
* https://www.suse.com/security/cve/CVE-2024-42290.html
* https://www.suse.com/security/cve/CVE-2024-42291.html
* https://www.suse.com/security/cve/CVE-2024-42292.html
* https://www.suse.com/security/cve/CVE-2024-42295.html
* https://www.suse.com/security/cve/CVE-2024-42298.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-42302.html
* https://www.suse.com/security/cve/CVE-2024-42303.html
* https://www.suse.com/security/cve/CVE-2024-42308.html
* https://www.suse.com/security/cve/CVE-2024-42309.html
* https://www.suse.com/security/cve/CVE-2024-42310.html
* https://www.suse.com/security/cve/CVE-2024-42311.html
* https://www.suse.com/security/cve/CVE-2024-42312.html
* https://www.suse.com/security/cve/CVE-2024-42313.html
* https://www.suse.com/security/cve/CVE-2024-42314.html
* https://www.suse.com/security/cve/CVE-2024-42315.html
* https://www.suse.com/security/cve/CVE-2024-42316.html
* https://www.suse.com/security/cve/CVE-2024-42318.html
* https://www.suse.com/security/cve/CVE-2024-42319.html
* https://www.suse.com/security/cve/CVE-2024-42320.html
* https://www.suse.com/security/cve/CVE-2024-42322.html
* https://www.suse.com/security/cve/CVE-2024-43816.html
* https://www.suse.com/security/cve/CVE-2024-43817.html
* https://www.suse.com/security/cve/CVE-2024-43818.html
* https://www.suse.com/security/cve/CVE-2024-43819.html
* https://www.suse.com/security/cve/CVE-2024-43821.html
* https://www.suse.com/security/cve/CVE-2024-43823.html
* https://www.suse.com/security/cve/CVE-2024-43824.html
* https://www.suse.com/security/cve/CVE-2024-43825.html
* https://www.suse.com/security/cve/CVE-2024-43826.html
* https://www.suse.com/security/cve/CVE-2024-43829.html
* https://www.suse.com/security/cve/CVE-2024-43830.html
* https://www.suse.com/security/cve/CVE-2024-43831.html
* https://www.suse.com/security/cve/CVE-2024-43833.html
* https://www.suse.com/security/cve/CVE-2024-43834.html
* https://www.suse.com/security/cve/CVE-2024-43837.html
* https://www.suse.com/security/cve/CVE-2024-43839.html
* https://www.suse.com/security/cve/CVE-2024-43840.html
* https://www.suse.com/security/cve/CVE-2024-43841.html
* https://www.suse.com/security/cve/CVE-2024-43842.html
* https://www.suse.com/security/cve/CVE-2024-43846.html
* https://www.suse.com/security/cve/CVE-2024-43847.html
* https://www.suse.com/security/cve/CVE-2024-43849.html
* https://www.suse.com/security/cve/CVE-2024-43850.html
* https://www.suse.com/security/cve/CVE-2024-43851.html
* https://www.suse.com/security/cve/CVE-2024-43853.html
* https://www.suse.com/security/cve/CVE-2024-43854.html
* https://www.suse.com/security/cve/CVE-2024-43855.html
* https://www.suse.com/security/cve/CVE-2024-43856.html
* https://www.suse.com/security/cve/CVE-2024-43858.html
* https://www.suse.com/security/cve/CVE-2024-43860.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43863.html
* https://www.suse.com/security/cve/CVE-2024-43864.html
* https://www.suse.com/security/cve/CVE-2024-43866.html
* https://www.suse.com/security/cve/CVE-2024-43867.html
* https://www.suse.com/security/cve/CVE-2024-43871.html
* https://www.suse.com/security/cve/CVE-2024-43872.html
* https://www.suse.com/security/cve/CVE-2024-43873.html
* https://www.suse.com/security/cve/CVE-2024-43874.html
* https://www.suse.com/security/cve/CVE-2024-43875.html
* https://www.suse.com/security/cve/CVE-2024-43876.html
* https://www.suse.com/security/cve/CVE-2024-43877.html
* https://www.suse.com/security/cve/CVE-2024-43879.html
* https://www.suse.com/security/cve/CVE-2024-43880.html
* https://www.suse.com/security/cve/CVE-2024-43881.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-43884.html
* https://www.suse.com/security/cve/CVE-2024-43885.html
* https://www.suse.com/security/cve/CVE-2024-43889.html
* https://www.suse.com/security/cve/CVE-2024-43892.html
* https://www.suse.com/security/cve/CVE-2024-43893.html
* https://www.suse.com/security/cve/CVE-2024-43894.html
* https://www.suse.com/security/cve/CVE-2024-43895.html
* https://www.suse.com/security/cve/CVE-2024-43897.html
* https://www.suse.com/security/cve/CVE-2024-43899.html
* https://www.suse.com/security/cve/CVE-2024-43900.html
* https://www.suse.com/security/cve/CVE-2024-43902.html
* https://www.suse.com/security/cve/CVE-2024-43903.html
* https://www.suse.com/security/cve/CVE-2024-43905.html
* https://www.suse.com/security/cve/CVE-2024-43906.html
* https://www.suse.com/security/cve/CVE-2024-43907.html
* https://www.suse.com/security/cve/CVE-2024-43908.html
* https://www.suse.com/security/cve/CVE-2024-43909.html
* https://www.suse.com/security/cve/CVE-2024-43911.html
* https://www.suse.com/security/cve/CVE-2024-43912.html
* https://www.suse.com/security/cve/CVE-2024-44931.html
* https://www.suse.com/security/cve/CVE-2024-44938.html
* https://www.suse.com/security/cve/CVE-2024-44939.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1193454
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1213123
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1220066
* https://bugzilla.suse.com/show_bug.cgi?id=1220252
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1221630
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221652
* https://bugzilla.suse.com/show_bug.cgi?id=1221857
* https://bugzilla.suse.com/show_bug.cgi?id=1222254
* https://bugzilla.suse.com/show_bug.cgi?id=1222335
* https://bugzilla.suse.com/show_bug.cgi?id=1222350
* https://bugzilla.suse.com/show_bug.cgi?id=1222364
* https://bugzilla.suse.com/show_bug.cgi?id=1222372
* https://bugzilla.suse.com/show_bug.cgi?id=1222387
* https://bugzilla.suse.com/show_bug.cgi?id=1222433
* https://bugzilla.suse.com/show_bug.cgi?id=1222434
* https://bugzilla.suse.com/show_bug.cgi?id=1222463
* https://bugzilla.suse.com/show_bug.cgi?id=1222625
* https://bugzilla.suse.com/show_bug.cgi?id=1222633
* https://bugzilla.suse.com/show_bug.cgi?id=1222634
* https://bugzilla.suse.com/show_bug.cgi?id=1222808
* https://bugzilla.suse.com/show_bug.cgi?id=1222967
* https://bugzilla.suse.com/show_bug.cgi?id=1222973
* https://bugzilla.suse.com/show_bug.cgi?id=1223053
* https://bugzilla.suse.com/show_bug.cgi?id=1223074
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223395
* https://bugzilla.suse.com/show_bug.cgi?id=1223635
* https://bugzilla.suse.com/show_bug.cgi?id=1223720
* https://bugzilla.suse.com/show_bug.cgi?id=1223731
* https://bugzilla.suse.com/show_bug.cgi?id=1223742
* https://bugzilla.suse.com/show_bug.cgi?id=1223763
* https://bugzilla.suse.com/show_bug.cgi?id=1223767
* https://bugzilla.suse.com/show_bug.cgi?id=1223777
* https://bugzilla.suse.com/show_bug.cgi?id=1223803
* https://bugzilla.suse.com/show_bug.cgi?id=1224105
* https://bugzilla.suse.com/show_bug.cgi?id=1224415
* https://bugzilla.suse.com/show_bug.cgi?id=1224485
* https://bugzilla.suse.com/show_bug.cgi?id=1224496
* https://bugzilla.suse.com/show_bug.cgi?id=1224510
* https://bugzilla.suse.com/show_bug.cgi?id=1224535
* https://bugzilla.suse.com/show_bug.cgi?id=1224631
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224690
* https://bugzilla.suse.com/show_bug.cgi?id=1224694
* https://bugzilla.suse.com/show_bug.cgi?id=1224700
* https://bugzilla.suse.com/show_bug.cgi?id=1224711
* https://bugzilla.suse.com/show_bug.cgi?id=1225475
* https://bugzilla.suse.com/show_bug.cgi?id=1225582
* https://bugzilla.suse.com/show_bug.cgi?id=1225607
* https://bugzilla.suse.com/show_bug.cgi?id=1225717
* https://bugzilla.suse.com/show_bug.cgi?id=1225718
* https://bugzilla.suse.com/show_bug.cgi?id=1225744
* https://bugzilla.suse.com/show_bug.cgi?id=1225745
* https://bugzilla.suse.com/show_bug.cgi?id=1225751
* https://bugzilla.suse.com/show_bug.cgi?id=1225814
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1225838
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226031
* https://bugzilla.suse.com/show_bug.cgi?id=1226127
* https://bugzilla.suse.com/show_bug.cgi?id=1226502
* https://bugzilla.suse.com/show_bug.cgi?id=1226530
* https://bugzilla.suse.com/show_bug.cgi?id=1226588
* https://bugzilla.suse.com/show_bug.cgi?id=1226604
* https://bugzilla.suse.com/show_bug.cgi?id=1226743
* https://bugzilla.suse.com/show_bug.cgi?id=1226751
* https://bugzilla.suse.com/show_bug.cgi?id=1226765
* https://bugzilla.suse.com/show_bug.cgi?id=1226798
* https://bugzilla.suse.com/show_bug.cgi?id=1226801
* https://bugzilla.suse.com/show_bug.cgi?id=1226834
* https://bugzilla.suse.com/show_bug.cgi?id=1226874
* https://bugzilla.suse.com/show_bug.cgi?id=1226885
* https://bugzilla.suse.com/show_bug.cgi?id=1226920
* https://bugzilla.suse.com/show_bug.cgi?id=1227149
* https://bugzilla.suse.com/show_bug.cgi?id=1227182
* https://bugzilla.suse.com/show_bug.cgi?id=1227383
* https://bugzilla.suse.com/show_bug.cgi?id=1227437
* https://bugzilla.suse.com/show_bug.cgi?id=1227492
* https://bugzilla.suse.com/show_bug.cgi?id=1227493
* https://bugzilla.suse.com/show_bug.cgi?id=1227494
* https://bugzilla.suse.com/show_bug.cgi?id=1227618
* https://bugzilla.suse.com/show_bug.cgi?id=1227620
* https://bugzilla.suse.com/show_bug.cgi?id=1227623
* https://bugzilla.suse.com/show_bug.cgi?id=1227627
* https://bugzilla.suse.com/show_bug.cgi?id=1227634
* https://bugzilla.suse.com/show_bug.cgi?id=1227706
* https://bugzilla.suse.com/show_bug.cgi?id=1227722
* https://bugzilla.suse.com/show_bug.cgi?id=1227724
* https://bugzilla.suse.com/show_bug.cgi?id=1227725
* https://bugzilla.suse.com/show_bug.cgi?id=1227728
* https://bugzilla.suse.com/show_bug.cgi?id=1227729
* https://bugzilla.suse.com/show_bug.cgi?id=1227732
* https://bugzilla.suse.com/show_bug.cgi?id=1227733
* https://bugzilla.suse.com/show_bug.cgi?id=1227734
* https://bugzilla.suse.com/show_bug.cgi?id=1227747
* https://bugzilla.suse.com/show_bug.cgi?id=1227750
* https://bugzilla.suse.com/show_bug.cgi?id=1227754
* https://bugzilla.suse.com/show_bug.cgi?id=1227758
* https://bugzilla.suse.com/show_bug.cgi?id=1227760
* https://bugzilla.suse.com/show_bug.cgi?id=1227761
* https://bugzilla.suse.com/show_bug.cgi?id=1227764
* https://bugzilla.suse.com/show_bug.cgi?id=1227766
* https://bugzilla.suse.com/show_bug.cgi?id=1227770
* https://bugzilla.suse.com/show_bug.cgi?id=1227771
* https://bugzilla.suse.com/show_bug.cgi?id=1227772
* https://bugzilla.suse.com/show_bug.cgi?id=1227774
* https://bugzilla.suse.com/show_bug.cgi?id=1227781
* https://bugzilla.suse.com/show_bug.cgi?id=1227784
* https://bugzilla.suse.com/show_bug.cgi?id=1227785
* https://bugzilla.suse.com/show_bug.cgi?id=1227787
* https://bugzilla.suse.com/show_bug.cgi?id=1227790
* https://bugzilla.suse.com/show_bug.cgi?id=1227791
* https://bugzilla.suse.com/show_bug.cgi?id=1227792
* https://bugzilla.suse.com/show_bug.cgi?id=1227796
* https://bugzilla.suse.com/show_bug.cgi?id=1227798
* https://bugzilla.suse.com/show_bug.cgi?id=1227799
* https://bugzilla.suse.com/show_bug.cgi?id=1227802
* https://bugzilla.suse.com/show_bug.cgi?id=1227808
* https://bugzilla.suse.com/show_bug.cgi?id=1227810
* https://bugzilla.suse.com/show_bug.cgi?id=1227811
* https://bugzilla.suse.com/show_bug.cgi?id=1227812
* https://bugzilla.suse.com/show_bug.cgi?id=1227815
* https://bugzilla.suse.com/show_bug.cgi?id=1227816
* https://bugzilla.suse.com/show_bug.cgi?id=1227818
* https://bugzilla.suse.com/show_bug.cgi?id=1227820
* https://bugzilla.suse.com/show_bug.cgi?id=1227823
* https://bugzilla.suse.com/show_bug.cgi?id=1227824
* https://bugzilla.suse.com/show_bug.cgi?id=1227826
* https://bugzilla.suse.com/show_bug.cgi?id=1227828
* https://bugzilla.suse.com/show_bug.cgi?id=1227829
* https://bugzilla.suse.com/show_bug.cgi?id=1227830
* https://bugzilla.suse.com/show_bug.cgi?id=1227832
* https://bugzilla.suse.com/show_bug.cgi?id=1227833
* https://bugzilla.suse.com/show_bug.cgi?id=1227834
* https://bugzilla.suse.com/show_bug.cgi?id=1227839
* https://bugzilla.suse.com/show_bug.cgi?id=1227840
* https://bugzilla.suse.com/show_bug.cgi?id=1227846
* https://bugzilla.suse.com/show_bug.cgi?id=1227849
* https://bugzilla.suse.com/show_bug.cgi?id=1227851
* https://bugzilla.suse.com/show_bug.cgi?id=1227853
* https://bugzilla.suse.com/show_bug.cgi?id=1227863
* https://bugzilla.suse.com/show_bug.cgi?id=1227864
* https://bugzilla.suse.com/show_bug.cgi?id=1227865
* https://bugzilla.suse.com/show_bug.cgi?id=1227867
* https://bugzilla.suse.com/show_bug.cgi?id=1227869
* https://bugzilla.suse.com/show_bug.cgi?id=1227870
* https://bugzilla.suse.com/show_bug.cgi?id=1227883
* https://bugzilla.suse.com/show_bug.cgi?id=1227884
* https://bugzilla.suse.com/show_bug.cgi?id=1227891
* https://bugzilla.suse.com/show_bug.cgi?id=1227893
* https://bugzilla.suse.com/show_bug.cgi?id=1227929
* https://bugzilla.suse.com/show_bug.cgi?id=1227950
* https://bugzilla.suse.com/show_bug.cgi?id=1227957
* https://bugzilla.suse.com/show_bug.cgi?id=1227981
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228021
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228192
* https://bugzilla.suse.com/show_bug.cgi?id=1228195
* https://bugzilla.suse.com/show_bug.cgi?id=1228202
* https://bugzilla.suse.com/show_bug.cgi?id=1228235
* https://bugzilla.suse.com/show_bug.cgi?id=1228236
* https://bugzilla.suse.com/show_bug.cgi?id=1228237
* https://bugzilla.suse.com/show_bug.cgi?id=1228247
* https://bugzilla.suse.com/show_bug.cgi?id=1228321
* https://bugzilla.suse.com/show_bug.cgi?id=1228409
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228426
* https://bugzilla.suse.com/show_bug.cgi?id=1228427
* https://bugzilla.suse.com/show_bug.cgi?id=1228429
* https://bugzilla.suse.com/show_bug.cgi?id=1228446
* https://bugzilla.suse.com/show_bug.cgi?id=1228447
* https://bugzilla.suse.com/show_bug.cgi?id=1228449
* https://bugzilla.suse.com/show_bug.cgi?id=1228450
* https://bugzilla.suse.com/show_bug.cgi?id=1228452
* https://bugzilla.suse.com/show_bug.cgi?id=1228456
* https://bugzilla.suse.com/show_bug.cgi?id=1228457
* https://bugzilla.suse.com/show_bug.cgi?id=1228458
* https://bugzilla.suse.com/show_bug.cgi?id=1228459
* https://bugzilla.suse.com/show_bug.cgi?id=1228460
* https://bugzilla.suse.com/show_bug.cgi?id=1228462
* https://bugzilla.suse.com/show_bug.cgi?id=1228463
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1228467
* https://bugzilla.suse.com/show_bug.cgi?id=1228468
* https://bugzilla.suse.com/show_bug.cgi?id=1228469
* https://bugzilla.suse.com/show_bug.cgi?id=1228470
* https://bugzilla.suse.com/show_bug.cgi?id=1228472
* https://bugzilla.suse.com/show_bug.cgi?id=1228479
* https://bugzilla.suse.com/show_bug.cgi?id=1228480
* https://bugzilla.suse.com/show_bug.cgi?id=1228481
* https://bugzilla.suse.com/show_bug.cgi?id=1228482
* https://bugzilla.suse.com/show_bug.cgi?id=1228483
* https://bugzilla.suse.com/show_bug.cgi?id=1228484
* https://bugzilla.suse.com/show_bug.cgi?id=1228485
* https://bugzilla.suse.com/show_bug.cgi?id=1228486
* https://bugzilla.suse.com/show_bug.cgi?id=1228487
* https://bugzilla.suse.com/show_bug.cgi?id=1228489
* https://bugzilla.suse.com/show_bug.cgi?id=1228491
* https://bugzilla.suse.com/show_bug.cgi?id=1228492
* https://bugzilla.suse.com/show_bug.cgi?id=1228493
* https://bugzilla.suse.com/show_bug.cgi?id=1228494
* https://bugzilla.suse.com/show_bug.cgi?id=1228495
* https://bugzilla.suse.com/show_bug.cgi?id=1228496
* https://bugzilla.suse.com/show_bug.cgi?id=1228499
* https://bugzilla.suse.com/show_bug.cgi?id=1228500
* https://bugzilla.suse.com/show_bug.cgi?id=1228501
* https://bugzilla.suse.com/show_bug.cgi?id=1228502
* https://bugzilla.suse.com/show_bug.cgi?id=1228503
* https://bugzilla.suse.com/show_bug.cgi?id=1228505
* https://bugzilla.suse.com/show_bug.cgi?id=1228508
* https://bugzilla.suse.com/show_bug.cgi?id=1228509
* https://bugzilla.suse.com/show_bug.cgi?id=1228510
* https://bugzilla.suse.com/show_bug.cgi?id=1228511
* https://bugzilla.suse.com/show_bug.cgi?id=1228513
* https://bugzilla.suse.com/show_bug.cgi?id=1228515
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228518
* https://bugzilla.suse.com/show_bug.cgi?id=1228520
* https://bugzilla.suse.com/show_bug.cgi?id=1228525
* https://bugzilla.suse.com/show_bug.cgi?id=1228527
* https://bugzilla.suse.com/show_bug.cgi?id=1228530
* https://bugzilla.suse.com/show_bug.cgi?id=1228531
* https://bugzilla.suse.com/show_bug.cgi?id=1228539
* https://bugzilla.suse.com/show_bug.cgi?id=1228561
* https://bugzilla.suse.com/show_bug.cgi?id=1228563
* https://bugzilla.suse.com/show_bug.cgi?id=1228564
* https://bugzilla.suse.com/show_bug.cgi?id=1228565
* https://bugzilla.suse.com/show_bug.cgi?id=1228567
* https://bugzilla.suse.com/show_bug.cgi?id=1228568
* https://bugzilla.suse.com/show_bug.cgi?id=1228572
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228579
* https://bugzilla.suse.com/show_bug.cgi?id=1228580
* https://bugzilla.suse.com/show_bug.cgi?id=1228581
* https://bugzilla.suse.com/show_bug.cgi?id=1228582
* https://bugzilla.suse.com/show_bug.cgi?id=1228584
* https://bugzilla.suse.com/show_bug.cgi?id=1228586
* https://bugzilla.suse.com/show_bug.cgi?id=1228588
* https://bugzilla.suse.com/show_bug.cgi?id=1228590
* https://bugzilla.suse.com/show_bug.cgi?id=1228591
* https://bugzilla.suse.com/show_bug.cgi?id=1228599
* https://bugzilla.suse.com/show_bug.cgi?id=1228615
* https://bugzilla.suse.com/show_bug.cgi?id=1228616
* https://bugzilla.suse.com/show_bug.cgi?id=1228617
* https://bugzilla.suse.com/show_bug.cgi?id=1228625
* https://bugzilla.suse.com/show_bug.cgi?id=1228626
* https://bugzilla.suse.com/show_bug.cgi?id=1228633
* https://bugzilla.suse.com/show_bug.cgi?id=1228635
* https://bugzilla.suse.com/show_bug.cgi?id=1228636
* https://bugzilla.suse.com/show_bug.cgi?id=1228640
* https://bugzilla.suse.com/show_bug.cgi?id=1228643
* https://bugzilla.suse.com/show_bug.cgi?id=1228644
* https://bugzilla.suse.com/show_bug.cgi?id=1228646
* https://bugzilla.suse.com/show_bug.cgi?id=1228649
* https://bugzilla.suse.com/show_bug.cgi?id=1228650
* https://bugzilla.suse.com/show_bug.cgi?id=1228654
* https://bugzilla.suse.com/show_bug.cgi?id=1228655
* https://bugzilla.suse.com/show_bug.cgi?id=1228656
* https://bugzilla.suse.com/show_bug.cgi?id=1228658
* https://bugzilla.suse.com/show_bug.cgi?id=1228660
* https://bugzilla.suse.com/show_bug.cgi?id=1228662
* https://bugzilla.suse.com/show_bug.cgi?id=1228665
* https://bugzilla.suse.com/show_bug.cgi?id=1228666
* https://bugzilla.suse.com/show_bug.cgi?id=1228667
* https://bugzilla.suse.com/show_bug.cgi?id=1228672
* https://bugzilla.suse.com/show_bug.cgi?id=1228673
* https://bugzilla.suse.com/show_bug.cgi?id=1228674
* https://bugzilla.suse.com/show_bug.cgi?id=1228677
* https://bugzilla.suse.com/show_bug.cgi?id=1228680
* https://bugzilla.suse.com/show_bug.cgi?id=1228687
* https://bugzilla.suse.com/show_bug.cgi?id=1228705
* https://bugzilla.suse.com/show_bug.cgi?id=1228706
* https://bugzilla.suse.com/show_bug.cgi?id=1228707
* https://bugzilla.suse.com/show_bug.cgi?id=1228708
* https://bugzilla.suse.com/show_bug.cgi?id=1228709
* https://bugzilla.suse.com/show_bug.cgi?id=1228710
* https://bugzilla.suse.com/show_bug.cgi?id=1228718
* https://bugzilla.suse.com/show_bug.cgi?id=1228720
* https://bugzilla.suse.com/show_bug.cgi?id=1228721
* https://bugzilla.suse.com/show_bug.cgi?id=1228722
* https://bugzilla.suse.com/show_bug.cgi?id=1228723
* https://bugzilla.suse.com/show_bug.cgi?id=1228724
* https://bugzilla.suse.com/show_bug.cgi?id=1228726
* https://bugzilla.suse.com/show_bug.cgi?id=1228727
* https://bugzilla.suse.com/show_bug.cgi?id=1228733
* https://bugzilla.suse.com/show_bug.cgi?id=1228737
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228748
* https://bugzilla.suse.com/show_bug.cgi?id=1228754
* https://bugzilla.suse.com/show_bug.cgi?id=1228756
* https://bugzilla.suse.com/show_bug.cgi?id=1228757
* https://bugzilla.suse.com/show_bug.cgi?id=1228758
* https://bugzilla.suse.com/show_bug.cgi?id=1228764
* https://bugzilla.suse.com/show_bug.cgi?id=1228766
* https://bugzilla.suse.com/show_bug.cgi?id=1228779
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228849
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1228964
* https://bugzilla.suse.com/show_bug.cgi?id=1228966
* https://bugzilla.suse.com/show_bug.cgi?id=1228967
* https://bugzilla.suse.com/show_bug.cgi?id=1228973
* https://bugzilla.suse.com/show_bug.cgi?id=1228977
* https://bugzilla.suse.com/show_bug.cgi?id=1228978
* https://bugzilla.suse.com/show_bug.cgi?id=1228979
* https://bugzilla.suse.com/show_bug.cgi?id=1228986
* https://bugzilla.suse.com/show_bug.cgi?id=1228988
* https://bugzilla.suse.com/show_bug.cgi?id=1228989
* https://bugzilla.suse.com/show_bug.cgi?id=1228991
* https://bugzilla.suse.com/show_bug.cgi?id=1228992
* https://bugzilla.suse.com/show_bug.cgi?id=1229005
* https://bugzilla.suse.com/show_bug.cgi?id=1229024
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229045
* https://bugzilla.suse.com/show_bug.cgi?id=1229046
* https://bugzilla.suse.com/show_bug.cgi?id=1229054
* https://bugzilla.suse.com/show_bug.cgi?id=1229056
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229134
* https://bugzilla.suse.com/show_bug.cgi?id=1229136
* https://bugzilla.suse.com/show_bug.cgi?id=1229154
* https://bugzilla.suse.com/show_bug.cgi?id=1229156
* https://bugzilla.suse.com/show_bug.cgi?id=1229160
* https://bugzilla.suse.com/show_bug.cgi?id=1229167
* https://bugzilla.suse.com/show_bug.cgi?id=1229168
* https://bugzilla.suse.com/show_bug.cgi?id=1229169
* https://bugzilla.suse.com/show_bug.cgi?id=1229170
* https://bugzilla.suse.com/show_bug.cgi?id=1229171
* https://bugzilla.suse.com/show_bug.cgi?id=1229172
* https://bugzilla.suse.com/show_bug.cgi?id=1229173
* https://bugzilla.suse.com/show_bug.cgi?id=1229174
* https://bugzilla.suse.com/show_bug.cgi?id=1229239
* https://bugzilla.suse.com/show_bug.cgi?id=1229240
* https://bugzilla.suse.com/show_bug.cgi?id=1229241
* https://bugzilla.suse.com/show_bug.cgi?id=1229243
* https://bugzilla.suse.com/show_bug.cgi?id=1229244
* https://bugzilla.suse.com/show_bug.cgi?id=1229245
* https://bugzilla.suse.com/show_bug.cgi?id=1229246
* https://bugzilla.suse.com/show_bug.cgi?id=1229247
* https://bugzilla.suse.com/show_bug.cgi?id=1229248
* https://bugzilla.suse.com/show_bug.cgi?id=1229249
* https://bugzilla.suse.com/show_bug.cgi?id=1229250
* https://bugzilla.suse.com/show_bug.cgi?id=1229251
* https://bugzilla.suse.com/show_bug.cgi?id=1229252
* https://bugzilla.suse.com/show_bug.cgi?id=1229253
* https://bugzilla.suse.com/show_bug.cgi?id=1229254
* https://bugzilla.suse.com/show_bug.cgi?id=1229255
* https://bugzilla.suse.com/show_bug.cgi?id=1229256
* https://bugzilla.suse.com/show_bug.cgi?id=1229287
* https://bugzilla.suse.com/show_bug.cgi?id=1229290
* https://bugzilla.suse.com/show_bug.cgi?id=1229291
* https://bugzilla.suse.com/show_bug.cgi?id=1229292
* https://bugzilla.suse.com/show_bug.cgi?id=1229294
* https://bugzilla.suse.com/show_bug.cgi?id=1229296
* https://bugzilla.suse.com/show_bug.cgi?id=1229297
* https://bugzilla.suse.com/show_bug.cgi?id=1229298
* https://bugzilla.suse.com/show_bug.cgi?id=1229299
* https://bugzilla.suse.com/show_bug.cgi?id=1229301
* https://bugzilla.suse.com/show_bug.cgi?id=1229303
* https://bugzilla.suse.com/show_bug.cgi?id=1229304
* https://bugzilla.suse.com/show_bug.cgi?id=1229305
* https://bugzilla.suse.com/show_bug.cgi?id=1229307
* https://bugzilla.suse.com/show_bug.cgi?id=1229309
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229313
* https://bugzilla.suse.com/show_bug.cgi?id=1229314
* https://bugzilla.suse.com/show_bug.cgi?id=1229315
* https://bugzilla.suse.com/show_bug.cgi?id=1229316
* https://bugzilla.suse.com/show_bug.cgi?id=1229317
* https://bugzilla.suse.com/show_bug.cgi?id=1229318
* https://bugzilla.suse.com/show_bug.cgi?id=1229319
* https://bugzilla.suse.com/show_bug.cgi?id=1229320
* https://bugzilla.suse.com/show_bug.cgi?id=1229327
* https://bugzilla.suse.com/show_bug.cgi?id=1229341
* https://bugzilla.suse.com/show_bug.cgi?id=1229342
* https://bugzilla.suse.com/show_bug.cgi?id=1229344
* https://bugzilla.suse.com/show_bug.cgi?id=1229345
* https://bugzilla.suse.com/show_bug.cgi?id=1229346
* https://bugzilla.suse.com/show_bug.cgi?id=1229347
* https://bugzilla.suse.com/show_bug.cgi?id=1229349
* https://bugzilla.suse.com/show_bug.cgi?id=1229350
* https://bugzilla.suse.com/show_bug.cgi?id=1229351
* https://bugzilla.suse.com/show_bug.cgi?id=1229353
* https://bugzilla.suse.com/show_bug.cgi?id=1229354
* https://bugzilla.suse.com/show_bug.cgi?id=1229355
* https://bugzilla.suse.com/show_bug.cgi?id=1229356
* https://bugzilla.suse.com/show_bug.cgi?id=1229357
* https://bugzilla.suse.com/show_bug.cgi?id=1229358
* https://bugzilla.suse.com/show_bug.cgi?id=1229359
* https://bugzilla.suse.com/show_bug.cgi?id=1229360
* https://bugzilla.suse.com/show_bug.cgi?id=1229365
* https://bugzilla.suse.com/show_bug.cgi?id=1229366
* https://bugzilla.suse.com/show_bug.cgi?id=1229369
* https://bugzilla.suse.com/show_bug.cgi?id=1229370
* https://bugzilla.suse.com/show_bug.cgi?id=1229373
* https://bugzilla.suse.com/show_bug.cgi?id=1229374
* https://bugzilla.suse.com/show_bug.cgi?id=1229379
* https://bugzilla.suse.com/show_bug.cgi?id=1229381
* https://bugzilla.suse.com/show_bug.cgi?id=1229382
* https://bugzilla.suse.com/show_bug.cgi?id=1229383
* https://bugzilla.suse.com/show_bug.cgi?id=1229386
* https://bugzilla.suse.com/show_bug.cgi?id=1229388
* https://bugzilla.suse.com/show_bug.cgi?id=1229390
* https://bugzilla.suse.com/show_bug.cgi?id=1229391
* https://bugzilla.suse.com/show_bug.cgi?id=1229392
* https://bugzilla.suse.com/show_bug.cgi?id=1229395
* https://bugzilla.suse.com/show_bug.cgi?id=1229398
* https://bugzilla.suse.com/show_bug.cgi?id=1229399
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229402
* https://bugzilla.suse.com/show_bug.cgi?id=1229403
* https://bugzilla.suse.com/show_bug.cgi?id=1229404
* https://bugzilla.suse.com/show_bug.cgi?id=1229407
* https://bugzilla.suse.com/show_bug.cgi?id=1229409
* https://bugzilla.suse.com/show_bug.cgi?id=1229410
* https://bugzilla.suse.com/show_bug.cgi?id=1229411
* https://bugzilla.suse.com/show_bug.cgi?id=1229413
* https://bugzilla.suse.com/show_bug.cgi?id=1229414
* https://bugzilla.suse.com/show_bug.cgi?id=1229417
* https://bugzilla.suse.com/show_bug.cgi?id=1229444
* https://bugzilla.suse.com/show_bug.cgi?id=1229451
* https://bugzilla.suse.com/show_bug.cgi?id=1229452
* https://bugzilla.suse.com/show_bug.cgi?id=1229455
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229480
* https://bugzilla.suse.com/show_bug.cgi?id=1229481
* https://bugzilla.suse.com/show_bug.cgi?id=1229482
* https://bugzilla.suse.com/show_bug.cgi?id=1229484
* https://bugzilla.suse.com/show_bug.cgi?id=1229485
* https://bugzilla.suse.com/show_bug.cgi?id=1229486
* https://bugzilla.suse.com/show_bug.cgi?id=1229487
* https://bugzilla.suse.com/show_bug.cgi?id=1229488
* https://bugzilla.suse.com/show_bug.cgi?id=1229489
* https://bugzilla.suse.com/show_bug.cgi?id=1229490
* https://bugzilla.suse.com/show_bug.cgi?id=1229493
* https://bugzilla.suse.com/show_bug.cgi?id=1229495
* https://bugzilla.suse.com/show_bug.cgi?id=1229496
* https://bugzilla.suse.com/show_bug.cgi?id=1229497
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
* https://bugzilla.suse.com/show_bug.cgi?id=1229739
* https://bugzilla.suse.com/show_bug.cgi?id=1229743
* https://bugzilla.suse.com/show_bug.cgi?id=1229746
* https://bugzilla.suse.com/show_bug.cgi?id=1229747
* https://bugzilla.suse.com/show_bug.cgi?id=1229752
* https://bugzilla.suse.com/show_bug.cgi?id=1229754
* https://bugzilla.suse.com/show_bug.cgi?id=1229755
* https://bugzilla.suse.com/show_bug.cgi?id=1229756
* https://bugzilla.suse.com/show_bug.cgi?id=1229759
* https://bugzilla.suse.com/show_bug.cgi?id=1229761
* https://bugzilla.suse.com/show_bug.cgi?id=1229767
* https://bugzilla.suse.com/show_bug.cgi?id=1229781
* https://bugzilla.suse.com/show_bug.cgi?id=1229784
* https://bugzilla.suse.com/show_bug.cgi?id=1229785
* https://bugzilla.suse.com/show_bug.cgi?id=1229787
* https://bugzilla.suse.com/show_bug.cgi?id=1229788
* https://bugzilla.suse.com/show_bug.cgi?id=1229789
* https://bugzilla.suse.com/show_bug.cgi?id=1229792
* https://bugzilla.suse.com/show_bug.cgi?id=1229820
* https://bugzilla.suse.com/show_bug.cgi?id=1229827
* https://bugzilla.suse.com/show_bug.cgi?id=1229830
* https://bugzilla.suse.com/show_bug.cgi?id=1229837
* https://bugzilla.suse.com/show_bug.cgi?id=1229940
* https://bugzilla.suse.com/show_bug.cgi?id=1230056
* https://bugzilla.suse.com/show_bug.cgi?id=1230350
* https://bugzilla.suse.com/show_bug.cgi?id=1230413
* https://jira.suse.com/browse/PED-10029
* https://jira.suse.com/browse/PED-10045
* https://jira.suse.com/browse/PED-10055
* https://jira.suse.com/browse/PED-10105
* https://jira.suse.com/browse/PED-10108
* https://jira.suse.com/browse/PED-8491
* https://jira.suse.com/browse/PED-8779
* https://jira.suse.com/browse/PED-8954


