Plattformen: |
SUSE Linux Enterprise Desktop 15 SP6, SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE Linux Enterprise Real Time 15 SP6, SUSE openSUSE Leap 15.6, SUSE Basesystem Module 15-SP6, SUSE Development Tools Module 15-SP6, SUSE Linux Enterprise Workstation Extension 15 SP6, SUSE Linux Enterprise High Availability Extension 15 SP6, SUSE Legacy Module 15-SP6, SUSE Linux Enterprise Live Patching 15-SP6 |
--===============0241071922796769080== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3383-1 Rating: important References:
* bsc#1012628 * bsc#1193454 * bsc#1194869 * bsc#1205462 * bsc#1208783 * bsc#1213123 * bsc#1214285 * bsc#1215199 * bsc#1220066 * bsc#1220252 * bsc#1220877 * bsc#1221326 * bsc#1221630 * bsc#1221645 * bsc#1221652 * bsc#1221857 * bsc#1222254 * bsc#1222335 * bsc#1222350 * bsc#1222364 * bsc#1222372 * bsc#1222387 * bsc#1222433 * bsc#1222434 * bsc#1222463 * bsc#1222625 * bsc#1222633 * bsc#1222634 * bsc#1222808 * bsc#1222967 * bsc#1222973 * bsc#1223053 * bsc#1223074 * bsc#1223191 * bsc#1223395 * bsc#1223635 * bsc#1223720 * bsc#1223731 * bsc#1223742 * bsc#1223763 * bsc#1223767 * bsc#1223777 * bsc#1223803 * bsc#1224105 * bsc#1224415 * bsc#1224485 * bsc#1224496 * bsc#1224510 * bsc#1224535 * bsc#1224631 * bsc#1224636 * bsc#1224690 * bsc#1224694 * bsc#1224700 * bsc#1224711 * bsc#1225475 * bsc#1225582 * bsc#1225607 * bsc#1225717 * bsc#1225718 * bsc#1225744 * bsc#1225745 * bsc#1225751 * bsc#1225814 * bsc#1225832 * bsc#1225838 * bsc#1225903 * bsc#1226031 * bsc#1226127 * bsc#1226502 * bsc#1226530 * bsc#1226588 * bsc#1226604 * bsc#1226743 * bsc#1226751 * bsc#1226765 * bsc#1226798 * bsc#1226801 * bsc#1226834 * bsc#1226874 * bsc#1226885 * bsc#1226920 * bsc#1227149 * bsc#1227182 * bsc#1227383 * bsc#1227437 * bsc#1227492 * bsc#1227493 * bsc#1227494 * bsc#1227618 * bsc#1227620 * bsc#1227623 * bsc#1227627 * bsc#1227634 * bsc#1227706 * bsc#1227722 * bsc#1227724 * bsc#1227725 * bsc#1227728 * bsc#1227729 * bsc#1227732 * bsc#1227733 * bsc#1227734 * bsc#1227747 * bsc#1227750 * bsc#1227754 * bsc#1227758 * bsc#1227760 * bsc#1227761 * bsc#1227764 * bsc#1227766 * bsc#1227770 * bsc#1227771 * bsc#1227772 * bsc#1227774 * bsc#1227781 * bsc#1227784 * bsc#1227785 * bsc#1227787 * bsc#1227790 * bsc#1227791 * bsc#1227792 * bsc#1227796 * bsc#1227798 * bsc#1227799 * bsc#1227802 * bsc#1227808 * bsc#1227810 * bsc#1227811 * bsc#1227812 * bsc#1227815 * bsc#1227816 * bsc#1227818 * bsc#1227820 * bsc#1227823 * bsc#1227824 * bsc#1227826 * bsc#1227828 * bsc#1227829 * bsc#1227830 * bsc#1227832 * bsc#1227833 * bsc#1227834 * bsc#1227839 * bsc#1227840 * bsc#1227846 * bsc#1227849 * bsc#1227851 * bsc#1227853 * bsc#1227863 * bsc#1227864 * bsc#1227865 * bsc#1227867 * bsc#1227869 * bsc#1227870 * bsc#1227883 * bsc#1227884 * bsc#1227891 * bsc#1227893 * bsc#1227929 * bsc#1227950 * bsc#1227957 * bsc#1227981 * bsc#1228020 * bsc#1228021 * bsc#1228114 * bsc#1228192 * bsc#1228195 * bsc#1228202 * bsc#1228235 * bsc#1228236 * bsc#1228237 * bsc#1228247 * bsc#1228321 * bsc#1228409 * bsc#1228410 * bsc#1228426 * bsc#1228427 * bsc#1228429 * bsc#1228446 * bsc#1228447 * bsc#1228449 * bsc#1228450 * bsc#1228452 * bsc#1228456 * bsc#1228457 * bsc#1228458 * bsc#1228459 * bsc#1228460 * bsc#1228462 * bsc#1228463 * bsc#1228466 * bsc#1228467 * bsc#1228468 * bsc#1228469 * bsc#1228470 * bsc#1228472 * bsc#1228479 * bsc#1228480 * bsc#1228481 * bsc#1228482 * bsc#1228483 * bsc#1228484 * bsc#1228485 * bsc#1228486 * bsc#1228487 * bsc#1228489 * bsc#1228491 * bsc#1228492 * bsc#1228493 * bsc#1228494 * bsc#1228495 * bsc#1228496 * bsc#1228499 * bsc#1228500 * bsc#1228501 * bsc#1228502 * bsc#1228503 * bsc#1228505 * bsc#1228508 * bsc#1228509 * bsc#1228510 * bsc#1228511 * bsc#1228513 * bsc#1228515 * bsc#1228516 * bsc#1228518 * bsc#1228520 * bsc#1228525 * bsc#1228527 * bsc#1228530 * bsc#1228531 * bsc#1228539 * bsc#1228561 * bsc#1228563 * bsc#1228564 * bsc#1228565 * bsc#1228567 * bsc#1228568 * bsc#1228572 * bsc#1228576 * bsc#1228579 * bsc#1228580 * bsc#1228581 * bsc#1228582 * bsc#1228584 * bsc#1228586 * bsc#1228588 * bsc#1228590 * bsc#1228591 * bsc#1228599 * bsc#1228615 * bsc#1228616 * bsc#1228617 * bsc#1228625 * bsc#1228626 * bsc#1228633 * bsc#1228635 * bsc#1228636 * bsc#1228640 * bsc#1228643 * bsc#1228644 * bsc#1228646 * bsc#1228649 * bsc#1228650 * bsc#1228654 * bsc#1228655 * bsc#1228656 * bsc#1228658 * bsc#1228660 * bsc#1228662 * bsc#1228665 * bsc#1228666 * bsc#1228667 * bsc#1228672 * bsc#1228673 * bsc#1228674 * bsc#1228677 * bsc#1228680 * bsc#1228687 * bsc#1228705 * bsc#1228706 * bsc#1228707 * bsc#1228708 * bsc#1228709 * bsc#1228710 * bsc#1228718 * bsc#1228720 * bsc#1228721 * bsc#1228722 * bsc#1228723 * bsc#1228724 * bsc#1228726 * bsc#1228727 * bsc#1228733 * bsc#1228737 * bsc#1228743 * bsc#1228748 * bsc#1228754 * bsc#1228756 * bsc#1228757 * bsc#1228758 * bsc#1228764 * bsc#1228766 * bsc#1228779 * bsc#1228801 * bsc#1228849 * bsc#1228850 * bsc#1228857 * bsc#1228959 * bsc#1228964 * bsc#1228966 * bsc#1228967 * bsc#1228973 * bsc#1228977 * bsc#1228978 * bsc#1228979 * bsc#1228986 * bsc#1228988 * bsc#1228989 * bsc#1228991 * bsc#1228992 * bsc#1229005 * bsc#1229024 * bsc#1229042 * bsc#1229045 * bsc#1229046 * bsc#1229054 * bsc#1229056 * bsc#1229086 * bsc#1229134 * bsc#1229136 * bsc#1229154 * bsc#1229156 * bsc#1229160 * bsc#1229167 * bsc#1229168 * bsc#1229169 * bsc#1229170 * bsc#1229171 * bsc#1229172 * bsc#1229173 * bsc#1229174 * bsc#1229239 * bsc#1229240 * bsc#1229241 * bsc#1229243 * bsc#1229244 * bsc#1229245 * bsc#1229246 * bsc#1229247 * bsc#1229248 * bsc#1229249 * bsc#1229250 * bsc#1229251 * bsc#1229252 * bsc#1229253 * bsc#1229254 * bsc#1229255 * bsc#1229256 * bsc#1229287 * bsc#1229290 * bsc#1229291 * bsc#1229292 * bsc#1229294 * bsc#1229296 * bsc#1229297 * bsc#1229298 * bsc#1229299 * bsc#1229301 * bsc#1229303 * bsc#1229304 * bsc#1229305 * bsc#1229307 * bsc#1229309 * bsc#1229312 * bsc#1229313 * bsc#1229314 * bsc#1229315 * bsc#1229316 * bsc#1229317 * bsc#1229318 * bsc#1229319 * bsc#1229320 * bsc#1229327 * bsc#1229341 * bsc#1229342 * bsc#1229344 * bsc#1229345 * bsc#1229346 * bsc#1229347 * bsc#1229349 * bsc#1229350 * bsc#1229351 * bsc#1229353 * bsc#1229354 * bsc#1229355 * bsc#1229356 * bsc#1229357 * bsc#1229358 * bsc#1229359 * bsc#1229360 * bsc#1229365 * bsc#1229366 * bsc#1229369 * bsc#1229370 * bsc#1229373 * bsc#1229374 * bsc#1229379 * bsc#1229381 * bsc#1229382 * bsc#1229383 * bsc#1229386 * bsc#1229388 * bsc#1229390 * bsc#1229391 * bsc#1229392 * bsc#1229395 * bsc#1229398 * bsc#1229399 * bsc#1229400 * bsc#1229402 * bsc#1229403 * bsc#1229404 * bsc#1229407 * bsc#1229409 * bsc#1229410 * bsc#1229411 * bsc#1229413 * bsc#1229414 * bsc#1229417 * bsc#1229444 * bsc#1229451 * bsc#1229452 * bsc#1229455 * bsc#1229456 * bsc#1229480 * bsc#1229481 * bsc#1229482 * bsc#1229484 * bsc#1229485 * bsc#1229486 * bsc#1229487 * bsc#1229488 * bsc#1229489 * bsc#1229490 * bsc#1229493 * bsc#1229495 * bsc#1229496 * bsc#1229497 * bsc#1229500 * bsc#1229503 * bsc#1229707 * bsc#1229739 * bsc#1229743 * bsc#1229746 * bsc#1229747 * bsc#1229752 * bsc#1229754 * bsc#1229755 * bsc#1229756 * bsc#1229759 * bsc#1229761 * bsc#1229767 * bsc#1229781 * bsc#1229784 * bsc#1229785 * bsc#1229787 * bsc#1229788 * bsc#1229789 * bsc#1229792 * bsc#1229820 * bsc#1229827 * bsc#1229830 * bsc#1229837 * bsc#1229940 * bsc#1230056 * bsc#1230350 * bsc#1230413 * jsc#PED-10029 * jsc#PED-10045 * jsc#PED-10055 * jsc#PED-10105 * jsc#PED-10108 * jsc#PED-8491 * jsc#PED-8779 * jsc#PED-8954