--===============0241071922796769080==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:3383-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">bsc#1193454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205462">bsc#1205462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">bsc#1208783</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">bsc#1213123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214285">bsc#1214285</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220066">bsc#1220066</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220252">bsc#1220252</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220877">bsc#1220877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221326">bsc#1221326</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221630">bsc#1221630</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">bsc#1221645</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221652">bsc#1221652</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221857">bsc#1221857</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222254">bsc#1222254</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222335">bsc#1222335</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222350">bsc#1222350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">bsc#1222364</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">bsc#1222372</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222387">bsc#1222387</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222433">bsc#1222433</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222434">bsc#1222434</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222463">bsc#1222463</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">bsc#1222625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222633">bsc#1222633</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222634">bsc#1222634</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222808">bsc#1222808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222967">bsc#1222967</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222973">bsc#1222973</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223053">bsc#1223053</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223074">bsc#1223074</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">bsc#1223191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223395">bsc#1223395</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">bsc#1223635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223720">bsc#1223720</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223731">bsc#1223731</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223742">bsc#1223742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223763">bsc#1223763</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223767">bsc#1223767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223777">bsc#1223777</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223803">bsc#1223803</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224105">bsc#1224105</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224415">bsc#1224415</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224485">bsc#1224485</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224496">bsc#1224496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224510">bsc#1224510</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224535">bsc#1224535</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224631">bsc#1224631</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">bsc#1224636</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224690">bsc#1224690</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">bsc#1224694</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">bsc#1224700</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224711">bsc#1224711</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">bsc#1225475</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225582">bsc#1225582</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">bsc#1225607</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">bsc#1225717</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225718">bsc#1225718</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">bsc#1225744</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">bsc#1225745</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225751">bsc#1225751</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225814">bsc#1225814</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225832">bsc#1225832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">bsc#1225838</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">bsc#1225903</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226031">bsc#1226031</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226127">bsc#1226127</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">bsc#1226502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226530">bsc#1226530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">bsc#1226588</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226604">bsc#1226604</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226743">bsc#1226743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226751">bsc#1226751</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226765">bsc#1226765</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226798">bsc#1226798</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226801">bsc#1226801</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">bsc#1226834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226874">bsc#1226874</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226885">bsc#1226885</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226920">bsc#1226920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227149">bsc#1227149</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227182">bsc#1227182</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">bsc#1227383</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227437">bsc#1227437</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227492">bsc#1227492</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227493">bsc#1227493</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227494">bsc#1227494</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">bsc#1227618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">bsc#1227620</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227623">bsc#1227623</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227627">bsc#1227627</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227634">bsc#1227634</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227706">bsc#1227706</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">bsc#1227722</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">bsc#1227724</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">bsc#1227725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">bsc#1227728</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">bsc#1227729</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">bsc#1227732</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">bsc#1227733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227734">bsc#1227734</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227747">bsc#1227747</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">bsc#1227750</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">bsc#1227754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227758">bsc#1227758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">bsc#1227760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227761">bsc#1227761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">bsc#1227764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">bsc#1227766</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">bsc#1227770</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">bsc#1227771</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">bsc#1227772</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">bsc#1227774</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227781">bsc#1227781</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227784">bsc#1227784</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227785">bsc#1227785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">bsc#1227787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">bsc#1227790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227791">bsc#1227791</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">bsc#1227792</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">bsc#1227796</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">bsc#1227798</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227799">bsc#1227799</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">bsc#1227802</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">bsc#1227808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">bsc#1227810</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227811">bsc#1227811</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">bsc#1227812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227815">bsc#1227815</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">bsc#1227816</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227818">bsc#1227818</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">bsc#1227820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">bsc#1227823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">bsc#1227824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227826">bsc#1227826</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">bsc#1227828</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">bsc#1227829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">bsc#1227830</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227832">bsc#1227832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227833">bsc#1227833</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227834">bsc#1227834</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227839">bsc#1227839</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227840">bsc#1227840</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">bsc#1227846</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">bsc#1227849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">bsc#1227851</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">bsc#1227853</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227863">bsc#1227863</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">bsc#1227864</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">bsc#1227865</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227867">bsc#1227867</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227869">bsc#1227869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">bsc#1227870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227883">bsc#1227883</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">bsc#1227884</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">bsc#1227891</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">bsc#1227893</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">bsc#1227929</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">bsc#1227950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">bsc#1227957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">bsc#1227981</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">bsc#1228020</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228021">bsc#1228021</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">bsc#1228114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228192">bsc#1228192</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">bsc#1228195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">bsc#1228202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">bsc#1228235</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228236">bsc#1228236</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">bsc#1228237</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">bsc#1228247</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228321">bsc#1228321</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">bsc#1228409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228426">bsc#1228426</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228427">bsc#1228427</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228429">bsc#1228429</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228446">bsc#1228446</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228447">bsc#1228447</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228449">bsc#1228449</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228450">bsc#1228450</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228452">bsc#1228452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228456">bsc#1228456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228457">bsc#1228457</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228458">bsc#1228458</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">bsc#1228459</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228460">bsc#1228460</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">bsc#1228462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228463">bsc#1228463</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228466">bsc#1228466</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228467">bsc#1228467</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228468">bsc#1228468</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228469">bsc#1228469</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">bsc#1228470</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228472">bsc#1228472</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228479">bsc#1228479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228480">bsc#1228480</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228481">bsc#1228481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228482">bsc#1228482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228483">bsc#1228483</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228484">bsc#1228484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228485">bsc#1228485</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">bsc#1228486</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228487">bsc#1228487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228489">bsc#1228489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228491">bsc#1228491</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228492">bsc#1228492</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228493">bsc#1228493</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228494">bsc#1228494</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228495">bsc#1228495</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228496">bsc#1228496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228499">bsc#1228499</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228500">bsc#1228500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228501">bsc#1228501</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228502">bsc#1228502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228503">bsc#1228503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228505">bsc#1228505</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228508">bsc#1228508</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228509">bsc#1228509</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228510">bsc#1228510</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228511">bsc#1228511</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228513">bsc#1228513</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228515">bsc#1228515</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228516">bsc#1228516</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">bsc#1228518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">bsc#1228520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228525">bsc#1228525</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228527">bsc#1228527</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">bsc#1228530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228531">bsc#1228531</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228539">bsc#1228539</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">bsc#1228561</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228563">bsc#1228563</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228564">bsc#1228564</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">bsc#1228565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">bsc#1228567</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228568">bsc#1228568</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228572">bsc#1228572</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228576">bsc#1228576</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228579">bsc#1228579</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">bsc#1228580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">bsc#1228581</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228582">bsc#1228582</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">bsc#1228584</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228586">bsc#1228586</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">bsc#1228588</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228590">bsc#1228590</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">bsc#1228591</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">bsc#1228599</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228615">bsc#1228615</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228616">bsc#1228616</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">bsc#1228617</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">bsc#1228625</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">bsc#1228626</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">bsc#1228633</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228635">bsc#1228635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228636">bsc#1228636</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">bsc#1228640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228643">bsc#1228643</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">bsc#1228644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228646">bsc#1228646</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">bsc#1228649</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">bsc#1228650</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228654">bsc#1228654</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">bsc#1228655</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228656">bsc#1228656</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">bsc#1228658</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228660">bsc#1228660</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">bsc#1228662</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">bsc#1228665</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228666">bsc#1228666</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228667">bsc#1228667</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">bsc#1228672</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228673">bsc#1228673</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228674">bsc#1228674</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228677">bsc#1228677</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">bsc#1228680</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228687">bsc#1228687</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">bsc#1228705</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228706">bsc#1228706</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228707">bsc#1228707</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228708">bsc#1228708</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228709">bsc#1228709</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228710">bsc#1228710</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228718">bsc#1228718</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228720">bsc#1228720</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228721">bsc#1228721</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228722">bsc#1228722</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">bsc#1228723</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228724">bsc#1228724</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">bsc#1228726</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228727">bsc#1228727</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228733">bsc#1228733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228737">bsc#1228737</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">bsc#1228743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228748">bsc#1228748</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228754">bsc#1228754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">bsc#1228756</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228757">bsc#1228757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228758">bsc#1228758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228764">bsc#1228764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228766">bsc#1228766</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228779">bsc#1228779</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">bsc#1228801</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228849">bsc#1228849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">bsc#1228850</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">bsc#1228857</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228959">bsc#1228959</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228964">bsc#1228964</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228966">bsc#1228966</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228967">bsc#1228967</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228973">bsc#1228973</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228977">bsc#1228977</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228978">bsc#1228978</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228979">bsc#1228979</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228986">bsc#1228986</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228988">bsc#1228988</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228989">bsc#1228989</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228991">bsc#1228991</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228992">bsc#1228992</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229005">bsc#1229005</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229024">bsc#1229024</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229042">bsc#1229042</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229045">bsc#1229045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229046">bsc#1229046</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229054">bsc#1229054</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229056">bsc#1229056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229086">bsc#1229086</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229134">bsc#1229134</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229136">bsc#1229136</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229154">bsc#1229154</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229156">bsc#1229156</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229160">bsc#1229160</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229167">bsc#1229167</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229168">bsc#1229168</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229169">bsc#1229169</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229170">bsc#1229170</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229171">bsc#1229171</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229172">bsc#1229172</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229173">bsc#1229173</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229174">bsc#1229174</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229239">bsc#1229239</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229240">bsc#1229240</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229241">bsc#1229241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229243">bsc#1229243</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229244">bsc#1229244</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229245">bsc#1229245</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229246">bsc#1229246</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229247">bsc#1229247</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229248">bsc#1229248</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229249">bsc#1229249</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229250">bsc#1229250</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229251">bsc#1229251</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229252">bsc#1229252</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229253">bsc#1229253</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229254">bsc#1229254</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229255">bsc#1229255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229256">bsc#1229256</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229287">bsc#1229287</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229290">bsc#1229290</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229291">bsc#1229291</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229292">bsc#1229292</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229294">bsc#1229294</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229296">bsc#1229296</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229297">bsc#1229297</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229298">bsc#1229298</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229299">bsc#1229299</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229301">bsc#1229301</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229303">bsc#1229303</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229304">bsc#1229304</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229305">bsc#1229305</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229307">bsc#1229307</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229309">bsc#1229309</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">bsc#1229312</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229313">bsc#1229313</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229314">bsc#1229314</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229315">bsc#1229315</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229316">bsc#1229316</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229317">bsc#1229317</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229318">bsc#1229318</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229319">bsc#1229319</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229320">bsc#1229320</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229327">bsc#1229327</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229341">bsc#1229341</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229342">bsc#1229342</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229344">bsc#1229344</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229345">bsc#1229345</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229346">bsc#1229346</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229347">bsc#1229347</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229349">bsc#1229349</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229350">bsc#1229350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229351">bsc#1229351</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229353">bsc#1229353</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229354">bsc#1229354</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229355">bsc#1229355</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229356">bsc#1229356</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229357">bsc#1229357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229358">bsc#1229358</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229359">bsc#1229359</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229360">bsc#1229360</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229365">bsc#1229365</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229366">bsc#1229366</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229369">bsc#1229369</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229370">bsc#1229370</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229373">bsc#1229373</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229374">bsc#1229374</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229379">bsc#1229379</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229381">bsc#1229381</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229382">bsc#1229382</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229383">bsc#1229383</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229386">bsc#1229386</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229388">bsc#1229388</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229390">bsc#1229390</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229391">bsc#1229391</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229392">bsc#1229392</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229395">bsc#1229395</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229398">bsc#1229398</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229399">bsc#1229399</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229400">bsc#1229400</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229402">bsc#1229402</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229403">bsc#1229403</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229404">bsc#1229404</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229407">bsc#1229407</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229409">bsc#1229409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229410">bsc#1229410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229411">bsc#1229411</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229413">bsc#1229413</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229414">bsc#1229414</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229417">bsc#1229417</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229444">bsc#1229444</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229451">bsc#1229451</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229452">bsc#1229452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229455">bsc#1229455</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229456">bsc#1229456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229480">bsc#1229480</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229481">bsc#1229481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229482">bsc#1229482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229484">bsc#1229484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229485">bsc#1229485</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229486">bsc#1229486</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229487">bsc#1229487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229488">bsc#1229488</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229489">bsc#1229489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229490">bsc#1229490</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229493">bsc#1229493</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229495">bsc#1229495</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229496">bsc#1229496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229497">bsc#1229497</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229500">bsc#1229500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229503">bsc#1229503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229707">bsc#1229707</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229739">bsc#1229739</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229743">bsc#1229743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229746">bsc#1229746</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229747">bsc#1229747</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">bsc#1229752</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229754">bsc#1229754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229755">bsc#1229755</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229756">bsc#1229756</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229759">bsc#1229759</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229761">bsc#1229761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229767">bsc#1229767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229781">bsc#1229781</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229784">bsc#1229784</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229785">bsc#1229785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229787">bsc#1229787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229788">bsc#1229788</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229789">bsc#1229789</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229792">bsc#1229792</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229820">bsc#1229820</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229827">bsc#1229827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229830">bsc#1229830</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229837">bsc#1229837</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229940">bsc#1229940</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230056">bsc#1230056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230350">bsc#1230350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230413">bsc#1230413</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10029">jsc#PED-10029</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10045">jsc#PED-10045</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10055">jsc#PED-10055</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10105">jsc#PED-10105</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10108">jsc#PED-10108</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8491">jsc#PED-8491</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8779">jsc#PED-8779</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8954">jsc#PED-8954</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52489.html">CVE-2023-52489</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52581.html">CVE-2023-52581</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52668.html">CVE-2023-52668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52688.html">CVE-2023-52688</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52735.html">CVE-2023-52735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52859.html">CVE-2023-52859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">CVE-2023-52885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52886.html">CVE-2023-52886</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52887.html">CVE-2023-52887</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52889.html">CVE-2023-52889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26590.html">CVE-2024-26590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26631.html">CVE-2024-26631</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26637.html">CVE-2024-26637</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26668.html">CVE-2024-26668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26669.html">CVE-2024-26669</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26677.html">CVE-2024-26677</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26682.html">CVE-2024-26682</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26683.html">CVE-2024-26683</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26691.html">CVE-2024-26691</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26735.html">CVE-2024-26735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26808.html">CVE-2024-26808</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26809.html">CVE-2024-26809</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26812.html">CVE-2024-26812</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26835.html">CVE-2024-26835</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26837.html">CVE-2024-26837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26849.html">CVE-2024-26849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26851.html">CVE-2024-26851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">CVE-2024-26889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26944.html">CVE-2024-26944</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26976.html">CVE-2024-26976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27010.html">CVE-2024-27010</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27011.html">CVE-2024-27011</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27024.html">CVE-2024-27024</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27049.html">CVE-2024-27049</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27050.html">CVE-2024-27050</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27079.html">CVE-2024-27079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27403.html">CVE-2024-27403</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27433.html">CVE-2024-27433</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">CVE-2024-27437</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-31076.html">CVE-2024-31076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35854.html">CVE-2024-35854</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35855.html">CVE-2024-35855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35897.html">CVE-2024-35897</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35902.html">CVE-2024-35902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35913.html">CVE-2024-35913</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35939.html">CVE-2024-35939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">CVE-2024-35949</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36270.html">CVE-2024-36270</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36286.html">CVE-2024-36286</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">CVE-2024-36288</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36489.html">CVE-2024-36489</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36881.html">CVE-2024-36881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36907.html">CVE-2024-36907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36909.html">CVE-2024-36909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36910.html">CVE-2024-36910</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36911.html">CVE-2024-36911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36929.html">CVE-2024-36929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36933.html">CVE-2024-36933</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">CVE-2024-36939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36970.html">CVE-2024-36970</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36979.html">CVE-2024-36979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">CVE-2024-38548</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38563.html">CVE-2024-38563</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38609.html">CVE-2024-38609</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38662.html">CVE-2024-38662</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39476.html">CVE-2024-39476</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39483.html">CVE-2024-39483</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39484.html">CVE-2024-39484</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39486.html">CVE-2024-39486</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">CVE-2024-39488</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39489.html">CVE-2024-39489</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39491.html">CVE-2024-39491</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39493.html">CVE-2024-39493</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39497.html">CVE-2024-39497</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">CVE-2024-39499</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39500.html">CVE-2024-39500</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">CVE-2024-39501</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39505.html">CVE-2024-39505</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">CVE-2024-39506</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39508.html">CVE-2024-39508</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">CVE-2024-39509</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39510.html">CVE-2024-39510</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40899.html">CVE-2024-40899</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40900.html">CVE-2024-40900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40902.html">CVE-2024-40902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40903.html">CVE-2024-40903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">CVE-2024-40904</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40905.html">CVE-2024-40905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40909.html">CVE-2024-40909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40910.html">CVE-2024-40910</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40911.html">CVE-2024-40911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">CVE-2024-40912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40913.html">CVE-2024-40913</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40916.html">CVE-2024-40916</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40920.html">CVE-2024-40920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40921.html">CVE-2024-40921</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40922.html">CVE-2024-40922</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40924.html">CVE-2024-40924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40926.html">CVE-2024-40926</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40927.html">CVE-2024-40927</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">CVE-2024-40929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40930.html">CVE-2024-40930</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">CVE-2024-40932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40934.html">CVE-2024-40934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40936.html">CVE-2024-40936</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40938.html">CVE-2024-40938</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40939.html">CVE-2024-40939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">CVE-2024-40941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">CVE-2024-40942</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">CVE-2024-40943</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40944.html">CVE-2024-40944</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40945.html">CVE-2024-40945</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40954.html">CVE-2024-40954</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40956.html">CVE-2024-40956</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40957.html">CVE-2024-40957</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40958.html">CVE-2024-40958</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">CVE-2024-40959</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40962.html">CVE-2024-40962</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40964.html">CVE-2024-40964</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">CVE-2024-40967</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40976.html">CVE-2024-40976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40977.html">CVE-2024-40977</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40978.html">CVE-2024-40978</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40981.html">CVE-2024-40981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">CVE-2024-40982</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40984.html">CVE-2024-40984</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">CVE-2024-40987</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">CVE-2024-40988</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40989.html">CVE-2024-40989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">CVE-2024-40990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40992.html">CVE-2024-40992</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40994.html">CVE-2024-40994</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40995.html">CVE-2024-40995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40997.html">CVE-2024-40997</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41000.html">CVE-2024-41000</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41001.html">CVE-2024-41001</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41002.html">CVE-2024-41002</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41004.html">CVE-2024-41004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41007.html">CVE-2024-41007</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">CVE-2024-41009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41010.html">CVE-2024-41010</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">CVE-2024-41011</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41012.html">CVE-2024-41012</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">CVE-2024-41015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41020.html">CVE-2024-41020</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41022.html">CVE-2024-41022</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41024.html">CVE-2024-41024</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41025.html">CVE-2024-41025</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41028.html">CVE-2024-41028</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41032.html">CVE-2024-41032</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41035.html">CVE-2024-41035</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41036.html">CVE-2024-41036</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41037.html">CVE-2024-41037</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41038.html">CVE-2024-41038</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41039.html">CVE-2024-41039</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41040.html">CVE-2024-41040</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41041.html">CVE-2024-41041</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">CVE-2024-41044</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41045.html">CVE-2024-41045</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">CVE-2024-41048</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41049.html">CVE-2024-41049</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41050.html">CVE-2024-41050</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41051.html">CVE-2024-41051</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41056.html">CVE-2024-41056</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41057.html">CVE-2024-41057</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41058.html">CVE-2024-41058</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">CVE-2024-41059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41060.html">CVE-2024-41060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41061.html">CVE-2024-41061</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41062.html">CVE-2024-41062</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">CVE-2024-41063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">CVE-2024-41064</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41065.html">CVE-2024-41065</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">CVE-2024-41066</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41068.html">CVE-2024-41068</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41069.html">CVE-2024-41069</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">CVE-2024-41070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">CVE-2024-41071</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">CVE-2024-41072</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41073.html">CVE-2024-41073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41074.html">CVE-2024-41074</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41075.html">CVE-2024-41075</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41076.html">CVE-2024-41076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">CVE-2024-41078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41079.html">CVE-2024-41079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41080.html">CVE-2024-41080</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">CVE-2024-41081</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41084.html">CVE-2024-41084</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41087.html">CVE-2024-41087</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41088.html">CVE-2024-41088</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41089.html">CVE-2024-41089</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41092.html">CVE-2024-41092</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41093.html">CVE-2024-41093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41094.html">CVE-2024-41094</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41095.html">CVE-2024-41095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41096.html">CVE-2024-41096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41097.html">CVE-2024-41097</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41098.html">CVE-2024-41098</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42064.html">CVE-2024-42064</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42069.html">CVE-2024-42069</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">CVE-2024-42070</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42073.html">CVE-2024-42073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42074.html">CVE-2024-42074</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42076.html">CVE-2024-42076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42077.html">CVE-2024-42077</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42079.html">CVE-2024-42079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42080.html">CVE-2024-42080</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42082.html">CVE-2024-42082</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42085.html">CVE-2024-42085</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42086.html">CVE-2024-42086</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42087.html">CVE-2024-42087</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42089.html">CVE-2024-42089</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42090.html">CVE-2024-42090</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42092.html">CVE-2024-42092</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">CVE-2024-42093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42095.html">CVE-2024-42095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">CVE-2024-42096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42097.html">CVE-2024-42097</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42098.html">CVE-2024-42098</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42101.html">CVE-2024-42101</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42104.html">CVE-2024-42104</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42105.html">CVE-2024-42105</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42106.html">CVE-2024-42106</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42107.html">CVE-2024-42107</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42109.html">CVE-2024-42109</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42110.html">CVE-2024-42110</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42113.html">CVE-2024-42113</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42114.html">CVE-2024-42114</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42115.html">CVE-2024-42115</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42117.html">CVE-2024-42117</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42119.html">CVE-2024-42119</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42120.html">CVE-2024-42120</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42121.html">CVE-2024-42121</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42122.html">CVE-2024-42122</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">CVE-2024-42124</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42125.html">CVE-2024-42125</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42126.html">CVE-2024-42126</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42127.html">CVE-2024-42127</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42130.html">CVE-2024-42130</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42131.html">CVE-2024-42131</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42132.html">CVE-2024-42132</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42133.html">CVE-2024-42133</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42136.html">CVE-2024-42136</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42137.html">CVE-2024-42137</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42138.html">CVE-2024-42138</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42139.html">CVE-2024-42139</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42141.html">CVE-2024-42141</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42142.html">CVE-2024-42142</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42143.html">CVE-2024-42143</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42144.html">CVE-2024-42144</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">CVE-2024-42145</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42147.html">CVE-2024-42147</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42148.html">CVE-2024-42148</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42152.html">CVE-2024-42152</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42153.html">CVE-2024-42153</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42155.html">CVE-2024-42155</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42156.html">CVE-2024-42156</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42157.html">CVE-2024-42157</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42158.html">CVE-2024-42158</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42159.html">CVE-2024-42159</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42161.html">CVE-2024-42161</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42162.html">CVE-2024-42162</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42223.html">CVE-2024-42223</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">CVE-2024-42224</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42225.html">CVE-2024-42225</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42226.html">CVE-2024-42226</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42227.html">CVE-2024-42227</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42228.html">CVE-2024-42228</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42229.html">CVE-2024-42229</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42230.html">CVE-2024-42230</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42232.html">CVE-2024-42232</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42236.html">CVE-2024-42236</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42237.html">CVE-2024-42237</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42238.html">CVE-2024-42238</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42239.html">CVE-2024-42239</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42240.html">CVE-2024-42240</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42241.html">CVE-2024-42241</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42244.html">CVE-2024-42244</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42245.html">CVE-2024-42245</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42246.html">CVE-2024-42246</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42247.html">CVE-2024-42247</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42250.html">CVE-2024-42250</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42253.html">CVE-2024-42253</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42259.html">CVE-2024-42259</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42268.html">CVE-2024-42268</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42269.html">CVE-2024-42269</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42270.html">CVE-2024-42270</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42271.html">CVE-2024-42271</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42274.html">CVE-2024-42274</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42276.html">CVE-2024-42276</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42277.html">CVE-2024-42277</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42278.html">CVE-2024-42278</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42279.html">CVE-2024-42279</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42280.html">CVE-2024-42280</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42281.html">CVE-2024-42281</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42283.html">CVE-2024-42283</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42284.html">CVE-2024-42284</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42285.html">CVE-2024-42285</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42286.html">CVE-2024-42286</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42287.html">CVE-2024-42287</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42288.html">CVE-2024-42288</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42289.html">CVE-2024-42289</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42290.html">CVE-2024-42290</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42291.html">CVE-2024-42291</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42292.html">CVE-2024-42292</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42295.html">CVE-2024-42295</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42298.html">CVE-2024-42298</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42301.html">CVE-2024-42301</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42302.html">CVE-2024-42302</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42303.html">CVE-2024-42303</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42308.html">CVE-2024-42308</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42309.html">CVE-2024-42309</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42310.html">CVE-2024-42310</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42311.html">CVE-2024-42311</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42312.html">CVE-2024-42312</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42313.html">CVE-2024-42313</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42314.html">CVE-2024-42314</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42315.html">CVE-2024-42315</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42316.html">CVE-2024-42316</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42318.html">CVE-2024-42318</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42319.html">CVE-2024-42319</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42320.html">CVE-2024-42320</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42322.html">CVE-2024-42322</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43816.html">CVE-2024-43816</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43817.html">CVE-2024-43817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43818.html">CVE-2024-43818</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43819.html">CVE-2024-43819</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43821.html">CVE-2024-43821</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43823.html">CVE-2024-43823</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43824.html">CVE-2024-43824</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43825.html">CVE-2024-43825</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43826.html">CVE-2024-43826</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43829.html">CVE-2024-43829</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43830.html">CVE-2024-43830</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43831.html">CVE-2024-43831</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43833.html">CVE-2024-43833</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43834.html">CVE-2024-43834</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43837.html">CVE-2024-43837</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43839.html">CVE-2024-43839</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43840.html">CVE-2024-43840</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43841.html">CVE-2024-43841</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43842.html">CVE-2024-43842</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43846.html">CVE-2024-43846</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43847.html">CVE-2024-43847</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43849.html">CVE-2024-43849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43850.html">CVE-2024-43850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43851.html">CVE-2024-43851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43853.html">CVE-2024-43853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43854.html">CVE-2024-43854</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43855.html">CVE-2024-43855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43856.html">CVE-2024-43856</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43858.html">CVE-2024-43858</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43860.html">CVE-2024-43860</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43861.html">CVE-2024-43861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43863.html">CVE-2024-43863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43864.html">CVE-2024-43864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43866.html">CVE-2024-43866</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43867.html">CVE-2024-43867</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43871.html">CVE-2024-43871</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43872.html">CVE-2024-43872</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43873.html">CVE-2024-43873</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43874.html">CVE-2024-43874</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43875.html">CVE-2024-43875</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43876.html">CVE-2024-43876</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43877.html">CVE-2024-43877</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43879.html">CVE-2024-43879</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43880.html">CVE-2024-43880</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43881.html">CVE-2024-43881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43882.html">CVE-2024-43882</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43883.html">CVE-2024-43883</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43884.html">CVE-2024-43884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43885.html">CVE-2024-43885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43889.html">CVE-2024-43889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43892.html">CVE-2024-43892</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43893.html">CVE-2024-43893</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43894.html">CVE-2024-43894</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43895.html">CVE-2024-43895</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43897.html">CVE-2024-43897</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43899.html">CVE-2024-43899</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43900.html">CVE-2024-43900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43902.html">CVE-2024-43902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43903.html">CVE-2024-43903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43905.html">CVE-2024-43905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43906.html">CVE-2024-43906</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43907.html">CVE-2024-43907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43908.html">CVE-2024-43908</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43909.html">CVE-2024-43909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43911.html">CVE-2024-43911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43912.html">CVE-2024-43912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44931.html">CVE-2024-44931</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44938.html">CVE-2024-44938</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44939.html">CVE-2024-44939</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52489</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52581</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52885</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52886</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52886</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52887</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52887</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52889</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26590</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26631</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26637</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26677</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26682</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26683</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26691</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26808</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26809</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26835</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26944</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27024</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27049</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27050</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27403</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27433</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27437</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-31076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35854</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35949</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36270</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36270</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36286</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36288</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36489</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36489</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36933</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36970</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36979</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38563</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38563</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38609</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38662</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38662</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39476</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39476</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39483</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39483</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39484</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39484</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39486</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39486</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39488</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39489</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39489</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39491</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39493</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39493</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39497</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39499</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39500</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39501</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39505</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39506</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39506</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39508</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39509</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39510</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39510</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40899</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40904</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40909</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40910</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40911</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40912</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40913</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40916</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40930</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40932</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40934</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40936</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40942</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40943</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40944</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40945</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40954</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40954</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40956</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40956</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40957</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40957</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40958</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40958</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40959</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40959</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40962</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40964</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40967</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40967</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40977</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40977</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40978</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40981</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40982</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40984</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40987</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40988</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40992</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40994</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40995</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40997</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40997</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41000</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41000</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41001</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41001</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41002</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41002</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41007</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41007</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41010</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41011</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41012</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41022</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41022</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41024</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41024</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41025</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41028</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41032</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41035</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41036</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41036</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41037</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41037</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41038</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41038</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41039</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41039</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41040</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41040</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41041</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41045</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41048</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41049</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41049</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41050</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41056</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41057</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41058</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41059</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41060</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41061</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41061</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41062</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41062</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41063</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41064</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41065</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41065</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41066</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41068</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41070</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41071</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41071</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41072</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41074</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41075</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41075</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41076</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41080</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41080</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41081</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41084</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41084</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41087</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41087</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41088</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41088</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41089</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41092</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41092</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41093</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41094</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41094</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41094</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41095</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41096</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41097</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41097</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41098</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41098</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42064</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42069</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42070</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42074</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42074</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42076</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42077</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42077</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42079</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42080</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42080</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42082</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42082</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42085</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42085</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42087</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42090</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42090</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42092</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42093</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42097</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42097</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42098</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42101</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42101</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42104</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42104</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42104</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42105</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42105</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42106</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42107</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42109</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42109</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42113</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42114</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42114</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42119</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42120</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42121</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42122</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42122</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42126</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42127</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42130</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42130</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42131</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42132</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42132</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42133</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42133</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42136</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42136</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42136</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42137</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42137</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42139</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42142</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42143</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42143</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42144</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42144</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42144</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42148</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42148</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42152</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42152</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42153</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42155</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42155</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42155</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">1.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42156</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42156</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42157</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42157</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42158</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42158</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42159</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42159</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42159</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42161</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42162</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42162</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42223</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42223</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42224</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42225</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42225</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42226</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42226</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42227</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42227</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42228</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42228</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42229</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42229</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42230</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42232</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42236</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42237</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42237</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42238</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42238</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42239</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42239</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42240</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42240</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42240</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42241</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42241</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42244</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42244</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42244</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42245</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42245</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42246</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42246</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42247</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42247</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42250</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42250</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42253</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42253</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42253</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42259</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42259</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42259</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42268</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42268</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42269</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42269</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42270</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42270</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42271</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42274</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42274</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42276</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42276</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42277</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42277</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42277</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42278</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42278</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42279</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42280</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42280</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42281</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42283</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42283</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42284</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42284</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42285</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42285</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42286</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42286</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42287</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42287</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42288</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42288</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42289</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42289</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42291</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42292</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42295</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42298</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42298</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42301</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42301</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42302</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42302</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42303</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42308</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42308</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42309</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42309</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42310</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42310</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42311</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42311</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42312</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42313</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42313</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42314</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42314</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42315</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42315</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42316</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42316</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42318</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42319</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42320</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42322</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43816</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43817</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43818</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43818</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43819</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43821</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43821</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43823</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43823</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43824</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43824</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43825</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43826</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43829</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43830</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43831</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43833</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43833</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43834</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43837</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43837</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43839</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43840</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43841</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43842</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43846</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43847</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43853</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43854</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43854</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43856</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43856</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43858</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43858</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43860</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43860</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43861</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43863</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43866</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43867</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43871</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43872</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43872</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43873</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43873</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43874</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43874</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43875</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43876</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43877</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43879</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43880</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43882</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43882</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43884</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43885</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43889</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43892</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43892</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43892</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43893</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43894</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43894</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43894</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43895</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43895</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43895</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43897</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43899</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43900</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43906</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43907</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43908</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43909</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43911</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43912</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44931</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44938</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44939</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">Basesystem
Module 15-SP6</li>

<li class="list-group-item">Development
Tools Module 15-SP6</li>

<li class="list-group-item">Legacy Module
15-SP6</li>

<li class="list-group-item">openSUSE Leap
15.6</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise High Availability Extension 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 15-SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Workstation Extension 15 SP6</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 394 vulnerabilities, contains eight features
and has 85 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP6 kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in
starting tx ba session (bsc#1229827).</li>
<li>CVE-2024-43899: drm/amd/display: Fix null pointer deref in
dcn20_resource.c (bsc#1229754).</li>
<li>CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid
usage. (bsc#1229503)</li>
<li>CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct
objagg_ops (bsc#1229481).</li>
<li>CVE-2024-43866: net/mlx5: Always drain health in shutdown callback
(bsc#1229495).</li>
<li>CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header
context (bsc#1229496).</li>
<li>CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio
(bsc#1229342).</li>
<li>CVE-2024-43854: block: initialize integrity buffer to zero before
writing it to media (bsc#1229345)</li>
<li>CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen
during bwmon_remove (bsc#1229316).</li>
<li>CVE-2024-43839: bna: adjust &#x27;name&#x27; buf size of
bna_tcb and bna_ccb structures (bsc#1229301).</li>
<li>CVE-2024-43837: bpf: Fix updating attached freplace prog in
prog_array map (bsc#1229297).</li>
<li>CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy()
(bsc#1229314)</li>
<li>CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi
(bsc#1229309).</li>
<li>CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference
(bsc#1229315).</li>
<li>CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service
(bsc#1229347)</li>
<li>CVE-2024-42318: landlock: Do not lose track of restrictions on
cred_transfer (bsc#1229351).</li>
<li>CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level()
(bsc#1229353).</li>
<li>CVE-2024-42312: sysctl: always initialize i_uid/i_gid
(bsc#1229357)</li>
<li>CVE-2024-42308: Update DRM patch reference (bsc#1229411)</li>
<li>CVE-2024-42301: dev/parport: fix the array out-of-bounds risk
(bsc#1229407).</li>
<li>CVE-2024-42295: nilfs2: handle inconsistent state in
nilfs_btnode_create_block() (bsc#1229370).</li>
<li>CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters
(bsc#1229374).</li>
<li>CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management
correctly (bsc#1229379).</li>
<li>CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str()
on error (bsc#1229382)</li>
<li>CVE-2024-42283: net: nexthop: Initialize all fields in dumped
nexthops (bsc#1229383)</li>
<li>CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size
(bsc#1229386).</li>
<li>CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en
(bsc#1229409).</li>
<li>CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in
iptable_nat_table_init() (bsc#1229404).</li>
<li>CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in
ip6table_nat_table_init() (bsc#1229402).</li>
<li>CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload
(bsc#1229391).</li>
<li>CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory
accesses (bsc#1228988).</li>
<li>CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection
failure in xs_tcp_setup_socket (bsc#1228989).</li>
<li>CVE-2024-42245: Revert &quot;sched/fair: Make sure to try to
detach at least one movable task&quot; (bsc#1228978).</li>
<li>CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed
(bsc#1228986).</li>
<li>CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
(bsc#1228723).</li>
<li>CVE-2024-42162: gve: Account for stopped queues when reading NIC
stats (bsc#1228706).</li>
<li>CVE-2024-42161: bpf: avoid uninitialized value in
BPF_CORE_READ_BITFIELD (bsc#1228756).</li>
<li>CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys
(bsc#1228754).</li>
<li>CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle
warnings (bsc#1228720).</li>
<li>CVE-2024-42157: s390/pkey: Wipe sensitive data on failure
(bsc#1228727).</li>
<li>CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on
failure (bsc#1228722).</li>
<li>CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys
(bsc#1228733).</li>
<li>CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds
(bsc#1228487).</li>
<li>CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743).</li>
<li>CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed
(bsc#1228491).</li>
<li>CVE-2024-42139: ice: Fix improper extts handling
(bsc#1228503).</li>
<li>CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation
in case of invalid INI file (bsc#1228500).</li>
<li>CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
(bsc#1228705).</li>
<li>CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc
(bsc#1228591).</li>
<li>CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx
interrupts (bsc#1228568).</li>
<li>CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call
netif_rx() from __netif_rx() (bsc#1228501).</li>
<li>CVE-2024-42109: netfilter: nf_tables: unconditionally flush pending
work before notifier (bsc#1228505).</li>
<li>CVE-2024-42107: ice: Do not process extts if PTP is disabled
(bsc#1228494).</li>
<li>CVE-2024-42106: inet_diag: Initialize pad field in struct
inet_diag_req_v2 (bsc#1228493).</li>
<li>CVE-2024-42096: x86: stop playing stack games in profile_pc()
(bsc#1228633).</li>
<li>CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO
level check (bsc#1228446).</li>
<li>CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on
stack (bsc#1228680).</li>
<li>CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model()
(bsc#1228482).</li>
<li>CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush
(bsc#1228672).</li>
<li>CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on
Spectrum-4 systems (bsc#1228457).</li>
<li>CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE
on store to data registers (bsc#1228470).</li>
<li>CVE-2024-41084: cxl/region: Avoid null pointer dereference in region
lookup (bsc#1228472).</li>
<li>CVE-2024-41081: ila: block BH in ila_output()
(bsc#1228617).</li>
<li>CVE-2024-41080: io_uring: fix possible deadlock in
io_register_iowq_max_workers() (bsc#1228616).</li>
<li>CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota
disable failure (bsc#1228655).</li>
<li>CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label
(bsc#1228649).</li>
<li>CVE-2024-41075: cachefiles: add consistency check for copen/cread
(bsc#1228646).</li>
<li>CVE-2024-41074: cachefiles: Set object to close if ondemand_id
&lt; 0 in copen (bsc#1228643).</li>
<li>CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
kvm_spapr_tce_attach_iommu_group() (bsc#1228581).</li>
<li>CVE-2024-41069: ASoC: topology: Fix route memory corruption
(bsc#1228644).</li>
<li>CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure
(bsc#1228579).</li>
<li>CVE-2024-41066: ibmvnic: add tx check to prevent skb leak
(bsc#1228640).</li>
<li>CVE-2024-41064: powerpc/eeh: avoid possible crash when
edev-&gt;pdev changes (bsc#1228599).</li>
<li>CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release
(bsc#1228576).</li>
<li>CVE-2024-41058: cachefiles: fix slab-use-after-free in
fscache_withdraw_volume() (bsc#1228459).</li>
<li>CVE-2024-41057: cachefiles: fix slab-use-after-free in
cachefiles_withdraw_cookie() (bsc#1228462).</li>
<li>CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish
when dropping object (bsc#1228468).</li>
<li>CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid
reuse (bsc#1228499).</li>
<li>CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg
(bsc#1228565).</li>
<li>CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed
packets (bsc#1228530).</li>
<li>CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
(bsc#1228520).</li>
<li>CVE-2024-41040: net/sched: Fix UAF when resolving a clash
(bsc#1228518).</li>
<li>CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant
(bsc#1228496).</li>
<li>CVE-2024-41032: mm: vmalloc: check if a hash-index is in
cpu_possible_mask (bsc#1228460).</li>
<li>CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path
(bsc#1228427).</li>
<li>CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
(bsc#1228409).</li>
<li>CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race
is detected (bsc#1228247).</li>
<li>CVE-2024-41010: bpf: Fix too early release of tcx_entry
(bsc#1228021).</li>
<li>CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf
(bsc#1228020).</li>
<li>CVE-2024-41007: tcp: use signed arithmetic in
tcp_rtx_probe0_timed_out() (bsc#1227863).</li>
<li>CVE-2024-41000: block/ioctl: prefer different overflow check
(bsc#1227867).</li>
<li>CVE-2024-40995: net/sched: act_api: fix possible infinite loop in
tcf_idr_check_alloc() (bsc#1227830).</li>
<li>CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
(bsc#1227829).</li>
<li>CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor
region on teardown (bsc#1227823).</li>
<li>CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute
(bsc#1227929).</li>
<li>CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
xfrm6_get_saddr() (bsc#1227884).</li>
<li>CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net
(bsc#1227812).</li>
<li>CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in
End.DX4 and End.DX6 behaviors (bsc#1227811).</li>
<li>CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in
irq_process_work_list (bsc#1227810).</li>
<li>CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)</li>
<li>CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case
of region creation fail (bsc#1227799).</li>
<li>CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840).</li>
<li>CVE-2024-40921: net: bridge: mst: pass vlan group directly to
br_mst_vlan_set_state (bsc#1227784).</li>
<li>CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in
br_mst_set_state (bsc#1227781).</li>
<li>CVE-2024-40909: bpf: Fix a potential use-after-free in
bpf_link_free() (bsc#1227798).</li>
<li>CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from()
(bsc#1227761)</li>
<li>CVE-2024-39506: liquidio: adjust a NULL pointer handling path in
lio_vf_rep_copy_packet (bsc#1227729).</li>
<li>CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo
(bsc#1227623)</li>
<li>CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating
sockmap/sockhash (bsc#1226885).</li>
<li>CVE-2024-36979: net: bridge: mst: fix vlan use-after-free
(bsc#1226604).</li>
<li>CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).</li>
<li>CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO
skbs (bsc#1225814).</li>
<li>CVE-2024-36911: hv_netvsc: Do not free decrypted memory
(bsc#1225745).</li>
<li>CVE-2024-36910: uio_hv_generic: Do not free decrypted memory
(bsc#1225717).</li>
<li>CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that
couldn&#x27;t be re-encrypted (bsc#1225744).</li>
<li>CVE-2024-36881: mm/userfaultfd: Fix reset ptes when close() for
wr-protected (bsc#1225718).</li>
<li>CVE-2024-36489: tls: fix missing memory barrier in tls_init
(bsc#1226874)</li>
<li>CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock()
in instance_destroy_rcu() (bsc#1226801)</li>
<li>CVE-2024-36270: Fix reference in
patches.suse/netfilter-tproxy-bail-out-if-IP-has-been-disabled-on.patch (bsc#1226798)</li>
<li>CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata
blocks (bsc#1224700).</li>
<li>CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure
(bsc#1224535).</li>
<li>CVE-2024-35897: netfilter: nf_tables: discard table flag update with
pending basechain deletion (bsc#1224510).</li>
<li>CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
(bsc#1222625).</li>
<li>CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error
handling path in clk_mt8135_apmixed_probe() (bsc#1224711).</li>
<li>CVE-2024-27403: kabi: restore const specifier in
flow_offload_route_init() (bsc#1224415).</li>
<li>CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release
(bsc#1223742).</li>
<li>CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down
(bsc#1223777).</li>
<li>CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort
path (bsc#1223803).</li>
<li>CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion
(bsc#1223720).</li>
<li>CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp
length out of range (bsc#1223074)</li>
<li>CVE-2024-26837: net: bridge: switchdev: race between creation of new
group memberships and generation of the list of MDB events to replay (bsc#1222973).</li>
<li>CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook
register failure (bsc#1222967).</li>
<li>CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround
(bsc#1222808).</li>
<li>CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone
only from destroy path (bsc#1222633).</li>
<li>CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER
for inet/ingress basechain (bsc#1222634).</li>
<li>CVE-2024-26735: ipv6: sr: fix possible use-after-free and
null-ptr-deref (bsc#1222372).</li>
<li>CVE-2024-26677: blacklist.conf: Add e7870cf13d20 (&quot;rxrpc:
Fix delayed ACKs to not set the reference serial number&quot;) (bsc#1222387)</li>
<li>CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template
offload (bsc#1222350).</li>
<li>CVE-2024-26668: netfilter: nft_limit: reject configurations that
cause integer overflow (bsc#1222335).</li>
<li>CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down /
mld_ifc_work (bsc#1221630).</li>
<li>CVE-2024-26590: erofs: fix inconsistent per-file compression format
(bsc#1220252).</li>
<li>CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb
during sock creation (bsc#1229287).</li>
<li>CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu
fails (bsc#1225582).</li>
<li>CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255
elements expired (bsc#1220877).</li>
<li>CVE-2023-52489: mm/sparsemem: fix race in accessing
memory_section-&gt;usage (bsc#1221326).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window
(git-fixes).</li>
<li>ACPI: SBS: manage alarm sysfs attribute through psy core
(stable-fixes).</li>
<li>ACPI: battery: create alarm sysfs attribute atomically
(stable-fixes).</li>
<li>ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead()
(git-fixes).</li>
<li>ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4
(stable-fixes).</li>
<li>ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4
(stable-fixes).</li>
<li>ALSA: hda/realtek - Fixed ALC256 headphone no sound
(stable-fixes).</li>
<li>ALSA: hda/realtek - Fixed ALC285 headphone no sound
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to
quirks (stable-fixes).</li>
<li>ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to
quirks (stable-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for new HP G12 laptops
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx
(stable-fixes).</li>
<li>ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7
(git-fixes).</li>
<li>ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3
Ultra (stable-fixes).</li>
<li>ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy
Book3 Pro 360 (stable-fixes).</li>
<li>ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED
(stable-fixes).</li>
<li>ALSA: hda/tas2781: Use correct endian conversion
(git-fixes).</li>
<li>ALSA: hda/tas2781: fix wrong calibrated data order
(git-fixes).</li>
<li>ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list
(stable-fixes).</li>
<li>ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list
(stable-fixes).</li>
<li>ALSA: hda: Conditionally use snooping for AMD HDMI
(git-fixes).</li>
<li>ALSA: hda: conexant: Fix headset auto detect fail in the polling mode
(git-fixes).</li>
<li>ALSA: line6: Fix racy access to midibuf (stable-fixes).</li>
<li>ALSA: line6: Fix racy access to midibuf (stable-fixes).</li>
<li>ALSA: seq: Skip event type filtering for UMP events
(git-fixes).</li>
<li>ALSA: seq: ump: Explicitly reset RPN with Null RPN
(stable-fixes).</li>
<li>ALSA: seq: ump: Optimize conversions from SysEx to UMP
(git-fixes).</li>
<li>ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data
reception (stable-fixes).</li>
<li>ALSA: seq: ump: Use the common RPN/bank conversion context
(stable-fixes).</li>
<li>ALSA: timer: Relax start tick time check for slave timer elements
(git-fixes).</li>
<li>ALSA: ump: Explicitly reset RPN with Null RPN
(stable-fixes).</li>
<li>ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception
(stable-fixes).</li>
<li>ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET
(stable-fixes).</li>
<li>ALSA: usb-audio: Correct surround channels in UAC1 channel map
(git-fixes).</li>
<li>ALSA: usb-audio: Re-add ScratchAmp quirk entries
(git-fixes).</li>
<li>ALSA: usb-audio: Re-add ScratchAmp quirk entries
(git-fixes).</li>
<li>ALSA: usb-audio: Support Yamaha P-125 quirk entry
(stable-fixes).</li>
<li>ALSA: usb: Fix UBSAN warning in parse_audio_unit()
(stable-fixes).</li>
<li>ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending
before suspend (stable-fixes).</li>
<li>ASoC: SOF: Remove libraries from topology lookups
(git-fixes).</li>
<li>ASoC: SOF: Remove libraries from topology lookups
(git-fixes).</li>
<li>ASoC: SOF: amd: Fix for acp init sequence (git-fixes).</li>
<li>ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data
(stable-fixes).</li>
<li>ASoC: SOF: mediatek: Add missing board compatible
(stable-fixes).</li>
<li>ASoC: allow module autoloading for table board_ids
(stable-fixes).</li>
<li>ASoC: allow module autoloading for table db1200_pids
(stable-fixes).</li>
<li>ASoC: amd: acp: fix module autoloading (git-fixes).</li>
<li>ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx
(bsc#1227182).</li>
<li>ASoC: amd: yc: Support mic on HP 14-em0002la
(stable-fixes).</li>
<li>ASoC: amd: yc: Support mic on HP 14-em0002la
(stable-fixes).</li>
<li>ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6
(stable-fixes).</li>
<li>ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6
(stable-fixes).</li>
<li>ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa881x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa881x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa883x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa883x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa884x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: codecs: wsa884x: Correct Soundwire ports mask
(git-fixes).</li>
<li>ASoC: cs35l45: Checks index of cs35l45_irqs[]
(stable-fixes).</li>
<li>ASoC: cs35l56: Handle OTP read latency over SoundWire
(stable-fixes).</li>
<li>ASoC: cs35l56: Handle OTP read latency over SoundWire
(stable-fixes).</li>
<li>ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value
(stable-fixes).</li>
<li>ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value
(stable-fixes).</li>
<li>ASoC: fsl_micfil: Expand the range of FIFO watermark mask
(stable-fixes).</li>
<li>ASoC: fsl_micfil: Expand the range of FIFO watermark mask
(stable-fixes).</li>
<li>ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile
(stable-fixes).</li>
<li>ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT
(git-fixes).</li>
<li>ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT
(git-fixes).</li>
<li>ASoC: nau8822: Lower debug print priority (stable-fixes).</li>
<li>ASoC: nau8822: Lower debug print priority (stable-fixes).</li>
<li>Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio
(stable-fixes).</li>
<li>Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix deadlock (git-fixes).</li>
<li>Bluetooth: MGMT: Add error handling to pair_device()
(git-fixes).</li>
<li>Bluetooth: SMP: Fix assumption of Central always being Initiator
(git-fixes).</li>
<li>Bluetooth: bnep: Fix out-of-bound access (stable-fixes).</li>
<li>Bluetooth: btintel: Fail setup on error (git-fixes).</li>
<li>Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver
unloading (stable-fixes).</li>
<li>Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables
(stable-fixes).</li>
<li>Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591
(stable-fixes).</li>
<li>Bluetooth: hci_conn: Check non NULL function before calling for HFP
offload (stable-fixes).</li>
<li>Bluetooth: hci_core: Fix LE quote calculation (git-fixes).</li>
<li>Bluetooth: hci_core: Fix not handling hibernation actions
(git-fixes).</li>
<li>Bluetooth: hci_sync: Fix suspending with wrong filter policy
(git-fixes).</li>
<li>Bluetooth: hci_sync: avoid dup filtering when passive scanning with
adv monitor (git-fixes).</li>
<li>Bluetooth: l2cap: always unlock channel in l2cap_conless_channel()
(git-fixes).</li>
<li>Drop libata patch that caused a regression (bsc#1229054)</li>
<li>HID: wacom: Defer calculation of resolution until resolution_code is
known (git-fixes).</li>
<li>Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table
(bsc#1229056).</li>
<li>Input: i8042 - add forcenorestore quirk to leave controller untouched
even on s3 (stable-fixes).</li>
<li>Input: i8042 - use new forcenorestore quirk to replace old buggy
quirk combination (stable-fixes).</li>
<li>KVM: Always flush async #PF workqueue when vCPU is being destroyed
(git-fixes).</li>
<li>KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with
KVM_MEM_READONLY (git-fixes).</li>
<li>KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3
(bsc#1194869).</li>
<li>KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with
MSR_EE (bsc#1215199).</li>
<li>KVM: Protect vcpu-&gt;pid dereference via debugfs with RCU
(git-fixes).</li>
<li>KVM: Reject overly excessive IDs in KVM_CREATE_VCPU
(git-fixes).</li>
<li>KVM: Stop processing <em>all</em> memslots when
&quot;null&quot; mmu_notifier handler is found (git-fixes).</li>
<li>KVM: VMX: Move posted interrupt descriptor out of VMX code
(git-fixes).</li>
<li>KVM: VMX: Split out the non-virtualization part of
vmx_interrupt_blocked() (git-fixes).</li>
<li>KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit()
(git-fixes).</li>
<li>KVM: arm64: AArch32: Fix spurious trapping of conditional
instructions (git-fixes).</li>
<li>KVM: arm64: Add missing memory barriers when switching to
pKVM&#x27;s hyp pgd (git-fixes).</li>
<li>KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode
(git-fixes).</li>
<li>KVM: arm64: Fix AArch32 register narrowing on userspace write
(git-fixes).</li>
<li>KVM: arm64: Fix __pkvm_init_switch_pgd call ABI
(git-fixes).</li>
<li>KVM: arm64: Fix clobbered ELR in sync abort/SError
(git-fixes)</li>
<li>KVM: arm64: GICv4: Do not perform a map to a mapped vLPI
(git-fixes).</li>
<li>KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2
(git-fixes).</li>
<li>KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init()
(git-fixes).</li>
<li>KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler
(git-fixes).</li>
<li>KVM: arm64: vgic-its: Test for valid IRQ in
its_sync_lpi_pending_table() (git-fixes).</li>
<li>KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id
(git-fixes).</li>
<li>KVM: arm64: vgic-v4: Restore pending state on host userspace write
(git-fixes).</li>
<li>KVM: arm64: vgic: Add a non-locking primitive for
kvm_vgic_vcpu_destroy() (git-fixes).</li>
<li>KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy
(git-fixes).</li>
<li>KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes).</li>
<li>KVM: fix kvm_mmu_memory_cache allocation warning
(git-fixes).</li>
<li>KVM: nVMX: Add a helper to get highest pending from Posted Interrupt
vector (git-fixes).</li>
<li>KVM: nVMX: Check for pending posted interrupts when looking for
nested events (git-fixes).</li>
<li>KVM: nVMX: Request immediate exit iff pending nested event needs
injection (git-fixes).</li>