Cross-References:
* CVE-2023-52489 * CVE-2023-52581 * CVE-2023-52668 * CVE-2023-52688 * CVE-2023-52735 * CVE-2023-52859 * CVE-2023-52885 * CVE-2023-52886 * CVE-2023-52887 * CVE-2023-52889 * CVE-2024-26590 * CVE-2024-26631 * CVE-2024-26637 * CVE-2024-26668 * CVE-2024-26669 * CVE-2024-26677 * CVE-2024-26682 * CVE-2024-26683 * CVE-2024-26691 * CVE-2024-26735 * CVE-2024-26808 * CVE-2024-26809 * CVE-2024-26812 * CVE-2024-26835 * CVE-2024-26837 * CVE-2024-26849 * CVE-2024-26851 * CVE-2024-26889 * CVE-2024-26920 * CVE-2024-26944 * CVE-2024-26976 * CVE-2024-27010 * CVE-2024-27011 * CVE-2024-27024 * CVE-2024-27049 * CVE-2024-27050 * CVE-2024-27079 * CVE-2024-27403 * CVE-2024-27433 * CVE-2024-27437 * CVE-2024-31076 * CVE-2024-35854 * CVE-2024-35855 * CVE-2024-35897 * CVE-2024-35902 * CVE-2024-35913 * CVE-2024-35939 * CVE-2024-35949 * CVE-2024-36270 * CVE-2024-36286 * CVE-2024-36288 * CVE-2024-36489 * CVE-2024-36881 * CVE-2024-36907 * CVE-2024-36909 * CVE-2024-36910 * CVE-2024-36911 * CVE-2024-36929 * CVE-2024-36933 * CVE-2024-36939 * CVE-2024-36970 * CVE-2024-36979 * CVE-2024-38548 * CVE-2024-38563 * CVE-2024-38609 * CVE-2024-38662 * CVE-2024-39476 * CVE-2024-39483 * CVE-2024-39484 * CVE-2024-39486 * CVE-2024-39488 * CVE-2024-39489 * CVE-2024-39491 * CVE-2024-39493 * CVE-2024-39497 * CVE-2024-39499 * CVE-2024-39500 * CVE-2024-39501 * CVE-2024-39505 * CVE-2024-39506 * CVE-2024-39508 * CVE-2024-39509 * CVE-2024-39510 * CVE-2024-40899 * CVE-2024-40900 * CVE-2024-40902 * CVE-2024-40903 * CVE-2024-40904 * CVE-2024-40905 * CVE-2024-40909 * CVE-2024-40910 * CVE-2024-40911 * CVE-2024-40912 * CVE-2024-40913 * CVE-2024-40916 * CVE-2024-40920 * CVE-2024-40921 * CVE-2024-40922 * CVE-2024-40924 * CVE-2024-40926 * CVE-2024-40927 * CVE-2024-40929 * CVE-2024-40930 * CVE-2024-40932 * CVE-2024-40934 * CVE-2024-40936 * CVE-2024-40938 * CVE-2024-40939 * CVE-2024-40941 * CVE-2024-40942 * CVE-2024-40943 * CVE-2024-40944 * CVE-2024-40945 * CVE-2024-40954 * CVE-2024-40956 * CVE-2024-40957 * CVE-2024-40958 * CVE-2024-40959 * CVE-2024-40962 * CVE-2024-40964 * CVE-2024-40967 * CVE-2024-40976 * CVE-2024-40977 * CVE-2024-40978 * CVE-2024-40981 * CVE-2024-40982 * CVE-2024-40984 * CVE-2024-40987 * CVE-2024-40988 * CVE-2024-40989 * CVE-2024-40990 * CVE-2024-40992 * CVE-2024-40994 * CVE-2024-40995 * CVE-2024-40997 * CVE-2024-41000 * CVE-2024-41001 * CVE-2024-41002 * CVE-2024-41004 * CVE-2024-41007 * CVE-2024-41009