<li>KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).</li>
<li>KVM: s390: fix validity interception issue when gisa is switched off
(git-fixes bsc#1229167).</li>
<li>KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE
(git-fixes).</li>
<li>KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID
(git-fixes).</li>
<li>Move upstreamed powerpc patches into sorted section</li>
<li>Move upstreamed sound patches into sorted section</li>
<li>Moved upstreamed ASoC patch into sorted section</li>
<li>NFSD: Support write delegations in LAYOUTGET (git-fixes).</li>
<li>NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server
(git-fixes).</li>
<li>PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes).</li>
<li>PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN
(git-fixes).</li>
<li>PCI: loongson: Enable MSI in LS7A Root Complex
(stable-fixes).</li>
<li>RDMA/cache: Release GID table even if leak is detected
(git-fixes)</li>
<li>RDMA/device: Return error earlier if port in not valid
(git-fixes)</li>
<li>RDMA/hns: Check atomic wr length (git-fixes)</li>
<li>RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)</li>
<li>RDMA/hns: Fix mbx timing out before CMD execution is completed
(git-fixes)</li>
<li>RDMA/hns: Fix missing pagesize and alignment check in FRMR
(git-fixes)</li>
<li>RDMA/hns: Fix shift-out-bounds when max_inline_data is 0
(git-fixes)</li>
<li>RDMA/hns: Fix soft lockup under heavy CEQE load
(git-fixes)</li>
<li>RDMA/hns: Fix undifined behavior caused by invalid max_sge
(git-fixes)</li>
<li>RDMA/hns: Fix unmatch exception handling when init eq table fails
(git-fixes)</li>
<li>RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
(git-fixes)</li>
<li>RDMA/mana_ib: Use virtual address in dma regions for MRs
(git-fixes).</li>
<li>RDMA/mlx4: Fix truncated output warning in alias_GUID.c
(git-fixes)</li>
<li>RDMA/mlx4: Fix truncated output warning in mad.c
(git-fixes)</li>
<li>RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)</li>
<li>RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs
(git-fixes)</li>
<li>RDMA: Fix netdev tracker in ib_device_set_netdev
(git-fixes)</li>
<li>Revert &quot;ALSA: firewire-lib: obsolete workqueue for period
update&quot; (bsc#1208783).</li>
<li>Revert &quot;ALSA: firewire-lib: operate for period elapse event
in process context&quot; (bsc#1208783).</li>
<li>Revert &quot;KVM: Prevent module exit until all VMs are
freed&quot; (git-fixes).</li>
<li>Revert &quot;Revert &quot;md/raid5: Wait for
MD_SB_CHANGE_PENDING in raid5d&quot;&quot; (git-fixes).</li>
<li>Revert &quot;md/raid5: Wait for MD_SB_CHANGE_PENDING in
raid5d&quot; (git-fixes).</li>
<li>Revert &quot;misc: fastrpc: Restrict untrusted app to attach to
privileged PD&quot; (git-fixes).</li>
<li>Revert &quot;mm: prevent derefencing NULL ptr in
pfn_section_valid()&quot; (bsc#1230413).</li>
<li>Revert &quot;mm, kmsan: fix infinite recursion due to RCU
critical section&quot; (bsc#1230413).</li>
<li>Revert &quot;mm/sparsemem: fix race in accessing
memory_section-&gt;usage&quot; (bsc#1230413).</li>
<li>Revert &quot;usb: gadget: uvc: cleanup request when not in
correct state&quot; (stable-fixes).</li>
<li>Revert &quot;usb: typec: tcpm: clear pd_event queue in
PORT_RESET&quot; (git-fixes).</li>
<li>SUNRPC: Fix a race to wake a sync task (git-fixes).</li>
<li>SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).</li>
<li>Squashfs: fix variable overflow triggered by sysbot
(git-fixes).</li>
<li>USB: serial: debug: do not echo input by default
(stable-fixes).</li>
<li>Update config files. Disable CONFIG_KFENCE on ppc64le
(bsc#1226920)</li>
<li>Update config files. Disable vdpa drivers for Alibaba ENI and
SolidNET (jsc#PED-8954, bsc#1227834)</li>
<li>Update patch references for ASoC regression fixes (bsc#1229045,
bsc#1229046)</li>
<li>afs: fix __afs_break_callback() / afs_drop_open_mmap() race
(git-fixes).</li>
<li>apparmor: unpack transition table if dfa is not present
(bsc#1226031).</li>
<li>arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to
(git-fixes)</li>
<li>arm64: Add Neoverse-V2 part (git-fixes)</li>
<li>arm64: Fix KASAN random tag seed initialization
(git-fixes)</li>
<li>arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process
(git-fixes)</li>
<li>arm64: barrier: Restore spec_bar() macro (git-fixes)</li>
<li>arm64: cputype: Add Cortex-A720 definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-A725 definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-X1C definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-X3 definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-X4 definitions (git-fixes)</li>
<li>arm64: cputype: Add Cortex-X925 definitions (git-fixes)</li>
<li>arm64: cputype: Add Neoverse-V3 definitions (git-fixes)</li>
<li>arm64: dts: imx8mp: Add NPU Node (git-fixes)</li>
<li>arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes)</li>
<li>arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes)</li>
<li>arm64: dts: imx8mp: add HDMI power-domains (git-fixes)</li>
<li>arm64: errata: Expand speculative SSBS workaround (again)
(git-fixes)</li>
<li>arm64: errata: Expand speculative SSBS workaround
(git-fixes)</li>
<li>arm64: errata: Unify speculative SSBS errata logic (git-fixes).
Update config files.</li>
<li>arm64: jump_label: Ensure patched jump_labels are visible to all CPUs
(git-fixes)</li>
<li>ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1
(stable-fixes).</li>
<li>ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error
(stable-fixes).</li>
<li>blacklist.conf: Add libata upstream revert entry
(bsc#1229054)</li>
<li>bnxt_re: Fix imm_data endianness (git-fixes)</li>
<li>bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG
(git-fixes)</li>
<li>bpf, lpm: Fix check prefixlen before walking trie
(git-fixes).</li>
<li>bpf/tests: Remove duplicate JSGT tests (git-fixes).</li>
<li>bpf: Add crosstask check to __bpf_get_stack (git-fixes).</li>
<li>bpf: Detect IP == ksym.end as part of BPF program
(git-fixes).</li>
<li>bpf: Ensure proper register state printing for cond jumps
(git-fixes).</li>
<li>bpf: Fix a few selftest failures due to llvm18 change
(git-fixes).</li>
<li>bpf: Fix a kernel verifier crash in stacksafe()
(bsc#1225903).</li>
<li>bpf: Fix check_stack_write_fixed_off() to correctly spill imm
(git-fixes).</li>
<li>bpf: Fix kfunc callback register type handling
(git-fixes).</li>
<li>bpf: Fix prog_array_map_poke_run map poke update
(git-fixes).</li>
<li>bpf: Fix unnecessary -EBUSY from htab_lock_bucket
(git-fixes).</li>
<li>bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly
(git-fixes).</li>
<li>bpf: Remove unnecessary wait from bpf_map_copy_value()
(git-fixes).</li>
<li>bpf: Set uattr-&gt;batch.count as zero before batched update or
deletion (git-fixes).</li>
<li>bpf: do not infer PTR_TO_CTX for programs with unnamed context type
(git-fixes).</li>
<li>bpf: enforce precision of R0 on callback return
(git-fixes).</li>
<li>bpf: extract bpf_ctx_convert_map logic and make it more reusable
(git-fixes).</li>
<li>bpf: fix control-flow graph checking in privileged mode
(git-fixes).</li>
<li>bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX
global arg (git-fixes).</li>
<li>bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes()
(git-fixes).</li>
<li>bpf: kprobe: remove unused declaring of bpf_kprobe_override
(git-fixes).</li>
<li>bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type()
(git-fixes).</li>
<li>bpftool: Align output skeleton ELF code (git-fixes).</li>
<li>bpftool: Fix -Wcast-qual warning (git-fixes).</li>
<li>bpftool: Silence build warning about calloc() (git-fixes).</li>
<li>bpftool: mark orphaned programs during prog show
(git-fixes).</li>
<li>btrfs: add a btrfs_finish_ordered_extent helper
(git-fixes).</li>
<li>btrfs: add a is_data_bbio helper (git-fixes).</li>
<li>btrfs: add an ordered_extent pointer to struct btrfs_bio
(git-fixes).</li>
<li>btrfs: copy dir permission and time when creating a stub subvolume
(bsc#1228321).</li>
<li>btrfs: ensure fast fsync waits for ordered extents after a write
failure (git-fixes).</li>
<li>btrfs: factor out a btrfs_queue_ordered_fn helper
(git-fixes).</li>
<li>btrfs: factor out a can_finish_ordered_extent helper
(git-fixes).</li>
<li>btrfs: fix corruption after buffer fault in during direct IO append
write (git-fixes).</li>
<li>btrfs: fix double inode unlock for direct IO sync writes
(git-fixes).</li>
<li>btrfs: fix extent map use-after-free when adding pages to compressed
bio (git-fixes).</li>
<li>btrfs: fix leak of qgroup extent records after transaction abort
(git-fixes).</li>
<li>btrfs: fix ordered extent split error handling in btrfs_dio_submit_io
(git-fixes).</li>
<li>btrfs: limit write bios to a single ordered extent
(git-fixes).</li>
<li>btrfs: make btrfs_finish_ordered_extent() return void
(git-fixes).</li>
<li>btrfs: merge the two calls to btrfs_add_ordered_extent in
run_delalloc_nocow (git-fixes).</li>
<li>btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io
(git-fixes).</li>
<li>btrfs: open code end_extent_writepage in end_bio_extent_writepage
(git-fixes).</li>
<li>btrfs: pass a btrfs_inode to btrfs_fdatawrite_range()
(git-fixes).</li>
<li>btrfs: pass a btrfs_inode to btrfs_wait_ordered_range()
(git-fixes).</li>
<li>btrfs: pass an ordered_extent to btrfs_reloc_clone_csums
(git-fixes).</li>
<li>btrfs: pass an ordered_extent to btrfs_submit_compressed_write
(git-fixes).</li>
<li>btrfs: remove btrfs_add_ordered_extent (git-fixes).</li>
<li>btrfs: rename err to ret in btrfs_direct_write()
(git-fixes).</li>
<li>btrfs: uninline some static inline helpers from tree-log.h
(git-fixes).</li>
<li>btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx)
(git-fixes).</li>
<li>btrfs: use a btrfs_inode local variable at btrfs_sync_file()
(git-fixes).</li>
<li>btrfs: use bbio-&gt;ordered in btrfs_csum_one_bio
(git-fixes).</li>
<li>btrfs: use btrfs_finish_ordered_extent to complete buffered writes
(git-fixes).</li>
<li>btrfs: use btrfs_finish_ordered_extent to complete compressed writes
(git-fixes).</li>
<li>btrfs: use btrfs_finish_ordered_extent to complete direct writes
(git-fixes).</li>
<li>btrfs: use irq safe locking when running and adding delayed iputs
(git-fixes).</li>
<li>cachefiles, erofs: Fix NULL deref in when cachefiles is not doing
ondemand-mode (bsc#1229245).</li>
<li>cachefiles: add missing lock protection when polling
(bsc#1229256).</li>
<li>cachefiles: add restore command to recover inflight ondemand read
requests (bsc#1229244).</li>
<li>cachefiles: add spin_lock for cachefiles_ondemand_info
(bsc#1229249).</li>
<li>cachefiles: cancel all requests for the object that is being dropped
(bsc#1229255).</li>
<li>cachefiles: defer exposing anon_fd until after copy_to_user()
succeeds (bsc#1229251).</li>
<li>cachefiles: extract ondemand info field from cachefiles_object
(bsc#1229240).</li>
<li>cachefiles: fix slab-use-after-free in
cachefiles_ondemand_daemon_read() (bsc#1229247).</li>
<li>cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd()
(bsc#1229246).</li>
<li>cachefiles: introduce object ondemand state (bsc#1229239).</li>
<li>cachefiles: make on-demand read killable (bsc#1229252).</li>
<li>cachefiles: narrow the scope of triggering EPOLLIN events in ondemand
mode (bsc#1229243).</li>
<li>cachefiles: never get a new anonymous fd if ondemand_id is valid
(bsc#1229250).</li>
<li>cachefiles: propagate errors from vfs_getxattr() to avoid infinite
loop (bsc#1229253).</li>
<li>cachefiles: remove err_put_fd label in
cachefiles_ondemand_daemon_read() (bsc#1229248).</li>
<li>cachefiles: resend an open request if the read request&#x27;s
object is closed (bsc#1229241).</li>
<li>cachefiles: stop sending new request when dropping object
(bsc#1229254).</li>
<li>can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index
erratum (stable-fixes).</li>
<li>can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of
mcp2518fd (stable-fixes).</li>
<li>ceph: periodically flush the cap releases (bsc#1230056).</li>
<li>cgroup/cpuset: Prevent UAF in proc_cpuset_show()
(bsc#1228801).</li>
<li>cgroup: Add annotation for holding namespace_sem in
current_cgns_cgroup_from_root() (bsc#1222254).</li>
<li>cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show()
(bsc#1222254).</li>
<li>cgroup: Make operations on the cgroup root_list RCU safe
(bsc#1222254).</li>
<li>cgroup: Remove unnecessary list_empty() (bsc#1222254).</li>
<li>cgroup: preserve KABI of cgroup_root (bsc#1222254).</li>
<li>char: xillybus: Check USB endpoints when probing device
(git-fixes).</li>
<li>char: xillybus: Do not destroy workqueue from work item running on it
(stable-fixes).</li>
<li>char: xillybus: Refine workqueue handling (git-fixes).</li>
<li>clk: en7523: fix rate divider for slic and spi clocks
(git-fixes).</li>
<li>clk: qcom: Park shared RCGs upon registration (git-fixes).</li>
<li>clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs
(git-fixes).</li>
<li>clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags
(git-fixes).</li>
<li>clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock
(git-fixes).</li>
<li>clk: qcom: gpucc-sa8775p: Park RCG&#x27;s clk source at XO during
disable (git-fixes).</li>
<li>clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON
flags (git-fixes).</li>
<li>clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU
GDSC&#x27;s (git-fixes).</li>
<li>clk: qcom: gpucc-sm8350: Park RCG&#x27;s clk source at XO during
disable (git-fixes).</li>
<li>clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the
error (git-fixes).</li>
<li>clk: visconti: Add bounds-checking coverage for struct
visconti_pll_provider (stable-fixes).</li>
<li>clocksource/drivers/sh_cmt: Address race condition for clock events
(stable-fixes).</li>
<li>cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).</li>
<li>dev/parport: fix the array out-of-bounds risk
(stable-fixes).</li>
<li>device property: Add cleanup.h based fwnode_handle_put() scope based
cleanup (stable-fixes).</li>
<li>dmaengine: dw: Add memory bus width verification
(git-fixes).</li>
<li>dmaengine: dw: Add peripheral bus width verification
(git-fixes).</li>
<li>docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).</li>
<li>driver core: Fix uevent_show() vs driver detach race
(git-fixes).</li>
<li>drm/admgpu: fix dereferencing null pointer context
(stable-fixes).</li>
<li>drm/amd/display: Add delay to improve LTTPR UHBR interop
(stable-fixes).</li>
<li>drm/amd/display: Add null checker before passing variables
(stable-fixes).</li>
<li>drm/amd/display: Adjust cursor position (git-fixes).</li>
<li>drm/amd/display: Check for NULL pointer (stable-fixes).</li>
<li>drm/amd/display: Skip Recompute DSC Params if no Stream on Link
(stable-fixes).</li>
<li>drm/amd/display: avoid using null object of framebuffer
(git-fixes).</li>
<li>drm/amd/display: fix cursor offset on rotation 180
(git-fixes).</li>
<li>drm/amd/display: fix s2idle entry for DCN3.5+
(stable-fixes).</li>
<li>drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr
(stable-fixes).</li>
<li>drm/amdgpu/jpeg2: properly set atomics vmid field
(stable-fixes).</li>
<li>drm/amdgpu/jpeg4: properly set atomics vmid field
(stable-fixes).</li>
<li>drm/amdgpu/pm: Fix the null pointer dereference for smu7
(stable-fixes).</li>
<li>drm/amdgpu/pm: Fix the null pointer dereference in
apply_state_adjust_rules (stable-fixes).</li>
<li>drm/amdgpu/pm: Fix the param type of set_power_profile_mode
(stable-fixes).</li>
<li>drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell
(stable-fixes).</li>
<li>drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1
(git-fixes).</li>
<li>drm/amdgpu: Actually check flags for all context ops
(stable-fixes).</li>
<li>drm/amdgpu: Add lock around VF RLCG interface
(stable-fixes).</li>
<li>drm/amdgpu: Fix the null pointer dereference to ras_manager
(stable-fixes).</li>
<li>drm/amdgpu: Forward soft recovery errors to userspace
(stable-fixes).</li>
<li>drm/amdgpu: Validate TA binary size (stable-fixes).</li>
<li>drm/amdgpu: fix dereference null return value for the function
amdgpu_vm_pt_parent (stable-fixes).</li>
<li>drm/amdgpu: fix potential resource leak warning
(stable-fixes).</li>
<li>drm/amdgpu: reset vm state machine after gpu reset(vram lost)
(stable-fixes).</li>
<li>drm/bridge: analogix_dp: properly handle zero sized AUX transactions
(stable-fixes).</li>
<li>drm/client: fix null pointer dereference in drm_client_modeset_probe
(git-fixes).</li>
<li>drm/dp_mst: Skip CSN if topology probing is not done yet
(stable-fixes).</li>
<li>drm/etnaviv: do not block scheduler when GPU is still active
(stable-fixes).</li>
<li>drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(git-fixes).</li>
<li>drm/i915/gem: Adjust vma offset for framebuffer mmap offset
(stable-fixes).</li>
<li>drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
(git-fixes).</li>
<li>drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes).</li>
<li>drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll()
(git-fixes).</li>
<li>drm/lima: set gp bus_stop bit before hard reset
(stable-fixes).</li>
<li>drm/mediatek/dp: Fix spurious kfree() (git-fixes).</li>
<li>drm/msm/dp: fix the max supported bpp logic (git-fixes).</li>
<li>drm/msm/dp: reset the link phy params before link training
(git-fixes).</li>
<li>drm/msm/dpu: capture snapshot on the first commit_done timeout
(stable-fixes).</li>
<li>drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails
(git-fixes).</li>
<li>drm/msm/dpu: do not play tricks with debug macros
(git-fixes).</li>
<li>drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes).</li>
<li>drm/msm/dpu: move dpu_encoder&#x27;s connector assignment to
atomic_enable() (git-fixes).</li>
<li>drm/msm/dpu: split dpu_encoder_wait_for_event into two functions
(stable-fixes).</li>
<li>drm/msm/dpu: take plane rotation into account for wide planes
(git-fixes).</li>
<li>drm/msm/dpu: try multirect based on mdp clock limits
(stable-fixes).</li>
<li>drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys
(stable-fixes).</li>
<li>drm/msm/mdss: Rename path references to mdp_path
(stable-fixes).</li>
<li>drm/msm/mdss: switch mdss to use devm_of_icc_get()
(stable-fixes).</li>
<li>drm/msm: Reduce fallout of fence signaling vs reclaim hangs
(stable-fixes).</li>
<li>drm/nouveau: prime: fix refcount underflow (git-fixes).</li>
<li>drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels
(stable-fixes).</li>
<li>drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c
(bsc#1229024).</li>
<li>drm/radeon: Remove __counted_by from StateArray.states[]
(git-fixes).</li>
<li>drm/rockchip: vop2: clear afbc en and transform bit for cluster
window at linear mode (stable-fixes).</li>
<li>drm/virtio: Fix type of dma-fence context variable
(git-fixes).</li>
<li>drm/vmwgfx: Fix a deadlock in dma buf fence polling
(git-fixes).</li>
<li>drm/vmwgfx: Fix overlay when using Screen Targets
(git-fixes).</li>
<li>drm/vmwgfx: Fix prime with external buffers (git-fixes).</li>
<li>efi/libstub: Zero initialize heap allocated struct screen_info
(git-fixes).</li>
<li>evm: do not copy up &#x27;security.evm&#x27; xattr
(git-fixes).</li>
<li>firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid
(stable-fixes).</li>
<li>fs/netfs/fscache_cookie: add missing &quot;n_accesses&quot;
check (bsc#1229455).</li>
<li>fuse: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229456).</li>
<li>genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
(git-fixes).</li>
<li>genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware
(git-fixes).</li>
<li>genirq/matrix: Exclude managed interrupts in irq_matrix_allocated()
(git-fixes).</li>
<li>gfs2: setattr_chown: Add missing initialization
(git-fixes).</li>
<li>gpio: mlxbf3: Support shutdown() function (git-fixes).</li>
<li>gpio: prevent potential speculation leaks in gpio_device_get_desc()
(stable-fixes).</li>
<li>gpio: sysfs: extend the critical section for unregistering sysfs
devices (stable-fixes).</li>
<li>gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey
(git-fixes).</li>
<li>hfs: fix to initialize fields of hfs_inode_info after
hfs_alloc_inode() (git-fixes).</li>
<li>hwmon: (ltc2992) Avoid division by zero (stable-fixes).</li>
<li>hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt()
(git-fixes).</li>
<li>hwmon: (pc87360) Bounds check data-&gt;innr usage
(stable-fixes).</li>
<li>i2c: Fix conditional for substituting empty ACPI functions
(stable-fixes).</li>
<li>i2c: Use IS_REACHABLE() for substituting empty ACPI functions
(git-fixes).</li>
<li>i2c: qcom-geni: Add missing clk_disable_unprepare in
geni_i2c_runtime_resume (git-fixes).</li>
<li>i2c: qcom-geni: Add missing geni_icc_disable in
geni_i2c_runtime_resume (git-fixes).</li>
<li>i2c: qcom-geni: Add missing geni_icc_disable in
geni_i2c_runtime_resume (git-fixes).</li>
<li>i2c: riic: avoid potential division by zero
(stable-fixes).</li>
<li>i2c: smbus: Improve handling of stuck alerts (git-fixes).</li>
<li>i2c: smbus: Send alert notifications to all devices if source not
found (git-fixes).</li>
<li>i2c: stm32f7: Add atomic_xfer method to driver
(stable-fixes).</li>
<li>i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer
(stable-fixes).</li>
<li>i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out
(stable-fixes).</li>
<li>i915/perf: Remove code to update PWR_CLK_STATE for gen12
(git-fixes).</li>
<li>ice: Fix NULL pointer access, if PF does not support SRIOV_LAG
(bsc#1228737).</li>
<li>io_uring/advise: support 64-bit lengths (git-fixes).</li>
<li>io_uring: Drop per-ctx dummy_ubuf (git-fixes).</li>
<li>io_uring: Fix probe of disabled operations (git-fixes).</li>
<li>io_uring: fix io_match_task must_hold (git-fixes).</li>
<li>io_uring: tighten task exit cancellations (git-fixes).</li>
<li>iommu/amd: Convert comma to semicolon (git-fixes).</li>
<li>iommu/vt-d: Fix identity map bounds in si_domain_init()
(git-fixes).</li>
<li>iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace()
(git-fixes).</li>
<li>ip6_tunnel: Fix broken GRO (bsc#1229444).</li>
<li>ipv6: sr: fix incorrect unregister order (git-fixes).</li>
<li>irqdomain: Fixed unbalanced fwnode get and put
(git-fixes).</li>
<li>jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes).</li>
<li>jfs: define xtree root and page independently (git-fixes).</li>
<li>jfs: fix null ptr deref in dtInsertEntry (git-fixes).</li>
<li>jump_label: Clarify condition in static_key_fast_inc_not_disabled()
(git-fixes).</li>
<li>jump_label: Fix concurrency issues in static_key_slow_dec()
(git-fixes).</li>
<li>jump_label: Fix the fix, brown paper bags galore
(git-fixes).</li>
<li>jump_label: Simplify and clarify static_key_fast_inc_cpus_locked()
(git-fixes).</li>
<li>kABI fix of: virtio-crypto: handle config changed by work queue
(git-fixes).</li>
<li>kABI workaround for sound core UMP conversion
(stable-fixes).</li>
<li>kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634
git-fixes).</li>
<li>kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS
(git-fixes).</li>
<li>kabi/severities: ignore kABI for FireWire sound local symbols
(bsc#1208783)</li>
<li>kabi: more build fix without patches.kabi (bsc#1226502)</li>
<li>kcov: properly check for softirq context (git-fixes).</li>
<li>kernel-binary.spec.in: Enable klp_symbols on openSUSE Tumbleweed
(boo#1229042). </li>
<li>kernel-binary: generate and install compile_commands.json
(bsc#1228971). </li>
<li>kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to
strscpy() (bsc#1229134).</li>
<li>kernfs: fix false-positive WARN(nr_mmapped) in
kernfs_drain_open_files (git-fixes).</li>
<li>kprobes: Fix to check symbol prefixes correctly
(git-fixes).</li>
<li>kprobes: Prohibit probing on CFI preamble symbol
(git-fixes).</li>
<li>kvm: s390: Reject memory region operations for ucontrol VMs
(git-fixes bsc#1229168).</li>
<li>libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim
API (git-fixes).</li>
<li>libbpf: Apply map_set_def_max_entries() for inner_maps on creation
(git-fixes).</li>
<li>libbpf: Fix faccessat() usage on Android (git-fixes).</li>
<li>libbpf: Use OPTS_SET() macro in bpf_xdp_query()
(git-fixes).</li>
<li>md-cluster: fix hanging issue while a new disk adding
(bsc#1223395).</li>
<li>md-cluster: fix hanging issue while a new disk adding
(bsc#1223395).</li>
<li>md-cluster: fix no recovery job when adding/re-adding a disk
(bsc#1223395).</li>
<li>md-cluster: fix no recovery job when adding/re-adding a disk
(bsc#1223395).</li>
<li>md-cluster: keeping kabi compatibility for upstream commit
35a0a409fa26 (bsc#1223395).</li>
<li>md/md-bitmap: fix writing non bitmap pages (git-fixes).</li>
<li>md/raid1: set max_sectors during early return from choose_slow_rdev()
(git-fixes).</li>
<li>md/raid1: support read error check (git-fixes).</li>
<li>md/raid5: fix deadlock that raid5d() wait for itself to clear
MD_SB_CHANGE_PENDING (git-fixes).</li>
<li>md/raid5: fix spares errors about rcu usage (git-fixes).</li>
<li>md/raid5: recheck if reshape has finished with device_lock held
(git-fixes).</li>
<li>md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl
(git-fixes).</li>
<li>md: add a mddev_add_trace_msg helper (git-fixes).</li>
<li>md: add check for sleepers in md_wakeup_thread()
(git-fixes).</li>
<li>md: change the return value type of md_write_start to void
(git-fixes).</li>
<li>md: do not account sync_io if iostats of the disk is disabled
(git-fixes).</li>
<li>md: do not delete safemode_timer in mddev_suspend
(git-fixes).</li>
<li>md: factor out a helper exceed_read_errors() to check read_errors
(git-fixes).</li>
<li>md: fix a suspicious RCU usage warning (git-fixes).</li>
<li>media: Revert &quot;media: dvb-usb: Fix unexpected infinite loop
in dvb_usb_read_remote_control()&quot; (git-fixes).</li>
<li>media: amphion: Remove lock in s_ctrl callback
(stable-fixes).</li>
<li>media: drivers/media/dvb-core: copy user arrays safely
(stable-fixes).</li>
<li>media: pci: cx23885: check cx23885_vdev_init() return
(stable-fixes).</li>
<li>media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920
(git-fixes).</li>
<li>media: uvcvideo: Disable autosuspend for Insta360 Link
(stable-fixes).</li>
<li>media: uvcvideo: Fix the bandwdith quirk on USB 3.x
(stable-fixes).</li>
<li>media: uvcvideo: Ignore empty TS packets (stable-fixes).</li>
<li>media: uvcvideo: Quirk for invalid dev_sof in Logitech C922
(stable-fixes).</li>
<li>media: xc2028: avoid use-after-free in load_firmware_cb()
(stable-fixes).</li>
<li>memcg: protect concurrent access to mem_cgroup_idr
(git-fixes).</li>
<li>memory: stm32-fmc2-ebi: check regmap_read return value
(stable-fixes).</li>
<li>memory: tegra: Skip SID programming if SID registers are not set
(stable-fixes).</li>
<li>minmax: add a few more MIN_T/MAX_T users (bsc#1229024).</li>
<li>minmax: avoid overly complicated constant expressions in VM code
(bsc#1229024).</li>
<li>minmax: do not use max() in situations that want a C constant
expression (bsc#1229024).</li>
<li>minmax: fix up min3() and max3() too (bsc#1229024).</li>
<li>minmax: improve macro expansion and type checking
(bsc#1229024).</li>
<li>minmax: make generic MIN() and MAX() macros available everywhere
(bsc#1229024).</li>
<li>minmax: simplify and clarify min_t()/max_t() implementation
(bsc#1229024).</li>
<li>minmax: simplify min()/max()/clamp() implementation
(bsc#1229024).</li>
<li>mm, kmsan: fix infinite recursion due to RCU critical section
(git-fixes).</li>
<li>mm: prevent derefencing NULL ptr in pfn_section_valid()
(git-fixes).</li>
<li>mmc: dw_mmc: allow biu and ciu clocks to defer
(git-fixes).</li>
<li>mmc: mmc_test: Fix NULL dereference on allocation failure
(git-fixes).</li>
<li>mmc: mtk-sd: receive cmd8 data when hs400 tuning fail
(git-fixes).</li>
<li>net/iucv: fix the allocation size of iucv_path_table array (git-fixes
bsc#1229451).</li>
<li>net/iucv: fix use after free in iucv_sock_close()
(bsc#1228973).</li>
<li>net/rds: fix possible cp null dereference (git-fixes).</li>
<li>net/sched: initialize noop_qdisc owner (git-fixes).</li>
<li>net: drop bad gso csum_start and offset in virtio_net_hdr
(git-fixes).</li>
<li>net: ethernet: mtk_wed: fix use-after-free panic in
mtk_wed_setup_tc_block_cb() (git-fixes).</li>
<li>net: fix sk_memory_allocated_{add|sub} vs softirqs
(bsc#1228757).</li>
<li>net: mana: Add support for page sizes other than 4KB on ARM64
(jsc#PED-8491 bsc#1226530).</li>
<li>net: mana: Fix RX buf alloc_size alignment and atomic op panic
(bsc#1229086).</li>
<li>net: mana: Fix doorbell out of order violation and avoid unnecessary
doorbell rings (bsc#1229154).</li>
<li>net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response
(git-fixes).</li>
<li>net: missing check virtio (git-fixes).</li>
<li>net: phy: micrel: Fix the KSZ9131 MDI-X status issue
(git-fixes).</li>
<li>net: phy: realtek: add support for RTL8366S Gigabit PHY
(git-fixes).</li>
<li>net: usb: qmi_wwan: fix memory leak for not ip packets
(git-fixes).</li>
<li>net: usb: sr9700: fix uninitialized variable use in sr_mdio_read
(git-fixes).</li>
<li>netfs, fscache: export fscache_put_volume() and add
fscache_try_get_volume() (bsc#1228459 bsc#1228462).</li>
<li>nfc: pn533: Add poll mod list filling check (git-fixes).</li>
<li>nfs: do not invalidate dentries on transient errors
(git-fixes).</li>
<li>nfs: expose /proc/net/sunrpc/nfs in net namespaces
(git-fixes).</li>
<li>nfs: make the rpc_stat per net namespace (git-fixes).</li>
<li>nfs: pass explicit offset/count to trace events
(git-fixes).</li>
<li>nfs: propagate readlink errors in nfs_symlink_filler
(git-fixes).</li>
<li>nouveau/firmware: use dma non-coherent allocator
(git-fixes).</li>
<li>nvme-multipath: find NUMA path only for online numa-node
(git-fixes).</li>
<li>nvme-multipath: implement &quot;queue-depth&quot; iopolicy
(bsc#1227706).</li>
<li>nvme-multipath: prepare for &quot;queue-depth&quot; iopolicy
(bsc#1227706).</li>
<li>nvme-pci: Fix the instructions for disabling power management
(git-fixes).</li>
<li>nvme-pci: add missing condition check for existence of mapped data
(git-fixes).</li>
<li>nvme-pci: do not directly handle subsys reset fallout
(bsc#1220066).</li>
<li>nvme-sysfs: add &#x27;tls_configured_key&#x27; sysfs
attribute (bsc#1221857).</li>
<li>nvme-sysfs: add &#x27;tls_keyring&#x27; attribute
(bsc#1221857).</li>
<li>nvme-tcp: check for invalidated or revoked key
(bsc#1221857).</li>
<li>nvme-tcp: sanitize TLS key handling (bsc#1221857).</li>
<li>nvme: add a newline to the &#x27;tls_key&#x27; sysfs
attribute (bsc#1221857).</li>
<li>nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset
(git-fixes).</li>
<li>nvme: avoid double free special payload (git-fixes).</li>
<li>nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as
EXT_LBA (git-fixes).</li>
<li>nvme: fixup comment for nvme RDMA Provider Type
(git-fixes).</li>
<li>nvme: split off TLS sysfs attributes into a separate group
(bsc#1221857).</li>
<li>nvme: tcp: remove unnecessary goto statement
(bsc#1221857).</li>
<li>nvme_core: scan namespaces asynchronously (bsc#1224105).</li>
<li>nvmet-auth: fix nvmet_auth hash error handling
(git-fixes).</li>
<li>nvmet: always initialize cqe.result (git-fixes).</li>
<li>nvmet: do not return &#x27;reserved&#x27; for empty TSAS
values (git-fixes).</li>
<li>nvmet: fix a possible leak when destroy a ctrl during qp
establishment (git-fixes).</li>
<li>nvmet: make &#x27;tsas&#x27; attribute idempotent for RDMA
(git-fixes).</li>
<li>ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
(bsc#1228410).</li>
<li>padata: Fix possible divide-by-0 panic in padata_mt_helper()
(git-fixes).</li>
<li>perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09
(git-fixes).</li>
<li>pinctrl: mediatek: common-v2: Fix broken bias-disable for
PULL_PU_PD_RSEL_TYPE (git-fixes).</li>
<li>pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins
(git-fixes).</li>
<li>pinctrl: single: fix potential NULL dereference in pcs_get_function()
(git-fixes).</li>
<li>pinctrl: starfive: jh7110: Correct the level trigger configuration of
iev register (git-fixes).</li>
<li>platform/chrome: cros_ec_proto: Lock device when updating MKBP
version (git-fixes).</li>
<li>platform/chrome: cros_ec_proto: Lock device when updating MKBP
version (git-fixes).</li>
<li>platform/surface: aggregator: Fix warning when controller is
destroyed in probe (git-fixes).</li>
<li>platform/x86/amd/hsmp: Add support for ACPI based probing
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Create static func to handle platdev
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Define a struct to hold mailbox regs
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Move hsmp_test to probe
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Remove extra parenthesis and add a space
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: Restructure sysfs group creation
(jsc#PED-8779).</li>
<li>platform/x86/amd/hsmp: switch to use device_add_groups()
(jsc#PED-8779).</li>
<li>platform/x86/intel/ifs: Initialize union ifs_status to zero
(git-fixes).</li>
<li>platform/x86: lg-laptop: fix %s null argument warning
(stable-fixes).</li>
<li>power: supply: axp288_charger: Fix constant_charge_voltage writes
(git-fixes).</li>
<li>power: supply: axp288_charger: Round constant_charge_voltage writes
down (git-fixes).</li>
<li>power: supply: qcom_battmgr: return EAGAIN when firmware service is
not up (git-fixes).</li>
<li>powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for
CONFIG_PCI=n (bsc#1194869).</li>
<li>powerpc/io: Avoid clang null pointer arithmetic warnings
(bsc#1194869).</li>
<li>powerpc/kexec: make the update_cpus_node() function public
(bsc#1194869).</li>
<li>powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP
(bsc#1194869).</li>
<li>powerpc/kexec_file: fix cpus node update to FDT
(bsc#1194869).</li>
<li>powerpc/pseries: Add failure related checks for h_get_mpp and
h_get_ppp (bsc#1194869).</li>
<li>powerpc/pseries: Whitelist dtl slub object for copying to userspace
(bsc#1194869).</li>
<li>powerpc/radix: Move some functions into #ifdef
CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).</li>
<li>powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).</li>
<li>powerpc/xmon: Check cpu id in commands &quot;c#&quot;,
&quot;dp#&quot; and &quot;dx#&quot; (bsc#1194869).</li>
<li>powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap()
(bsc#1194869).</li>
<li>powerpc: xor_vmx: Add &#x27;-mhard-float&#x27; to CFLAGS
(bsc#1194869).</li>
<li>printk/panic: Allow cpu backtraces to be written into ringbuffer
during panic (bsc#1225607).</li>
<li>reiserfs: fix uninit-value in comp_keys (git-fixes).</li>
<li>rtc: nct3018y: fix possible NULL dereference
(stable-fixes).</li>
<li>s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes
bsc#1229171).</li>
<li>s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
bsc#1229173).</li>
<li>s390/dasd: fix error recovery leading to data corruption on ESE
devices (git-fixes bsc#1229452).</li>
<li>s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes
bsc#1229174).</li>
<li>s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes
bsc#1229172).</li>
<li>s390/pci: Refactor arch_setup_msi_irqs() (git-fixes
bsc#1229172).</li>
<li>s390/pkey: harmonize pkey s390 debug feature calls
(bsc#1228720).</li>
<li>s390/pkey: introduce dynamic debugging for pkey
(bsc#1228720).</li>
<li>s390/sclp: Prevent release of buffer in I/O (git-fixes
bsc#1229169).</li>
<li>s390/uv: Panic for set and remove shared access UVC errors (git-fixes
bsc#1229170).</li>
<li>samples/bpf: syscall_tp_user: Fix array out-of-bound access
(git-fixes).</li>
<li>samples/bpf: syscall_tp_user: Rename num_progs into nr_tests
(git-fixes).</li>
<li>sbitmap: use READ_ONCE to access map-&gt;word
(stable-fixes).</li>
<li>scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in
PRLI_ISSUE state (bsc#1228857).</li>
<li>scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is
inactive (bsc#1228857).</li>
<li>scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss
callbk (bsc#1228857).</li>
<li>scsi: lpfc: Fix incorrect request len mbox field when setting
trunking via sysfs (bsc#1228857).</li>
<li>scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
(bsc#1228857).</li>
<li>scsi: lpfc: Relax PRLI issue conditions after GID_FT response
(bsc#1228857).</li>
<li>scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian
macro usages (bsc#1228857).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).</li>
<li>scsi: qla2xxx: Avoid possible run-time warning with long model_num
(bsc#1228850).</li>
<li>scsi: qla2xxx: Complete command early within lock
(bsc#1228850).</li>
<li>scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).</li>
<li>scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).</li>
<li>scsi: qla2xxx: During vport delete send async logout explicitly
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix debugfs output for fw_resource_count
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix flash read failure (bsc#1228850).</li>
<li>scsi: qla2xxx: Fix for possible memory corruption
(bsc#1228850).</li>
<li>scsi: qla2xxx: Fix optrom version displayed in FDMI
(bsc#1228850).</li>
<li>scsi: qla2xxx: Indent help text (bsc#1228850).</li>
<li>scsi: qla2xxx: Reduce fabric scan duplicate code
(bsc#1228850).</li>
<li>scsi: qla2xxx: Remove unused struct
&#x27;scsi_dif_tuple&#x27; (bsc#1228850).</li>
<li>scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
(bsc#1228850).</li>
<li>scsi: qla2xxx: Unable to act on RSCN for port online
(bsc#1228850).</li>
<li>scsi: qla2xxx: Update version to 10.02.09.300-k
(bsc#1228850).</li>
<li>scsi: qla2xxx: Use QP lock to search for bsg
(bsc#1228850).</li>
<li>scsi: qla2xxx: validate nvme_local_port correctly
(bsc#1228850).</li>
<li>selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY
values (git-fixes).</li>
<li>selftests/bpf: Add a test to verify previous stacksafe() fix
(bsc#1225903).</li>
<li>selftests/bpf: Add assert for user stacks in test_task_stack
(git-fixes).</li>
<li>selftests/bpf: Add netkit to tc_redirect selftest
(git-fixes).</li>
<li>selftests/bpf: De-veth-ize the tc_redirect test case
(git-fixes).</li>
<li>selftests/bpf: Disable IPv6 for lwt_redirect test
(git-fixes).</li>
<li>selftests/bpf: Fix erroneous bitmask operation
(git-fixes).</li>
<li>selftests/bpf: Fix issues in setup_classid_environment()
(git-fixes).</li>
<li>selftests/bpf: Fix potential premature unload in bpf_testmod
(git-fixes).</li>
<li>selftests/bpf: Fix pyperf180 compilation failure with clang18
(git-fixes).</li>
<li>selftests/bpf: Fix the flaky tc_redirect_dtime test
(git-fixes).</li>
<li>selftests/bpf: Fix up xdp bonding test wrt feature flags
(git-fixes).</li>
<li>selftests/bpf: Make linked_list failure test more robust
(git-fixes).</li>
<li>selftests/bpf: Relax time_tai test for equal timestamps in
tai_forward (git-fixes).</li>
<li>selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not
available (git-fixes).</li>
<li>selftests/bpf: Wait for the netstamp_needed_key static key to be
turned on (git-fixes).</li>
<li>selftests/bpf: fix RELEASE=1 build for tc_opts
(git-fixes).</li>
<li>selftests/bpf: fix bpf_loop_bench for new callback verification
scheme (git-fixes).</li>
<li>selftests/bpf: fix compiler warnings in RELEASE=1 mode
(git-fixes).</li>
<li>selftests/bpf: satisfy compiler by having explicit return in btf test
(git-fixes).</li>
<li>serial: core: check uartclk for zero to avoid divide by zero
(stable-fixes).</li>
<li>soc: qcom: cmd-db: Map shared memory as WC, not WB
(git-fixes).</li>
<li>soc: qcom: pmic_glink: Actually communicate when remote goes down
(git-fixes).</li>
<li>soundwire: stream: fix programming slave ports for non-continous port
maps (git-fixes).</li>
<li>spi: Add empty versions of ACPI functions (stable-fixes).</li>
<li>spi: microchip-core: fix init function not setting the master and
motorola modes (git-fixes).</li>
<li>spi: microchip-core: switch to use modern name
(stable-fixes).</li>
<li>spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).</li>
<li>spi: spidev: Add missing spi_device_id for bh2228fv
(git-fixes).</li>
<li>squashfs: squashfs_read_data need to check if the length is 0
(git-fixes).</li>
<li>ssb: Fix division by zero issue in ssb_calc_clock_rate
(stable-fixes).</li>
<li>staging: iio: resolver: ad2s1210: fix use before initialization
(stable-fixes).</li>
<li>staging: ks7010: disable bh on tx_dev_lock (stable-fixes).</li>
<li>string.h: Introduce memtostr() and memtostr_pad()
(bsc#1228849).</li>
<li>sunrpc: add a struct rpc_stats arg to rpc_create_args
(git-fixes).</li>
<li>swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files()
(git-fixes).</li>
<li>swiotlb: fix swiotlb_bounce() to do partial sync&#x27;s correctly
(git-fixes).</li>
<li>syscalls: fix compat_sys_io_pgetevents_time64 usage
(git-fixes).</li>
<li>thermal/drivers/broadcom: Fix race between removal and clock disable
(git-fixes).</li>
<li>thermal: bcm2835: Convert to platform remove callback returning void
(stable-fixes).</li>
<li>thunderbolt: Mark XDomain as unplugged when router is removed
(stable-fixes).</li>
<li>tools/perf: Fix perf bench epoll to enable the run when some
CPU&#x27;s are offline (bsc#1227747).</li>
<li>tools/perf: Fix perf bench futex to enable the run when some
CPU&#x27;s are offline (bsc#1227747).</li>
<li>tools/perf: Fix timing issue with parallel threads in perf bench
wake-up-parallel (bsc#1227747).</li>
<li>tools/resolve_btfids: Fix comparison of distinct pointer types
warning in resolve_btfids (git-fixes).</li>
<li>tools/resolve_btfids: Fix cross-compilation to non-host endianness
(git-fixes).</li>
<li>tools/resolve_btfids: Refactor set sorting with types from btf_ids.h
(git-fixes).</li>
<li>tools/resolve_btfids: fix build with musl libc
(git-fixes).</li>
<li>trace/pid_list: Change gfp flags in pid_list_fill_irq()
(git-fixes).</li>
<li>tracing: Return from tracing_buffers_read() if the file has been
closed (bsc#1229136 git-fixes).</li>
<li>tty: atmel_serial: use the correct RTS flag (git-fixes).</li>
<li>tty: serial: fsl_lpuart: mark last busy before uart_add_one_port
(git-fixes).</li>
<li>usb: cdnsp: fix for Link TRB with TC (git-fixes).</li>
<li>usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function
(git-fixes).</li>
<li>usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in
remove_power_attributes() (git-fixes).</li>
<li>usb: dwc3: core: Skip setting event buffers for host only controllers
(stable-fixes).</li>
<li>usb: dwc3: omap: add missing depopulate in probe error path
(git-fixes).</li>
<li>usb: dwc3: st: add missing depopulate in probe error path
(git-fixes).</li>
<li>usb: dwc3: st: fix probed platform device ref count on probe error
path (git-fixes).</li>
<li>usb: gadget: core: Check for unset descriptor (git-fixes).</li>
<li>usb: gadget: fsl: Increase size of name buffer for endpoints
(stable-fixes).</li>
<li>usb: gadget: u_audio: Check return codes from usb_ep_enable and
config_ep_by_speed (git-fixes).</li>
<li>usb: gadget: u_serial: Set start_delayed during suspend
(git-fixes).</li>
<li>usb: gadget: uvc: cleanup request when not in correct state
(stable-fixes).</li>
<li>usb: typec: fsa4480: Add support to swap SBU orientation
(git-fixes).</li>
<li>usb: typec: fsa4480: Check if the chip is really there
(git-fixes).</li>
<li>usb: typec: fsa4480: Relax CHIP_ID check (git-fixes).</li>
<li>usb: typec: fsa4480: add support for Audio Accessory Mode
(git-fixes).</li>
<li>usb: typec: fsa4480: rework mux &amp; switch setup to handle more
states (git-fixes).</li>
<li>usb: vhci-hcd: Do not drop references before new references are
gained (stable-fixes).</li>
<li>vfio/pci: fix potential memory leak in vfio_intx_enable()
(git-fixes).</li>
<li>vhost-scsi: Handle vhost_vq_work_queue failures for events
(git-fixes).</li>
<li>vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler
(git-fixes).</li>
<li>vhost/vsock: always initialize seqpacket_allow
(git-fixes).</li>
<li>vhost: Release worker mutex during flushes (git-fixes).</li>
<li>vhost: Use virtqueue mutex for swapping worker
(git-fixes).</li>
<li>virt: guest_memfd: fix reference leak on hwpoisoned page
(git-fixes).</li>
<li>virtio-crypto: handle config changed by work queue
(git-fixes).</li>
<li>virtio: reenable config if freezing device failed
(git-fixes).</li>
<li>virtio_net: use u64_stats_t infra to avoid data-races
(git-fixes).</li>
<li>virtiofs: forbid newlines in tags (bsc#1229940).</li>
<li>wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup()
(stable-fixes).</li>
<li>wifi: ath12k: fix soft lockup on suspend (git-fixes).</li>
<li>wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion
(git-fixes).</li>
<li>wifi: cfg80211: fix reporting failed MLO links status with
cfg80211_connect_done (git-fixes).</li>
<li>wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).</li>
<li>wifi: mac80211: use monitor sdata with driver only if desired
(git-fixes).</li>
<li>wifi: mwifiex: duplicate static structs used in driver instances
(git-fixes).</li>
<li>wifi: nl80211: disallow setting special AP channel widths
(stable-fixes).</li>
<li>wifi: nl80211: do not give key data to userspace
(stable-fixes).</li>
<li>wifi: rtw88: usb: Fix disconnection after beacon loss
(stable-fixes).</li>
<li>wifi: wfx: repair open network AP mode (git-fixes).</li>
<li>workqueue: Improve scalability of workqueue watchdog touch
(bsc#1193454).</li>
<li>workqueue: wq_watchdog_touch is always called with valid CPU
(bsc#1193454).</li>
<li>x86/asm: Use %c/%n instead of %P operand modifier in asm templates
(git-fixes).</li>
<li>x86/entry/64: Remove obsolete comment on tracing vs. SYSRET
(git-fixes).</li>
<li>x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).</li>
<li>x86/mm: Fix pti_clone_pgtable() alignment assumption
(git-fixes).</li>
<li>x86/mtrr: Check if fixed MTRRs exist before saving them
(git-fixes).</li>
<li>x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks()
(git-fixes).</li>
<li>x86/numa: Fix the address overlap check in numa_fill_memblks()
(git-fixes).</li>
<li>x86/numa: Fix the sort compare func used in numa_fill_memblks()
(git-fixes).</li>
<li>x86/numa: Introduce numa_fill_memblks() (git-fixes).</li>
<li>x86/pci: Skip early E820 check for ECAM region
(git-fixes).</li>
<li>x86/xen: Convert comma to semicolon (git-fixes).</li>
<li>xfs: Fix missing interval for missing_owner in xfs fsmap
(git-fixes).</li>
<li>xfs: Fix the owner setting issue for rmap query in xfs fsmap
(git-fixes).</li>
<li>xfs: allow cross-linking special files without project quota
(git-fixes).</li>
<li>xfs: allow symlinks with short remote targets
(bsc#1229160).</li>
<li>xfs: allow unlinked symlinks and dirs with zero size
(git-fixes).</li>
<li>xfs: attr forks require attr, not attr2 (git-fixes).</li>
<li>xfs: convert comma to semicolon (git-fixes).</li>
<li>xfs: do not use current-&gt;journal_info (git-fixes).</li>
<li>xfs: fix unlink vs cluster buffer instantiation race
(git-fixes).</li>
<li>xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs
(git-fixes).</li>
<li>xfs: journal geometry is not properly bounds checked
(git-fixes).</li>
<li>xfs: match lock mode in xfs_buffered_write_iomap_begin()
(git-fixes).</li>
<li>xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item
recovery (git-fixes).</li>
<li>xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later
(git-fixes).</li>
<li>xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code
(git-fixes).</li>
<li>xfs: use consistent uid/gid when grabbing dquots for inodes
(git-fixes).</li>
<li>xhci: Fix Panther point NULL pointer deref at full-speed
re-enumeration (git-fixes).</li>
<li>xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.6


<br/>
<code>zypper in -t patch SUSE-2024-3383=1
openSUSE-SLE-15.6-2024-3383=1</code>



</li>

<li class="list-group-item">
Basesystem Module 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Basesystem-15-SP6-2024-3383=1</code>



</li>

<li class="list-group-item">
Development Tools Module 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Development-Tools-15-SP6-2024-3383=1</code>



</li>

<li class="list-group-item">
Legacy Module 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Legacy-15-SP6-2024-3383=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Live-Patching-15-SP6-2024-3383=1</code>


<br/>
Please note that this is the initial kernel livepatch
without fixes itself,
this package is later updated by separate standalone
kernel livepatch
updates.


</li>

<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 15 SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HA-15-SP6-2024-3383=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Workstation Extension 15 SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-WE-15-SP6-2024-3383=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.6 (noarch nosrc)
<ul>


<li>kernel-docs-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (noarch)
<ul>


<li>kernel-devel-6.4.0-150600.23.22.1</li>


<li>kernel-macros-6.4.0-150600.23.22.1</li>


<li>kernel-docs-html-6.4.0-150600.23.22.1</li>


<li>kernel-source-6.4.0-150600.23.22.1</li>


<li>kernel-source-vanilla-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (nosrc ppc64le x86_64)
<ul>


<li>kernel-debug-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (ppc64le x86_64)
<ul>


<li>kernel-debug-livepatch-devel-6.4.0-150600.23.22.1</li>


<li>kernel-debug-devel-6.4.0-150600.23.22.1</li>


<li>kernel-debug-debugsource-6.4.0-150600.23.22.1</li>


<li>kernel-debug-devel-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-debug-debuginfo-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (x86_64)
<ul>


<li>kernel-debug-vdso-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-debug-vdso-6.4.0-150600.23.22.1</li>


<li>kernel-default-vdso-6.4.0-150600.23.22.1</li>


<li>kernel-kvmsmall-vdso-6.4.0-150600.23.22.1</li>


<li>kernel-default-vdso-debuginfo-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
<ul>


<li>kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3</li>


<li>kernel-kvmsmall-devel-6.4.0-150600.23.22.1</li>


<li>kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.22.1</li>


<li>kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-kvmsmall-debugsource-6.4.0-150600.23.22.1</li>


<li>kernel-kvmsmall-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-base-rebuild-6.4.0-150600.23.22.1.150600.12.8.3</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
<ul>


<li>kernel-syms-6.4.0-150600.23.22.1</li>


<li>kernel-default-extra-6.4.0-150600.23.22.1</li>


<li>cluster-md-kmp-default-6.4.0-150600.23.22.1</li>


<li>dlm-kmp-default-6.4.0-150600.23.22.1</li>


<li>kernel-default-optional-6.4.0-150600.23.22.1</li>


<li>kernel-obs-build-debugsource-6.4.0-150600.23.22.1</li>


<li>kernel-default-livepatch-6.4.0-150600.23.22.1</li>


<li>ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-livepatch-devel-6.4.0-150600.23.22.1</li>


<li>reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-optional-debuginfo-6.4.0-150600.23.22.1</li>


<li>kselftests-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-devel-debuginfo-6.4.0-150600.23.22.1</li>


<li>kselftests-kmp-default-6.4.0-150600.23.22.1</li>


<li>ocfs2-kmp-default-6.4.0-150600.23.22.1</li>


<li>kernel-obs-build-6.4.0-150600.23.22.1</li>


<li>cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-extra-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-devel-6.4.0-150600.23.22.1</li>


<li>dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>gfs2-kmp-default-6.4.0-150600.23.22.1</li>


<li>gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>reiserfs-kmp-default-6.4.0-150600.23.22.1</li>


<li>kernel-obs-qa-6.4.0-150600.23.22.1</li>


<li>kernel-default-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>


<li>kernel-default-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
<ul>


<li>kernel-kvmsmall-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (ppc64le s390x x86_64)
<ul>


<li>kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3</li>


<li>kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3</li>


<li>kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (nosrc s390x)
<ul>


<li>kernel-zfcpdump-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (s390x)
<ul>


<li>kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (nosrc)
<ul>


<li>dtb-aarch64-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (aarch64)
<ul>


<li>kernel-64kb-extra-6.4.0-150600.23.22.1</li>


<li>kselftests-kmp-64kb-6.4.0-150600.23.22.1</li>

<li>dtb-apple-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1</li>


<li>dlm-kmp-64kb-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-debugsource-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-debuginfo-6.4.0-150600.23.22.1</li>

<li>dtb-arm-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-optional-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-extra-debuginfo-6.4.0-150600.23.22.1</li>


<li>dtb-allwinner-6.4.0-150600.23.22.1</li>


<li>dtb-broadcom-6.4.0-150600.23.22.1</li>

<li>dtb-qcom-6.4.0-150600.23.22.1</li>

<li>dtb-amd-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-livepatch-devel-6.4.0-150600.23.22.1</li>


<li>ocfs2-kmp-64kb-6.4.0-150600.23.22.1</li>


<li>dtb-amazon-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-devel-6.4.0-150600.23.22.1</li>


<li>dtb-hisilicon-6.4.0-150600.23.22.1</li>


<li>gfs2-kmp-64kb-6.4.0-150600.23.22.1</li>


<li>cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li>


<li>dlm-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li>


<li>dtb-renesas-6.4.0-150600.23.22.1</li>

<li>dtb-sprd-6.4.0-150600.23.22.1</li>


<li>dtb-nvidia-6.4.0-150600.23.22.1</li>

<li>dtb-apm-6.4.0-150600.23.22.1</li>


<li>ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li>


<li>gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li>


<li>dtb-altera-6.4.0-150600.23.22.1</li>


<li>dtb-amlogic-6.4.0-150600.23.22.1</li>

<li>dtb-lg-6.4.0-150600.23.22.1</li>


<li>dtb-xilinx-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-optional-debuginfo-6.4.0-150600.23.22.1</li>


<li>dtb-marvell-6.4.0-150600.23.22.1</li>


<li>reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li>


<li>dtb-freescale-6.4.0-150600.23.22.1</li>


<li>dtb-cavium-6.4.0-150600.23.22.1</li>


<li>cluster-md-kmp-64kb-6.4.0-150600.23.22.1</li>


<li>kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li>


<li>dtb-rockchip-6.4.0-150600.23.22.1</li>


<li>dtb-mediatek-6.4.0-150600.23.22.1</li>


<li>reiserfs-kmp-64kb-6.4.0-150600.23.22.1</li>


<li>dtb-exynos-6.4.0-150600.23.22.1</li>


<li>dtb-socionext-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (aarch64 nosrc)
<ul>


<li>kernel-64kb-6.4.0-150600.23.22.1</li>

</ul>
</li>



<li>
Basesystem Module 15-SP6 (aarch64 nosrc)
<ul>


<li>kernel-64kb-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Basesystem Module 15-SP6 (aarch64)
<ul>


<li>kernel-64kb-debugsource-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-devel-6.4.0-150600.23.22.1</li>


<li>kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64
nosrc)
<ul>


<li>kernel-default-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
<ul>


<li>kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3</li>

</ul>
</li>

<li>
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>


<li>kernel-default-devel-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-devel-6.4.0-150600.23.22.1</li>


<li>kernel-default-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Basesystem Module 15-SP6 (noarch)
<ul>


<li>kernel-devel-6.4.0-150600.23.22.1</li>


<li>kernel-macros-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Basesystem Module 15-SP6 (nosrc s390x)
<ul>


<li>kernel-zfcpdump-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Basesystem Module 15-SP6 (s390x)
<ul>


<li>kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>



<li>
Development Tools Module 15-SP6 (noarch nosrc)
<ul>


<li>kernel-docs-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Development Tools Module 15-SP6 (aarch64 ppc64le s390x
x86_64)
<ul>


<li>kernel-obs-build-6.4.0-150600.23.22.1</li>


<li>kernel-syms-6.4.0-150600.23.22.1</li>


<li>kernel-obs-build-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Development Tools Module 15-SP6 (noarch)
<ul>


<li>kernel-source-6.4.0-150600.23.22.1</li>

</ul>
</li>



<li>
Legacy Module 15-SP6 (nosrc)
<ul>


<li>kernel-default-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>


<li>reiserfs-kmp-default-6.4.0-150600.23.22.1</li>


<li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
<ul>


<li>kernel-default-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x
x86_64)
<ul>


<li>kernel-default-livepatch-6.4.0-150600.23.22.1</li>


<li>kernel-default-livepatch-devel-6.4.0-150600.23.22.1</li>


<li>kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3</li>


<li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3</li>


<li>kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3</li>


<li>kernel-default-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Availability Extension 15 SP6
(aarch64 ppc64le s390x x86_64)
<ul>


<li>ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>gfs2-kmp-default-6.4.0-150600.23.22.1</li>


<li>gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>ocfs2-kmp-default-6.4.0-150600.23.22.1</li>


<li>cluster-md-kmp-default-6.4.0-150600.23.22.1</li>


<li>dlm-kmp-default-6.4.0-150600.23.22.1</li>


<li>kernel-default-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Availability Extension 15 SP6
(nosrc)
<ul>


<li>kernel-default-6.4.0-150600.23.22.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
<ul>


<li>kernel-default-6.4.0-150600.23.22.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
<ul>


<li>kernel-default-extra-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li>


<li>kernel-default-extra-6.4.0-150600.23.22.1</li>


<li>kernel-default-debugsource-6.4.0-150600.23.22.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52489.html">https://www.suse.com/security/cve/CVE-2023-52489.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52581.html">https://www.suse.com/security/cve/CVE-2023-52581.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52668.html">https://www.suse.com/security/cve/CVE-2023-52668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52688.html">https://www.suse.com/security/cve/CVE-2023-52688.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52735.html">https://www.suse.com/security/cve/CVE-2023-52735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52859.html">https://www.suse.com/security/cve/CVE-2023-52859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52885.html">https://www.suse.com/security/cve/CVE-2023-52885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52886.html">https://www.suse.com/security/cve/CVE-2023-52886.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52887.html">https://www.suse.com/security/cve/CVE-2023-52887.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52889.html">https://www.suse.com/security/cve/CVE-2023-52889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26590.html">https://www.suse.com/security/cve/CVE-2024-26590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26631.html">https://www.suse.com/security/cve/CVE-2024-26631.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26637.html">https://www.suse.com/security/cve/CVE-2024-26637.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26668.html">https://www.suse.com/security/cve/CVE-2024-26668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26669.html">https://www.suse.com/security/cve/CVE-2024-26669.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26677.html">https://www.suse.com/security/cve/CVE-2024-26677.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26682.html">https://www.suse.com/security/cve/CVE-2024-26682.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26683.html">https://www.suse.com/security/cve/CVE-2024-26683.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26691.html">https://www.suse.com/security/cve/CVE-2024-26691.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26735.html">https://www.suse.com/security/cve/CVE-2024-26735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26808.html">https://www.suse.com/security/cve/CVE-2024-26808.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26809.html">https://www.suse.com/security/cve/CVE-2024-26809.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26812.html">https://www.suse.com/security/cve/CVE-2024-26812.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26835.html">https://www.suse.com/security/cve/CVE-2024-26835.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26837.html">https://www.suse.com/security/cve/CVE-2024-26837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26849.html">https://www.suse.com/security/cve/CVE-2024-26849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26851.html">https://www.suse.com/security/cve/CVE-2024-26851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26889.html">https://www.suse.com/security/cve/CVE-2024-26889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26944.html">https://www.suse.com/security/cve/CVE-2024-26944.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26976.html">https://www.suse.com/security/cve/CVE-2024-26976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27010.html">https://www.suse.com/security/cve/CVE-2024-27010.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27011.html">https://www.suse.com/security/cve/CVE-2024-27011.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27024.html">https://www.suse.com/security/cve/CVE-2024-27024.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27049.html">https://www.suse.com/security/cve/CVE-2024-27049.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27050.html">https://www.suse.com/security/cve/CVE-2024-27050.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27079.html">https://www.suse.com/security/cve/CVE-2024-27079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27403.html">https://www.suse.com/security/cve/CVE-2024-27403.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27433.html">https://www.suse.com/security/cve/CVE-2024-27433.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27437.html">https://www.suse.com/security/cve/CVE-2024-27437.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-31076.html">https://www.suse.com/security/cve/CVE-2024-31076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35854.html">https://www.suse.com/security/cve/CVE-2024-35854.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35855.html">https://www.suse.com/security/cve/CVE-2024-35855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35897.html">https://www.suse.com/security/cve/CVE-2024-35897.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35902.html">https://www.suse.com/security/cve/CVE-2024-35902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35913.html">https://www.suse.com/security/cve/CVE-2024-35913.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35939.html">https://www.suse.com/security/cve/CVE-2024-35939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35949.html">https://www.suse.com/security/cve/CVE-2024-35949.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36270.html">https://www.suse.com/security/cve/CVE-2024-36270.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36286.html">https://www.suse.com/security/cve/CVE-2024-36286.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36288.html">https://www.suse.com/security/cve/CVE-2024-36288.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36489.html">https://www.suse.com/security/cve/CVE-2024-36489.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36881.html">https://www.suse.com/security/cve/CVE-2024-36881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36907.html">https://www.suse.com/security/cve/CVE-2024-36907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36909.html">https://www.suse.com/security/cve/CVE-2024-36909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36910.html">https://www.suse.com/security/cve/CVE-2024-36910.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36911.html">https://www.suse.com/security/cve/CVE-2024-36911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36929.html">https://www.suse.com/security/cve/CVE-2024-36929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36933.html">https://www.suse.com/security/cve/CVE-2024-36933.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36939.html">https://www.suse.com/security/cve/CVE-2024-36939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36970.html">https://www.suse.com/security/cve/CVE-2024-36970.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36979.html">https://www.suse.com/security/cve/CVE-2024-36979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38548.html">https://www.suse.com/security/cve/CVE-2024-38548.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38563.html">https://www.suse.com/security/cve/CVE-2024-38563.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38609.html">https://www.suse.com/security/cve/CVE-2024-38609.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38662.html">https://www.suse.com/security/cve/CVE-2024-38662.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39476.html">https://www.suse.com/security/cve/CVE-2024-39476.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39483.html">https://www.suse.com/security/cve/CVE-2024-39483.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39484.html">https://www.suse.com/security/cve/CVE-2024-39484.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39486.html">https://www.suse.com/security/cve/CVE-2024-39486.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39488.html">https://www.suse.com/security/cve/CVE-2024-39488.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39489.html">https://www.suse.com/security/cve/CVE-2024-39489.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39491.html">https://www.suse.com/security/cve/CVE-2024-39491.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39493.html">https://www.suse.com/security/cve/CVE-2024-39493.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39497.html">https://www.suse.com/security/cve/CVE-2024-39497.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39499.html">https://www.suse.com/security/cve/CVE-2024-39499.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39500.html">https://www.suse.com/security/cve/CVE-2024-39500.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39501.html">https://www.suse.com/security/cve/CVE-2024-39501.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39505.html">https://www.suse.com/security/cve/CVE-2024-39505.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39506.html">https://www.suse.com/security/cve/CVE-2024-39506.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39508.html">https://www.suse.com/security/cve/CVE-2024-39508.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39509.html">https://www.suse.com/security/cve/CVE-2024-39509.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39510.html">https://www.suse.com/security/cve/CVE-2024-39510.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40899.html">https://www.suse.com/security/cve/CVE-2024-40899.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40900.html">https://www.suse.com/security/cve/CVE-2024-40900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40902.html">https://www.suse.com/security/cve/CVE-2024-40902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40903.html">https://www.suse.com/security/cve/CVE-2024-40903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40904.html">https://www.suse.com/security/cve/CVE-2024-40904.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40905.html">https://www.suse.com/security/cve/CVE-2024-40905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40909.html">https://www.suse.com/security/cve/CVE-2024-40909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40910.html">https://www.suse.com/security/cve/CVE-2024-40910.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40911.html">https://www.suse.com/security/cve/CVE-2024-40911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40912.html">https://www.suse.com/security/cve/CVE-2024-40912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40913.html">https://www.suse.com/security/cve/CVE-2024-40913.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40916.html">https://www.suse.com/security/cve/CVE-2024-40916.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40920.html">https://www.suse.com/security/cve/CVE-2024-40920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40921.html">https://www.suse.com/security/cve/CVE-2024-40921.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40922.html">https://www.suse.com/security/cve/CVE-2024-40922.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40924.html">https://www.suse.com/security/cve/CVE-2024-40924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40926.html">https://www.suse.com/security/cve/CVE-2024-40926.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40927.html">https://www.suse.com/security/cve/CVE-2024-40927.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40929.html">https://www.suse.com/security/cve/CVE-2024-40929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40930.html">https://www.suse.com/security/cve/CVE-2024-40930.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40932.html">https://www.suse.com/security/cve/CVE-2024-40932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40934.html">https://www.suse.com/security/cve/CVE-2024-40934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40936.html">https://www.suse.com/security/cve/CVE-2024-40936.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40938.html">https://www.suse.com/security/cve/CVE-2024-40938.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40939.html">https://www.suse.com/security/cve/CVE-2024-40939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40941.html">https://www.suse.com/security/cve/CVE-2024-40941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40942.html">https://www.suse.com/security/cve/CVE-2024-40942.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40943.html">https://www.suse.com/security/cve/CVE-2024-40943.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40944.html">https://www.suse.com/security/cve/CVE-2024-40944.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40945.html">https://www.suse.com/security/cve/CVE-2024-40945.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40954.html">https://www.suse.com/security/cve/CVE-2024-40954.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40956.html">https://www.suse.com/security/cve/CVE-2024-40956.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40957.html">https://www.suse.com/security/cve/CVE-2024-40957.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40958.html">https://www.suse.com/security/cve/CVE-2024-40958.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40959.html">https://www.suse.com/security/cve/CVE-2024-40959.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40962.html">https://www.suse.com/security/cve/CVE-2024-40962.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40964.html">https://www.suse.com/security/cve/CVE-2024-40964.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40967.html">https://www.suse.com/security/cve/CVE-2024-40967.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40976.html">https://www.suse.com/security/cve/CVE-2024-40976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40977.html">https://www.suse.com/security/cve/CVE-2024-40977.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40978.html">https://www.suse.com/security/cve/CVE-2024-40978.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40981.html">https://www.suse.com/security/cve/CVE-2024-40981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40982.html">https://www.suse.com/security/cve/CVE-2024-40982.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40984.html">https://www.suse.com/security/cve/CVE-2024-40984.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40987.html">https://www.suse.com/security/cve/CVE-2024-40987.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40988.html">https://www.suse.com/security/cve/CVE-2024-40988.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40989.html">https://www.suse.com/security/cve/CVE-2024-40989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40990.html">https://www.suse.com/security/cve/CVE-2024-40990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40992.html">https://www.suse.com/security/cve/CVE-2024-40992.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40994.html">https://www.suse.com/security/cve/CVE-2024-40994.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40995.html">https://www.suse.com/security/cve/CVE-2024-40995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40997.html">https://www.suse.com/security/cve/CVE-2024-40997.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41000.html">https://www.suse.com/security/cve/CVE-2024-41000.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41001.html">https://www.suse.com/security/cve/CVE-2024-41001.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41002.html">https://www.suse.com/security/cve/CVE-2024-41002.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41004.html">https://www.suse.com/security/cve/CVE-2024-41004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41007.html">https://www.suse.com/security/cve/CVE-2024-41007.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41009.html">https://www.suse.com/security/cve/CVE-2024-41009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41010.html">https://www.suse.com/security/cve/CVE-2024-41010.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41011.html">https://www.suse.com/security/cve/CVE-2024-41011.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41012.html">https://www.suse.com/security/cve/CVE-2024-41012.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41015.html">https://www.suse.com/security/cve/CVE-2024-41015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41020.html">https://www.suse.com/security/cve/CVE-2024-41020.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41022.html">https://www.suse.com/security/cve/CVE-2024-41022.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41024.html">https://www.suse.com/security/cve/CVE-2024-41024.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41025.html">https://www.suse.com/security/cve/CVE-2024-41025.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41028.html">https://www.suse.com/security/cve/CVE-2024-41028.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41032.html">https://www.suse.com/security/cve/CVE-2024-41032.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41035.html">https://www.suse.com/security/cve/CVE-2024-41035.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41036.html">https://www.suse.com/security/cve/CVE-2024-41036.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41037.html">https://www.suse.com/security/cve/CVE-2024-41037.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41038.html">https://www.suse.com/security/cve/CVE-2024-41038.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41039.html">https://www.suse.com/security/cve/CVE-2024-41039.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41040.html">https://www.suse.com/security/cve/CVE-2024-41040.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41041.html">https://www.suse.com/security/cve/CVE-2024-41041.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41044.html">https://www.suse.com/security/cve/CVE-2024-41044.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41045.html">https://www.suse.com/security/cve/CVE-2024-41045.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41048.html">https://www.suse.com/security/cve/CVE-2024-41048.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41049.html">https://www.suse.com/security/cve/CVE-2024-41049.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41050.html">https://www.suse.com/security/cve/CVE-2024-41050.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41051.html">https://www.suse.com/security/cve/CVE-2024-41051.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41056.html">https://www.suse.com/security/cve/CVE-2024-41056.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41057.html">https://www.suse.com/security/cve/CVE-2024-41057.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41058.html">https://www.suse.com/security/cve/CVE-2024-41058.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41059.html">https://www.suse.com/security/cve/CVE-2024-41059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41060.html">https://www.suse.com/security/cve/CVE-2024-41060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41061.html">https://www.suse.com/security/cve/CVE-2024-41061.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41062.html">https://www.suse.com/security/cve/CVE-2024-41062.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41063.html">https://www.suse.com/security/cve/CVE-2024-41063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41064.html">https://www.suse.com/security/cve/CVE-2024-41064.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41065.html">https://www.suse.com/security/cve/CVE-2024-41065.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41066.html">https://www.suse.com/security/cve/CVE-2024-41066.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41068.html">https://www.suse.com/security/cve/CVE-2024-41068.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41069.html">https://www.suse.com/security/cve/CVE-2024-41069.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41070.html">https://www.suse.com/security/cve/CVE-2024-41070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41071.html">https://www.suse.com/security/cve/CVE-2024-41071.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41072.html">https://www.suse.com/security/cve/CVE-2024-41072.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41073.html">https://www.suse.com/security/cve/CVE-2024-41073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41074.html">https://www.suse.com/security/cve/CVE-2024-41074.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41075.html">https://www.suse.com/security/cve/CVE-2024-41075.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41076.html">https://www.suse.com/security/cve/CVE-2024-41076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41078.html">https://www.suse.com/security/cve/CVE-2024-41078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41079.html">https://www.suse.com/security/cve/CVE-2024-41079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41080.html">https://www.suse.com/security/cve/CVE-2024-41080.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41081.html">https://www.suse.com/security/cve/CVE-2024-41081.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41084.html">https://www.suse.com/security/cve/CVE-2024-41084.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41087.html">https://www.suse.com/security/cve/CVE-2024-41087.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41088.html">https://www.suse.com/security/cve/CVE-2024-41088.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41089.html">https://www.suse.com/security/cve/CVE-2024-41089.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41092.html">https://www.suse.com/security/cve/CVE-2024-41092.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41093.html">https://www.suse.com/security/cve/CVE-2024-41093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41094.html">https://www.suse.com/security/cve/CVE-2024-41094.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41095.html">https://www.suse.com/security/cve/CVE-2024-41095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41096.html">https://www.suse.com/security/cve/CVE-2024-41096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41097.html">https://www.suse.com/security/cve/CVE-2024-41097.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41098.html">https://www.suse.com/security/cve/CVE-2024-41098.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42064.html">https://www.suse.com/security/cve/CVE-2024-42064.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42069.html">https://www.suse.com/security/cve/CVE-2024-42069.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42070.html">https://www.suse.com/security/cve/CVE-2024-42070.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42073.html">https://www.suse.com/security/cve/CVE-2024-42073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42074.html">https://www.suse.com/security/cve/CVE-2024-42074.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42076.html">https://www.suse.com/security/cve/CVE-2024-42076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42077.html">https://www.suse.com/security/cve/CVE-2024-42077.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42079.html">https://www.suse.com/security/cve/CVE-2024-42079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42080.html">https://www.suse.com/security/cve/CVE-2024-42080.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42082.html">https://www.suse.com/security/cve/CVE-2024-42082.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42085.html">https://www.suse.com/security/cve/CVE-2024-42085.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42086.html">https://www.suse.com/security/cve/CVE-2024-42086.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42087.html">https://www.suse.com/security/cve/CVE-2024-42087.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42089.html">https://www.suse.com/security/cve/CVE-2024-42089.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42090.html">https://www.suse.com/security/cve/CVE-2024-42090.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42092.html">https://www.suse.com/security/cve/CVE-2024-42092.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42093.html">https://www.suse.com/security/cve/CVE-2024-42093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42095.html">https://www.suse.com/security/cve/CVE-2024-42095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42096.html">https://www.suse.com/security/cve/CVE-2024-42096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42097.html">https://www.suse.com/security/cve/CVE-2024-42097.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42098.html">https://www.suse.com/security/cve/CVE-2024-42098.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42101.html">https://www.suse.com/security/cve/CVE-2024-42101.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42104.html">https://www.suse.com/security/cve/CVE-2024-42104.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42105.html">https://www.suse.com/security/cve/CVE-2024-42105.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42106.html">https://www.suse.com/security/cve/CVE-2024-42106.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42107.html">https://www.suse.com/security/cve/CVE-2024-42107.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42109.html">https://www.suse.com/security/cve/CVE-2024-42109.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42110.html">https://www.suse.com/security/cve/CVE-2024-42110.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42113.html">https://www.suse.com/security/cve/CVE-2024-42113.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42114.html">https://www.suse.com/security/cve/CVE-2024-42114.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42115.html">https://www.suse.com/security/cve/CVE-2024-42115.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42117.html">https://www.suse.com/security/cve/CVE-2024-42117.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42119.html">https://www.suse.com/security/cve/CVE-2024-42119.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42120.html">https://www.suse.com/security/cve/CVE-2024-42120.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42121.html">https://www.suse.com/security/cve/CVE-2024-42121.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42122.html">https://www.suse.com/security/cve/CVE-2024-42122.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42124.html">https://www.suse.com/security/cve/CVE-2024-42124.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42125.html">https://www.suse.com/security/cve/CVE-2024-42125.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42126.html">https://www.suse.com/security/cve/CVE-2024-42126.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42127.html">https://www.suse.com/security/cve/CVE-2024-42127.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42130.html">https://www.suse.com/security/cve/CVE-2024-42130.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42131.html">https://www.suse.com/security/cve/CVE-2024-42131.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42132.html">https://www.suse.com/security/cve/CVE-2024-42132.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42133.html">https://www.suse.com/security/cve/CVE-2024-42133.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42136.html">https://www.suse.com/security/cve/CVE-2024-42136.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42137.html">https://www.suse.com/security/cve/CVE-2024-42137.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42138.html">https://www.suse.com/security/cve/CVE-2024-42138.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42139.html">https://www.suse.com/security/cve/CVE-2024-42139.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42141.html">https://www.suse.com/security/cve/CVE-2024-42141.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42142.html">https://www.suse.com/security/cve/CVE-2024-42142.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42143.html">https://www.suse.com/security/cve/CVE-2024-42143.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42144.html">https://www.suse.com/security/cve/CVE-2024-42144.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42145.html">https://www.suse.com/security/cve/CVE-2024-42145.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42147.html">https://www.suse.com/security/cve/CVE-2024-42147.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42148.html">https://www.suse.com/security/cve/CVE-2024-42148.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42152.html">https://www.suse.com/security/cve/CVE-2024-42152.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42153.html">https://www.suse.com/security/cve/CVE-2024-42153.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42155.html">https://www.suse.com/security/cve/CVE-2024-42155.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42156.html">https://www.suse.com/security/cve/CVE-2024-42156.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42157.html">https://www.suse.com/security/cve/CVE-2024-42157.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42158.html">https://www.suse.com/security/cve/CVE-2024-42158.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42159.html">https://www.suse.com/security/cve/CVE-2024-42159.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42161.html">https://www.suse.com/security/cve/CVE-2024-42161.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42162.html">https://www.suse.com/security/cve/CVE-2024-42162.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42223.html">https://www.suse.com/security/cve/CVE-2024-42223.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42224.html">https://www.suse.com/security/cve/CVE-2024-42224.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42225.html">https://www.suse.com/security/cve/CVE-2024-42225.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42226.html">https://www.suse.com/security/cve/CVE-2024-42226.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42227.html">https://www.suse.com/security/cve/CVE-2024-42227.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42228.html">https://www.suse.com/security/cve/CVE-2024-42228.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42229.html">https://www.suse.com/security/cve/CVE-2024-42229.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42230.html">https://www.suse.com/security/cve/CVE-2024-42230.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42232.html">https://www.suse.com/security/cve/CVE-2024-42232.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42236.html">https://www.suse.com/security/cve/CVE-2024-42236.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42237.html">https://www.suse.com/security/cve/CVE-2024-42237.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42238.html">https://www.suse.com/security/cve/CVE-2024-42238.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42239.html">https://www.suse.com/security/cve/CVE-2024-42239.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42240.html">https://www.suse.com/security/cve/CVE-2024-42240.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42241.html">https://www.suse.com/security/cve/CVE-2024-42241.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42244.html">https://www.suse.com/security/cve/CVE-2024-42244.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42245.html">https://www.suse.com/security/cve/CVE-2024-42245.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42246.html">https://www.suse.com/security/cve/CVE-2024-42246.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42247.html">https://www.suse.com/security/cve/CVE-2024-42247.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42250.html">https://www.suse.com/security/cve/CVE-2024-42250.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42253.html">https://www.suse.com/security/cve/CVE-2024-42253.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42259.html">https://www.suse.com/security/cve/CVE-2024-42259.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42268.html">https://www.suse.com/security/cve/CVE-2024-42268.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42269.html">https://www.suse.com/security/cve/CVE-2024-42269.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42270.html">https://www.suse.com/security/cve/CVE-2024-42270.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42271.html">https://www.suse.com/security/cve/CVE-2024-42271.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42274.html">https://www.suse.com/security/cve/CVE-2024-42274.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42276.html">https://www.suse.com/security/cve/CVE-2024-42276.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42277.html">https://www.suse.com/security/cve/CVE-2024-42277.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42278.html">https://www.suse.com/security/cve/CVE-2024-42278.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42279.html">https://www.suse.com/security/cve/CVE-2024-42279.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42280.html">https://www.suse.com/security/cve/CVE-2024-42280.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42281.html">https://www.suse.com/security/cve/CVE-2024-42281.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42283.html">https://www.suse.com/security/cve/CVE-2024-42283.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42284.html">https://www.suse.com/security/cve/CVE-2024-42284.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42285.html">https://www.suse.com/security/cve/CVE-2024-42285.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42286.html">https://www.suse.com/security/cve/CVE-2024-42286.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42287.html">https://www.suse.com/security/cve/CVE-2024-42287.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42288.html">https://www.suse.com/security/cve/CVE-2024-42288.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42289.html">https://www.suse.com/security/cve/CVE-2024-42289.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42290.html">https://www.suse.com/security/cve/CVE-2024-42290.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42291.html">https://www.suse.com/security/cve/CVE-2024-42291.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42292.html">https://www.suse.com/security/cve/CVE-2024-42292.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42295.html">https://www.suse.com/security/cve/CVE-2024-42295.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42298.html">https://www.suse.com/security/cve/CVE-2024-42298.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42301.html">https://www.suse.com/security/cve/CVE-2024-42301.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42302.html">https://www.suse.com/security/cve/CVE-2024-42302.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42303.html">https://www.suse.com/security/cve/CVE-2024-42303.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42308.html">https://www.suse.com/security/cve/CVE-2024-42308.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42309.html">https://www.suse.com/security/cve/CVE-2024-42309.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42310.html">https://www.suse.com/security/cve/CVE-2024-42310.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42311.html">https://www.suse.com/security/cve/CVE-2024-42311.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42312.html">https://www.suse.com/security/cve/CVE-2024-42312.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42313.html">https://www.suse.com/security/cve/CVE-2024-42313.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42314.html">https://www.suse.com/security/cve/CVE-2024-42314.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42315.html">https://www.suse.com/security/cve/CVE-2024-42315.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42316.html">https://www.suse.com/security/cve/CVE-2024-42316.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42318.html">https://www.suse.com/security/cve/CVE-2024-42318.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42319.html">https://www.suse.com/security/cve/CVE-2024-42319.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42320.html">https://www.suse.com/security/cve/CVE-2024-42320.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42322.html">https://www.suse.com/security/cve/CVE-2024-42322.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43816.html">https://www.suse.com/security/cve/CVE-2024-43816.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43817.html">https://www.suse.com/security/cve/CVE-2024-43817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43818.html">https://www.suse.com/security/cve/CVE-2024-43818.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43819.html">https://www.suse.com/security/cve/CVE-2024-43819.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43821.html">https://www.suse.com/security/cve/CVE-2024-43821.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43823.html">https://www.suse.com/security/cve/CVE-2024-43823.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43824.html">https://www.suse.com/security/cve/CVE-2024-43824.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43825.html">https://www.suse.com/security/cve/CVE-2024-43825.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43826.html">https://www.suse.com/security/cve/CVE-2024-43826.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43829.html">https://www.suse.com/security/cve/CVE-2024-43829.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43830.html">https://www.suse.com/security/cve/CVE-2024-43830.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43831.html">https://www.suse.com/security/cve/CVE-2024-43831.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43833.html">https://www.suse.com/security/cve/CVE-2024-43833.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43834.html">https://www.suse.com/security/cve/CVE-2024-43834.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43837.html">https://www.suse.com/security/cve/CVE-2024-43837.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43839.html">https://www.suse.com/security/cve/CVE-2024-43839.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43840.html">https://www.suse.com/security/cve/CVE-2024-43840.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43841.html">https://www.suse.com/security/cve/CVE-2024-43841.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43842.html">https://www.suse.com/security/cve/CVE-2024-43842.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43846.html">https://www.suse.com/security/cve/CVE-2024-43846.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43847.html">https://www.suse.com/security/cve/CVE-2024-43847.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43849.html">https://www.suse.com/security/cve/CVE-2024-43849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43850.html">https://www.suse.com/security/cve/CVE-2024-43850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43851.html">https://www.suse.com/security/cve/CVE-2024-43851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43853.html">https://www.suse.com/security/cve/CVE-2024-43853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43854.html">https://www.suse.com/security/cve/CVE-2024-43854.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43855.html">https://www.suse.com/security/cve/CVE-2024-43855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43856.html">https://www.suse.com/security/cve/CVE-2024-43856.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43858.html">https://www.suse.com/security/cve/CVE-2024-43858.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43860.html">https://www.suse.com/security/cve/CVE-2024-43860.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43861.html">https://www.suse.com/security/cve/CVE-2024-43861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43863.html">https://www.suse.com/security/cve/CVE-2024-43863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43864.html">https://www.suse.com/security/cve/CVE-2024-43864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43866.html">https://www.suse.com/security/cve/CVE-2024-43866.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43867.html">https://www.suse.com/security/cve/CVE-2024-43867.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43871.html">https://www.suse.com/security/cve/CVE-2024-43871.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43872.html">https://www.suse.com/security/cve/CVE-2024-43872.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43873.html">https://www.suse.com/security/cve/CVE-2024-43873.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43874.html">https://www.suse.com/security/cve/CVE-2024-43874.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43875.html">https://www.suse.com/security/cve/CVE-2024-43875.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43876.html">https://www.suse.com/security/cve/CVE-2024-43876.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43877.html">https://www.suse.com/security/cve/CVE-2024-43877.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43879.html">https://www.suse.com/security/cve/CVE-2024-43879.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43880.html">https://www.suse.com/security/cve/CVE-2024-43880.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43881.html">https://www.suse.com/security/cve/CVE-2024-43881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43882.html">https://www.suse.com/security/cve/CVE-2024-43882.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43883.html">https://www.suse.com/security/cve/CVE-2024-43883.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43884.html">https://www.suse.com/security/cve/CVE-2024-43884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43885.html">https://www.suse.com/security/cve/CVE-2024-43885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43889.html">https://www.suse.com/security/cve/CVE-2024-43889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43892.html">https://www.suse.com/security/cve/CVE-2024-43892.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43893.html">https://www.suse.com/security/cve/CVE-2024-43893.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43894.html">https://www.suse.com/security/cve/CVE-2024-43894.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43895.html">https://www.suse.com/security/cve/CVE-2024-43895.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43897.html">https://www.suse.com/security/cve/CVE-2024-43897.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43899.html">https://www.suse.com/security/cve/CVE-2024-43899.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43900.html">https://www.suse.com/security/cve/CVE-2024-43900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43902.html">https://www.suse.com/security/cve/CVE-2024-43902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43903.html">https://www.suse.com/security/cve/CVE-2024-43903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43905.html">https://www.suse.com/security/cve/CVE-2024-43905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43906.html">https://www.suse.com/security/cve/CVE-2024-43906.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43907.html">https://www.suse.com/security/cve/CVE-2024-43907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43908.html">https://www.suse.com/security/cve/CVE-2024-43908.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43909.html">https://www.suse.com/security/cve/CVE-2024-43909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43911.html">https://www.suse.com/security/cve/CVE-2024-43911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43912.html">https://www.suse.com/security/cve/CVE-2024-43912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44931.html">https://www.suse.com/security/cve/CVE-2024-44931.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44938.html">https://www.suse.com/security/cve/CVE-2024-44938.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44939.html">https://www.suse.com/security/cve/CVE-2024-44939.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">https://bugzilla.suse.com/show_bug.cgi?id=1193454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205462">https://bugzilla.suse.com/show_bug.cgi?id=1205462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">https://bugzilla.suse.com/show_bug.cgi?id=1208783</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">https://bugzilla.suse.com/show_bug.cgi?id=1213123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214285">https://bugzilla.suse.com/show_bug.cgi?id=1214285</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220066">https://bugzilla.suse.com/show_bug.cgi?id=1220066</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220252">https://bugzilla.suse.com/show_bug.cgi?id=1220252</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220877">https://bugzilla.suse.com/show_bug.cgi?id=1220877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221326">https://bugzilla.suse.com/show_bug.cgi?id=1221326</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221630">https://bugzilla.suse.com/show_bug.cgi?id=1221630</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">https://bugzilla.suse.com/show_bug.cgi?id=1221645</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221652">https://bugzilla.suse.com/show_bug.cgi?id=1221652</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221857">https://bugzilla.suse.com/show_bug.cgi?id=1221857</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222254">https://bugzilla.suse.com/show_bug.cgi?id=1222254</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222335">https://bugzilla.suse.com/show_bug.cgi?id=1222335</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222350">https://bugzilla.suse.com/show_bug.cgi?id=1222350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">https://bugzilla.suse.com/show_bug.cgi?id=1222364</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">https://bugzilla.suse.com/show_bug.cgi?id=1222372</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222387">https://bugzilla.suse.com/show_bug.cgi?id=1222387</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222433">https://bugzilla.suse.com/show_bug.cgi?id=1222433</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222434">https://bugzilla.suse.com/show_bug.cgi?id=1222434</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222463">https://bugzilla.suse.com/show_bug.cgi?id=1222463</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">https://bugzilla.suse.com/show_bug.cgi?id=1222625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222633">https://bugzilla.suse.com/show_bug.cgi?id=1222633</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222634">https://bugzilla.suse.com/show_bug.cgi?id=1222634</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222808">https://bugzilla.suse.com/show_bug.cgi?id=1222808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222967">https://bugzilla.suse.com/show_bug.cgi?id=1222967</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222973">https://bugzilla.suse.com/show_bug.cgi?id=1222973</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223053">https://bugzilla.suse.com/show_bug.cgi?id=1223053</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223074">https://bugzilla.suse.com/show_bug.cgi?id=1223074</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">https://bugzilla.suse.com/show_bug.cgi?id=1223191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223395">https://bugzilla.suse.com/show_bug.cgi?id=1223395</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">https://bugzilla.suse.com/show_bug.cgi?id=1223635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223720">https://bugzilla.suse.com/show_bug.cgi?id=1223720</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223731">https://bugzilla.suse.com/show_bug.cgi?id=1223731</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223742">https://bugzilla.suse.com/show_bug.cgi?id=1223742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223763">https://bugzilla.suse.com/show_bug.cgi?id=1223763</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223767">https://bugzilla.suse.com/show_bug.cgi?id=1223767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223777">https://bugzilla.suse.com/show_bug.cgi?id=1223777</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223803">https://bugzilla.suse.com/show_bug.cgi?id=1223803</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224105">https://bugzilla.suse.com/show_bug.cgi?id=1224105</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224415">https://bugzilla.suse.com/show_bug.cgi?id=1224415</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224485">https://bugzilla.suse.com/show_bug.cgi?id=1224485</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224496">https://bugzilla.suse.com/show_bug.cgi?id=1224496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224510">https://bugzilla.suse.com/show_bug.cgi?id=1224510</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224535">https://bugzilla.suse.com/show_bug.cgi?id=1224535</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224631">https://bugzilla.suse.com/show_bug.cgi?id=1224631</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">https://bugzilla.suse.com/show_bug.cgi?id=1224636</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224690">https://bugzilla.suse.com/show_bug.cgi?id=1224690</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">https://bugzilla.suse.com/show_bug.cgi?id=1224694</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">https://bugzilla.suse.com/show_bug.cgi?id=1224700</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224711">https://bugzilla.suse.com/show_bug.cgi?id=1224711</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">https://bugzilla.suse.com/show_bug.cgi?id=1225475</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225582">https://bugzilla.suse.com/show_bug.cgi?id=1225582</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">https://bugzilla.suse.com/show_bug.cgi?id=1225607</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">https://bugzilla.suse.com/show_bug.cgi?id=1225717</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225718">https://bugzilla.suse.com/show_bug.cgi?id=1225718</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">https://bugzilla.suse.com/show_bug.cgi?id=1225744</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">https://bugzilla.suse.com/show_bug.cgi?id=1225745</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225751">https://bugzilla.suse.com/show_bug.cgi?id=1225751</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225814">https://bugzilla.suse.com/show_bug.cgi?id=1225814</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225832">https://bugzilla.suse.com/show_bug.cgi?id=1225832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">https://bugzilla.suse.com/show_bug.cgi?id=1225838</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">https://bugzilla.suse.com/show_bug.cgi?id=1225903</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226031">https://bugzilla.suse.com/show_bug.cgi?id=1226031</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226127">https://bugzilla.suse.com/show_bug.cgi?id=1226127</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">https://bugzilla.suse.com/show_bug.cgi?id=1226502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226530">https://bugzilla.suse.com/show_bug.cgi?id=1226530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">https://bugzilla.suse.com/show_bug.cgi?id=1226588</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226604">https://bugzilla.suse.com/show_bug.cgi?id=1226604</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226743">https://bugzilla.suse.com/show_bug.cgi?id=1226743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226751">https://bugzilla.suse.com/show_bug.cgi?id=1226751</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226765">https://bugzilla.suse.com/show_bug.cgi?id=1226765</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226798">https://bugzilla.suse.com/show_bug.cgi?id=1226798</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226801">https://bugzilla.suse.com/show_bug.cgi?id=1226801</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">https://bugzilla.suse.com/show_bug.cgi?id=1226834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226874">https://bugzilla.suse.com/show_bug.cgi?id=1226874</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226885">https://bugzilla.suse.com/show_bug.cgi?id=1226885</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226920">https://bugzilla.suse.com/show_bug.cgi?id=1226920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227149">https://bugzilla.suse.com/show_bug.cgi?id=1227149</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227182">https://bugzilla.suse.com/show_bug.cgi?id=1227182</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">https://bugzilla.suse.com/show_bug.cgi?id=1227383</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227437">https://bugzilla.suse.com/show_bug.cgi?id=1227437</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227492">https://bugzilla.suse.com/show_bug.cgi?id=1227492</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227493">https://bugzilla.suse.com/show_bug.cgi?id=1227493</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227494">https://bugzilla.suse.com/show_bug.cgi?id=1227494</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">https://bugzilla.suse.com/show_bug.cgi?id=1227618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">https://bugzilla.suse.com/show_bug.cgi?id=1227620</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227623">https://bugzilla.suse.com/show_bug.cgi?id=1227623</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227627">https://bugzilla.suse.com/show_bug.cgi?id=1227627</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227634">https://bugzilla.suse.com/show_bug.cgi?id=1227634</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227706">https://bugzilla.suse.com/show_bug.cgi?id=1227706</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">https://bugzilla.suse.com/show_bug.cgi?id=1227722</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">https://bugzilla.suse.com/show_bug.cgi?id=1227724</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">https://bugzilla.suse.com/show_bug.cgi?id=1227725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">https://bugzilla.suse.com/show_bug.cgi?id=1227728</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">https://bugzilla.suse.com/show_bug.cgi?id=1227729</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">https://bugzilla.suse.com/show_bug.cgi?id=1227732</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">https://bugzilla.suse.com/show_bug.cgi?id=1227733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227734">https://bugzilla.suse.com/show_bug.cgi?id=1227734</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227747">https://bugzilla.suse.com/show_bug.cgi?id=1227747</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">https://bugzilla.suse.com/show_bug.cgi?id=1227750</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">https://bugzilla.suse.com/show_bug.cgi?id=1227754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227758">https://bugzilla.suse.com/show_bug.cgi?id=1227758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">https://bugzilla.suse.com/show_bug.cgi?id=1227760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227761">https://bugzilla.suse.com/show_bug.cgi?id=1227761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">https://bugzilla.suse.com/show_bug.cgi?id=1227764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">https://bugzilla.suse.com/show_bug.cgi?id=1227766</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">https://bugzilla.suse.com/show_bug.cgi?id=1227770</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">https://bugzilla.suse.com/show_bug.cgi?id=1227771</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">https://bugzilla.suse.com/show_bug.cgi?id=1227772</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">https://bugzilla.suse.com/show_bug.cgi?id=1227774</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227781">https://bugzilla.suse.com/show_bug.cgi?id=1227781</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227784">https://bugzilla.suse.com/show_bug.cgi?id=1227784</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227785">https://bugzilla.suse.com/show_bug.cgi?id=1227785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">https://bugzilla.suse.com/show_bug.cgi?id=1227787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">https://bugzilla.suse.com/show_bug.cgi?id=1227790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227791">https://bugzilla.suse.com/show_bug.cgi?id=1227791</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">https://bugzilla.suse.com/show_bug.cgi?id=1227792</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">https://bugzilla.suse.com/show_bug.cgi?id=1227796</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">https://bugzilla.suse.com/show_bug.cgi?id=1227798</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227799">https://bugzilla.suse.com/show_bug.cgi?id=1227799</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">https://bugzilla.suse.com/show_bug.cgi?id=1227802</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">https://bugzilla.suse.com/show_bug.cgi?id=1227808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">https://bugzilla.suse.com/show_bug.cgi?id=1227810</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227811">https://bugzilla.suse.com/show_bug.cgi?id=1227811</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">https://bugzilla.suse.com/show_bug.cgi?id=1227812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227815">https://bugzilla.suse.com/show_bug.cgi?id=1227815</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">https://bugzilla.suse.com/show_bug.cgi?id=1227816</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227818">https://bugzilla.suse.com/show_bug.cgi?id=1227818</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">https://bugzilla.suse.com/show_bug.cgi?id=1227820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">https://bugzilla.suse.com/show_bug.cgi?id=1227823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">https://bugzilla.suse.com/show_bug.cgi?id=1227824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227826">https://bugzilla.suse.com/show_bug.cgi?id=1227826</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">https://bugzilla.suse.com/show_bug.cgi?id=1227828</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">https://bugzilla.suse.com/show_bug.cgi?id=1227829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">https://bugzilla.suse.com/show_bug.cgi?id=1227830</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227832">https://bugzilla.suse.com/show_bug.cgi?id=1227832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227833">https://bugzilla.suse.com/show_bug.cgi?id=1227833</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227834">https://bugzilla.suse.com/show_bug.cgi?id=1227834</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227839">https://bugzilla.suse.com/show_bug.cgi?id=1227839</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227840">https://bugzilla.suse.com/show_bug.cgi?id=1227840</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">https://bugzilla.suse.com/show_bug.cgi?id=1227846</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">https://bugzilla.suse.com/show_bug.cgi?id=1227849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">https://bugzilla.suse.com/show_bug.cgi?id=1227851</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">https://bugzilla.suse.com/show_bug.cgi?id=1227853</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227863">https://bugzilla.suse.com/show_bug.cgi?id=1227863</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">https://bugzilla.suse.com/show_bug.cgi?id=1227864</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">https://bugzilla.suse.com/show_bug.cgi?id=1227865</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227867">https://bugzilla.suse.com/show_bug.cgi?id=1227867</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227869">https://bugzilla.suse.com/show_bug.cgi?id=1227869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">https://bugzilla.suse.com/show_bug.cgi?id=1227870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227883">https://bugzilla.suse.com/show_bug.cgi?id=1227883</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">https://bugzilla.suse.com/show_bug.cgi?id=1227884</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">https://bugzilla.suse.com/show_bug.cgi?id=1227891</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">https://bugzilla.suse.com/show_bug.cgi?id=1227893</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">https://bugzilla.suse.com/show_bug.cgi?id=1227929</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">https://bugzilla.suse.com/show_bug.cgi?id=1227950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">https://bugzilla.suse.com/show_bug.cgi?id=1227957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">https://bugzilla.suse.com/show_bug.cgi?id=1227981</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">https://bugzilla.suse.com/show_bug.cgi?id=1228020</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228021">https://bugzilla.suse.com/show_bug.cgi?id=1228021</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">https://bugzilla.suse.com/show_bug.cgi?id=1228114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228192">https://bugzilla.suse.com/show_bug.cgi?id=1228192</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">https://bugzilla.suse.com/show_bug.cgi?id=1228195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">https://bugzilla.suse.com/show_bug.cgi?id=1228202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">https://bugzilla.suse.com/show_bug.cgi?id=1228235</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228236">https://bugzilla.suse.com/show_bug.cgi?id=1228236</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">https://bugzilla.suse.com/show_bug.cgi?id=1228237</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">https://bugzilla.suse.com/show_bug.cgi?id=1228247</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228321">https://bugzilla.suse.com/show_bug.cgi?id=1228321</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">https://bugzilla.suse.com/show_bug.cgi?id=1228409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228426">https://bugzilla.suse.com/show_bug.cgi?id=1228426</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228427">https://bugzilla.suse.com/show_bug.cgi?id=1228427</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228429">https://bugzilla.suse.com/show_bug.cgi?id=1228429</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228446">https://bugzilla.suse.com/show_bug.cgi?id=1228446</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228447">https://bugzilla.suse.com/show_bug.cgi?id=1228447</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228449">https://bugzilla.suse.com/show_bug.cgi?id=1228449</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228450">https://bugzilla.suse.com/show_bug.cgi?id=1228450</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228452">https://bugzilla.suse.com/show_bug.cgi?id=1228452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228456">https://bugzilla.suse.com/show_bug.cgi?id=1228456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228457">https://bugzilla.suse.com/show_bug.cgi?id=1228457</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228458">https://bugzilla.suse.com/show_bug.cgi?id=1228458</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">https://bugzilla.suse.com/show_bug.cgi?id=1228459</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228460">https://bugzilla.suse.com/show_bug.cgi?id=1228460</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">https://bugzilla.suse.com/show_bug.cgi?id=1228462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228463">https://bugzilla.suse.com/show_bug.cgi?id=1228463</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228466">https://bugzilla.suse.com/show_bug.cgi?id=1228466</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228467">https://bugzilla.suse.com/show_bug.cgi?id=1228467</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228468">https://bugzilla.suse.com/show_bug.cgi?id=1228468</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228469">https://bugzilla.suse.com/show_bug.cgi?id=1228469</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">https://bugzilla.suse.com/show_bug.cgi?id=1228470</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228472">https://bugzilla.suse.com/show_bug.cgi?id=1228472</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228479">https://bugzilla.suse.com/show_bug.cgi?id=1228479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228480">https://bugzilla.suse.com/show_bug.cgi?id=1228480</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228481">https://bugzilla.suse.com/show_bug.cgi?id=1228481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228482">https://bugzilla.suse.com/show_bug.cgi?id=1228482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228483">https://bugzilla.suse.com/show_bug.cgi?id=1228483</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228484">https://bugzilla.suse.com/show_bug.cgi?id=1228484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228485">https://bugzilla.suse.com/show_bug.cgi?id=1228485</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">https://bugzilla.suse.com/show_bug.cgi?id=1228486</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228487">https://bugzilla.suse.com/show_bug.cgi?id=1228487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228489">https://bugzilla.suse.com/show_bug.cgi?id=1228489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228491">https://bugzilla.suse.com/show_bug.cgi?id=1228491</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228492">https://bugzilla.suse.com/show_bug.cgi?id=1228492</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228493">https://bugzilla.suse.com/show_bug.cgi?id=1228493</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228494">https://bugzilla.suse.com/show_bug.cgi?id=1228494</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228495">https://bugzilla.suse.com/show_bug.cgi?id=1228495</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228496">https://bugzilla.suse.com/show_bug.cgi?id=1228496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228499">https://bugzilla.suse.com/show_bug.cgi?id=1228499</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228500">https://bugzilla.suse.com/show_bug.cgi?id=1228500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228501">https://bugzilla.suse.com/show_bug.cgi?id=1228501</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228502">https://bugzilla.suse.com/show_bug.cgi?id=1228502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228503">https://bugzilla.suse.com/show_bug.cgi?id=1228503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228505">https://bugzilla.suse.com/show_bug.cgi?id=1228505</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228508">https://bugzilla.suse.com/show_bug.cgi?id=1228508</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228509">https://bugzilla.suse.com/show_bug.cgi?id=1228509</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228510">https://bugzilla.suse.com/show_bug.cgi?id=1228510</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228511">https://bugzilla.suse.com/show_bug.cgi?id=1228511</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228513">https://bugzilla.suse.com/show_bug.cgi?id=1228513</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228515">https://bugzilla.suse.com/show_bug.cgi?id=1228515</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228516">https://bugzilla.suse.com/show_bug.cgi?id=1228516</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">https://bugzilla.suse.com/show_bug.cgi?id=1228518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">https://bugzilla.suse.com/show_bug.cgi?id=1228520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228525">https://bugzilla.suse.com/show_bug.cgi?id=1228525</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228527">https://bugzilla.suse.com/show_bug.cgi?id=1228527</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">https://bugzilla.suse.com/show_bug.cgi?id=1228530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228531">https://bugzilla.suse.com/show_bug.cgi?id=1228531</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228539">https://bugzilla.suse.com/show_bug.cgi?id=1228539</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">https://bugzilla.suse.com/show_bug.cgi?id=1228561</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228563">https://bugzilla.suse.com/show_bug.cgi?id=1228563</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228564">https://bugzilla.suse.com/show_bug.cgi?id=1228564</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">https://bugzilla.suse.com/show_bug.cgi?id=1228565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">https://bugzilla.suse.com/show_bug.cgi?id=1228567</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228568">https://bugzilla.suse.com/show_bug.cgi?id=1228568</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228572">https://bugzilla.suse.com/show_bug.cgi?id=1228572</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228576">https://bugzilla.suse.com/show_bug.cgi?id=1228576</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228579">https://bugzilla.suse.com/show_bug.cgi?id=1228579</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">https://bugzilla.suse.com/show_bug.cgi?id=1228580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">https://bugzilla.suse.com/show_bug.cgi?id=1228581</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228582">https://bugzilla.suse.com/show_bug.cgi?id=1228582</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">https://bugzilla.suse.com/show_bug.cgi?id=1228584</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228586">https://bugzilla.suse.com/show_bug.cgi?id=1228586</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">https://bugzilla.suse.com/show_bug.cgi?id=1228588</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228590">https://bugzilla.suse.com/show_bug.cgi?id=1228590</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">https://bugzilla.suse.com/show_bug.cgi?id=1228591</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">https://bugzilla.suse.com/show_bug.cgi?id=1228599</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228615">https://bugzilla.suse.com/show_bug.cgi?id=1228615</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228616">https://bugzilla.suse.com/show_bug.cgi?id=1228616</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">https://bugzilla.suse.com/show_bug.cgi?id=1228617</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">https://bugzilla.suse.com/show_bug.cgi?id=1228625</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">https://bugzilla.suse.com/show_bug.cgi?id=1228626</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">https://bugzilla.suse.com/show_bug.cgi?id=1228633</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228635">https://bugzilla.suse.com/show_bug.cgi?id=1228635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228636">https://bugzilla.suse.com/show_bug.cgi?id=1228636</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">https://bugzilla.suse.com/show_bug.cgi?id=1228640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228643">https://bugzilla.suse.com/show_bug.cgi?id=1228643</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">https://bugzilla.suse.com/show_bug.cgi?id=1228644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228646">https://bugzilla.suse.com/show_bug.cgi?id=1228646</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">https://bugzilla.suse.com/show_bug.cgi?id=1228649</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">https://bugzilla.suse.com/show_bug.cgi?id=1228650</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228654">https://bugzilla.suse.com/show_bug.cgi?id=1228654</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">https://bugzilla.suse.com/show_bug.cgi?id=1228655</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228656">https://bugzilla.suse.com/show_bug.cgi?id=1228656</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">https://bugzilla.suse.com/show_bug.cgi?id=1228658</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228660">https://bugzilla.suse.com/show_bug.cgi?id=1228660</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">https://bugzilla.suse.com/show_bug.cgi?id=1228662</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">https://bugzilla.suse.com/show_bug.cgi?id=1228665</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228666">https://bugzilla.suse.com/show_bug.cgi?id=1228666</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228667">https://bugzilla.suse.com/show_bug.cgi?id=1228667</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">https://bugzilla.suse.com/show_bug.cgi?id=1228672</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228673">https://bugzilla.suse.com/show_bug.cgi?id=1228673</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228674">https://bugzilla.suse.com/show_bug.cgi?id=1228674</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228677">https://bugzilla.suse.com/show_bug.cgi?id=1228677</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">https://bugzilla.suse.com/show_bug.cgi?id=1228680</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228687">https://bugzilla.suse.com/show_bug.cgi?id=1228687</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">https://bugzilla.suse.com/show_bug.cgi?id=1228705</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228706">https://bugzilla.suse.com/show_bug.cgi?id=1228706</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228707">https://bugzilla.suse.com/show_bug.cgi?id=1228707</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228708">https://bugzilla.suse.com/show_bug.cgi?id=1228708</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228709">https://bugzilla.suse.com/show_bug.cgi?id=1228709</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228710">https://bugzilla.suse.com/show_bug.cgi?id=1228710</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228718">https://bugzilla.suse.com/show_bug.cgi?id=1228718</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228720">https://bugzilla.suse.com/show_bug.cgi?id=1228720</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228721">https://bugzilla.suse.com/show_bug.cgi?id=1228721</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228722">https://bugzilla.suse.com/show_bug.cgi?id=1228722</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">https://bugzilla.suse.com/show_bug.cgi?id=1228723</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228724">https://bugzilla.suse.com/show_bug.cgi?id=1228724</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">https://bugzilla.suse.com/show_bug.cgi?id=1228726</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228727">https://bugzilla.suse.com/show_bug.cgi?id=1228727</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228733">https://bugzilla.suse.com/show_bug.cgi?id=1228733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228737">https://bugzilla.suse.com/show_bug.cgi?id=1228737</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">https://bugzilla.suse.com/show_bug.cgi?id=1228743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228748">https://bugzilla.suse.com/show_bug.cgi?id=1228748</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228754">https://bugzilla.suse.com/show_bug.cgi?id=1228754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">https://bugzilla.suse.com/show_bug.cgi?id=1228756</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228757">https://bugzilla.suse.com/show_bug.cgi?id=1228757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228758">https://bugzilla.suse.com/show_bug.cgi?id=1228758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228764">https://bugzilla.suse.com/show_bug.cgi?id=1228764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228766">https://bugzilla.suse.com/show_bug.cgi?id=1228766</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228779">https://bugzilla.suse.com/show_bug.cgi?id=1228779</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">https://bugzilla.suse.com/show_bug.cgi?id=1228801</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228849">https://bugzilla.suse.com/show_bug.cgi?id=1228849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">https://bugzilla.suse.com/show_bug.cgi?id=1228850</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">https://bugzilla.suse.com/show_bug.cgi?id=1228857</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228959">https://bugzilla.suse.com/show_bug.cgi?id=1228959</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228964">https://bugzilla.suse.com/show_bug.cgi?id=1228964</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228966">https://bugzilla.suse.com/show_bug.cgi?id=1228966</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228967">https://bugzilla.suse.com/show_bug.cgi?id=1228967</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228973">https://bugzilla.suse.com/show_bug.cgi?id=1228973</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228977">https://bugzilla.suse.com/show_bug.cgi?id=1228977</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228978">https://bugzilla.suse.com/show_bug.cgi?id=1228978</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228979">https://bugzilla.suse.com/show_bug.cgi?id=1228979</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228986">https://bugzilla.suse.com/show_bug.cgi?id=1228986</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228988">https://bugzilla.suse.com/show_bug.cgi?id=1228988</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228989">https://bugzilla.suse.com/show_bug.cgi?id=1228989</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228991">https://bugzilla.suse.com/show_bug.cgi?id=1228991</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228992">https://bugzilla.suse.com/show_bug.cgi?id=1228992</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229005">https://bugzilla.suse.com/show_bug.cgi?id=1229005</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229024">https://bugzilla.suse.com/show_bug.cgi?id=1229024</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229042">https://bugzilla.suse.com/show_bug.cgi?id=1229042</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229045">https://bugzilla.suse.com/show_bug.cgi?id=1229045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229046">https://bugzilla.suse.com/show_bug.cgi?id=1229046</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229054">https://bugzilla.suse.com/show_bug.cgi?id=1229054</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229056">https://bugzilla.suse.com/show_bug.cgi?id=1229056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229086">https://bugzilla.suse.com/show_bug.cgi?id=1229086</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229134">https://bugzilla.suse.com/show_bug.cgi?id=1229134</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229136">https://bugzilla.suse.com/show_bug.cgi?id=1229136</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229154">https://bugzilla.suse.com/show_bug.cgi?id=1229154</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229156">https://bugzilla.suse.com/show_bug.cgi?id=1229156</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229160">https://bugzilla.suse.com/show_bug.cgi?id=1229160</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229167">https://bugzilla.suse.com/show_bug.cgi?id=1229167</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229168">https://bugzilla.suse.com/show_bug.cgi?id=1229168</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229169">https://bugzilla.suse.com/show_bug.cgi?id=1229169</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229170">https://bugzilla.suse.com/show_bug.cgi?id=1229170</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229171">https://bugzilla.suse.com/show_bug.cgi?id=1229171</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229172">https://bugzilla.suse.com/show_bug.cgi?id=1229172</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229173">https://bugzilla.suse.com/show_bug.cgi?id=1229173</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229174">https://bugzilla.suse.com/show_bug.cgi?id=1229174</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229239">https://bugzilla.suse.com/show_bug.cgi?id=1229239</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229240">https://bugzilla.suse.com/show_bug.cgi?id=1229240</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229241">https://bugzilla.suse.com/show_bug.cgi?id=1229241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229243">https://bugzilla.suse.com/show_bug.cgi?id=1229243</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229244">https://bugzilla.suse.com/show_bug.cgi?id=1229244</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229245">https://bugzilla.suse.com/show_bug.cgi?id=1229245</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229246">https://bugzilla.suse.com/show_bug.cgi?id=1229246</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229247">https://bugzilla.suse.com/show_bug.cgi?id=1229247</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229248">https://bugzilla.suse.com/show_bug.cgi?id=1229248</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229249">https://bugzilla.suse.com/show_bug.cgi?id=1229249</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229250">https://bugzilla.suse.com/show_bug.cgi?id=1229250</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229251">https://bugzilla.suse.com/show_bug.cgi?id=1229251</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229252">https://bugzilla.suse.com/show_bug.cgi?id=1229252</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229253">https://bugzilla.suse.com/show_bug.cgi?id=1229253</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229254">https://bugzilla.suse.com/show_bug.cgi?id=1229254</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229255">https://bugzilla.suse.com/show_bug.cgi?id=1229255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229256">https://bugzilla.suse.com/show_bug.cgi?id=1229256</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229287">https://bugzilla.suse.com/show_bug.cgi?id=1229287</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229290">https://bugzilla.suse.com/show_bug.cgi?id=1229290</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229291">https://bugzilla.suse.com/show_bug.cgi?id=1229291</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229292">https://bugzilla.suse.com/show_bug.cgi?id=1229292</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229294">https://bugzilla.suse.com/show_bug.cgi?id=1229294</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229296">https://bugzilla.suse.com/show_bug.cgi?id=1229296</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229297">https://bugzilla.suse.com/show_bug.cgi?id=1229297</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229298">https://bugzilla.suse.com/show_bug.cgi?id=1229298</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229299">https://bugzilla.suse.com/show_bug.cgi?id=1229299</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229301">https://bugzilla.suse.com/show_bug.cgi?id=1229301</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229303">https://bugzilla.suse.com/show_bug.cgi?id=1229303</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229304">https://bugzilla.suse.com/show_bug.cgi?id=1229304</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229305">https://bugzilla.suse.com/show_bug.cgi?id=1229305</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229307">https://bugzilla.suse.com/show_bug.cgi?id=1229307</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229309">https://bugzilla.suse.com/show_bug.cgi?id=1229309</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">https://bugzilla.suse.com/show_bug.cgi?id=1229312</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229313">https://bugzilla.suse.com/show_bug.cgi?id=1229313</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229314">https://bugzilla.suse.com/show_bug.cgi?id=1229314</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229315">https://bugzilla.suse.com/show_bug.cgi?id=1229315</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229316">https://bugzilla.suse.com/show_bug.cgi?id=1229316</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229317">https://bugzilla.suse.com/show_bug.cgi?id=1229317</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229318">https://bugzilla.suse.com/show_bug.cgi?id=1229318</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229319">https://bugzilla.suse.com/show_bug.cgi?id=1229319</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229320">https://bugzilla.suse.com/show_bug.cgi?id=1229320</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229327">https://bugzilla.suse.com/show_bug.cgi?id=1229327</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229341">https://bugzilla.suse.com/show_bug.cgi?id=1229341</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229342">https://bugzilla.suse.com/show_bug.cgi?id=1229342</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229344">https://bugzilla.suse.com/show_bug.cgi?id=1229344</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229345">https://bugzilla.suse.com/show_bug.cgi?id=1229345</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229346">https://bugzilla.suse.com/show_bug.cgi?id=1229346</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229347">https://bugzilla.suse.com/show_bug.cgi?id=1229347</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229349">https://bugzilla.suse.com/show_bug.cgi?id=1229349</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229350">https://bugzilla.suse.com/show_bug.cgi?id=1229350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229351">https://bugzilla.suse.com/show_bug.cgi?id=1229351</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229353">https://bugzilla.suse.com/show_bug.cgi?id=1229353</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229354">https://bugzilla.suse.com/show_bug.cgi?id=1229354</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229355">https://bugzilla.suse.com/show_bug.cgi?id=1229355</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229356">https://bugzilla.suse.com/show_bug.cgi?id=1229356</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229357">https://bugzilla.suse.com/show_bug.cgi?id=1229357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229358">https://bugzilla.suse.com/show_bug.cgi?id=1229358</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229359">https://bugzilla.suse.com/show_bug.cgi?id=1229359</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229360">https://bugzilla.suse.com/show_bug.cgi?id=1229360</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229365">https://bugzilla.suse.com/show_bug.cgi?id=1229365</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229366">https://bugzilla.suse.com/show_bug.cgi?id=1229366</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229369">https://bugzilla.suse.com/show_bug.cgi?id=1229369</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229370">https://bugzilla.suse.com/show_bug.cgi?id=1229370</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229373">https://bugzilla.suse.com/show_bug.cgi?id=1229373</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229374">https://bugzilla.suse.com/show_bug.cgi?id=1229374</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229379">https://bugzilla.suse.com/show_bug.cgi?id=1229379</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229381">https://bugzilla.suse.com/show_bug.cgi?id=1229381</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229382">https://bugzilla.suse.com/show_bug.cgi?id=1229382</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229383">https://bugzilla.suse.com/show_bug.cgi?id=1229383</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229386">https://bugzilla.suse.com/show_bug.cgi?id=1229386</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229388">https://bugzilla.suse.com/show_bug.cgi?id=1229388</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229390">https://bugzilla.suse.com/show_bug.cgi?id=1229390</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229391">https://bugzilla.suse.com/show_bug.cgi?id=1229391</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229392">https://bugzilla.suse.com/show_bug.cgi?id=1229392</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229395">https://bugzilla.suse.com/show_bug.cgi?id=1229395</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229398">https://bugzilla.suse.com/show_bug.cgi?id=1229398</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229399">https://bugzilla.suse.com/show_bug.cgi?id=1229399</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229400">https://bugzilla.suse.com/show_bug.cgi?id=1229400</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229402">https://bugzilla.suse.com/show_bug.cgi?id=1229402</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229403">https://bugzilla.suse.com/show_bug.cgi?id=1229403</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229404">https://bugzilla.suse.com/show_bug.cgi?id=1229404</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229407">https://bugzilla.suse.com/show_bug.cgi?id=1229407</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229409">https://bugzilla.suse.com/show_bug.cgi?id=1229409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229410">https://bugzilla.suse.com/show_bug.cgi?id=1229410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229411">https://bugzilla.suse.com/show_bug.cgi?id=1229411</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229413">https://bugzilla.suse.com/show_bug.cgi?id=1229413</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229414">https://bugzilla.suse.com/show_bug.cgi?id=1229414</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229417">https://bugzilla.suse.com/show_bug.cgi?id=1229417</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229444">https://bugzilla.suse.com/show_bug.cgi?id=1229444</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229451">https://bugzilla.suse.com/show_bug.cgi?id=1229451</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229452">https://bugzilla.suse.com/show_bug.cgi?id=1229452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229455">https://bugzilla.suse.com/show_bug.cgi?id=1229455</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229456">https://bugzilla.suse.com/show_bug.cgi?id=1229456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229480">https://bugzilla.suse.com/show_bug.cgi?id=1229480</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229481">https://bugzilla.suse.com/show_bug.cgi?id=1229481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229482">https://bugzilla.suse.com/show_bug.cgi?id=1229482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229484">https://bugzilla.suse.com/show_bug.cgi?id=1229484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229485">https://bugzilla.suse.com/show_bug.cgi?id=1229485</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229486">https://bugzilla.suse.com/show_bug.cgi?id=1229486</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229487">https://bugzilla.suse.com/show_bug.cgi?id=1229487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229488">https://bugzilla.suse.com/show_bug.cgi?id=1229488</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229489">https://bugzilla.suse.com/show_bug.cgi?id=1229489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229490">https://bugzilla.suse.com/show_bug.cgi?id=1229490</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229493">https://bugzilla.suse.com/show_bug.cgi?id=1229493</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229495">https://bugzilla.suse.com/show_bug.cgi?id=1229495</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229496">https://bugzilla.suse.com/show_bug.cgi?id=1229496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229497">https://bugzilla.suse.com/show_bug.cgi?id=1229497</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229500">https://bugzilla.suse.com/show_bug.cgi?id=1229500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229503">https://bugzilla.suse.com/show_bug.cgi?id=1229503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229707">https://bugzilla.suse.com/show_bug.cgi?id=1229707</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229739">https://bugzilla.suse.com/show_bug.cgi?id=1229739</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229743">https://bugzilla.suse.com/show_bug.cgi?id=1229743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229746">https://bugzilla.suse.com/show_bug.cgi?id=1229746</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229747">https://bugzilla.suse.com/show_bug.cgi?id=1229747</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">https://bugzilla.suse.com/show_bug.cgi?id=1229752</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229754">https://bugzilla.suse.com/show_bug.cgi?id=1229754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229755">https://bugzilla.suse.com/show_bug.cgi?id=1229755</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229756">https://bugzilla.suse.com/show_bug.cgi?id=1229756</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229759">https://bugzilla.suse.com/show_bug.cgi?id=1229759</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229761">https://bugzilla.suse.com/show_bug.cgi?id=1229761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229767">https://bugzilla.suse.com/show_bug.cgi?id=1229767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229781">https://bugzilla.suse.com/show_bug.cgi?id=1229781</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229784">https://bugzilla.suse.com/show_bug.cgi?id=1229784</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229785">https://bugzilla.suse.com/show_bug.cgi?id=1229785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229787">https://bugzilla.suse.com/show_bug.cgi?id=1229787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229788">https://bugzilla.suse.com/show_bug.cgi?id=1229788</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229789">https://bugzilla.suse.com/show_bug.cgi?id=1229789</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229792">https://bugzilla.suse.com/show_bug.cgi?id=1229792</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229820">https://bugzilla.suse.com/show_bug.cgi?id=1229820</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229827">https://bugzilla.suse.com/show_bug.cgi?id=1229827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229830">https://bugzilla.suse.com/show_bug.cgi?id=1229830</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229837">https://bugzilla.suse.com/show_bug.cgi?id=1229837</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229940">https://bugzilla.suse.com/show_bug.cgi?id=1229940</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230056">https://bugzilla.suse.com/show_bug.cgi?id=1230056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230350">https://bugzilla.suse.com/show_bug.cgi?id=1230350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230413">https://bugzilla.suse.com/show_bug.cgi?id=1230413</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10029">https://jira.suse.com/browse/PED-10029</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10045">https://jira.suse.com/browse/PED-10045</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10055">https://jira.suse.com/browse/PED-10055</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10105">https://jira.suse.com/browse/PED-10105</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10108">https://jira.suse.com/browse/PED-10108</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8491">https://jira.suse.com/browse/PED-8491</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8779">https://jira.suse.com/browse/PED-8779</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8954">https://jira.suse.com/browse/PED-8954</a>
</li>


</ul>

</div>

--===============0241071922796769080==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung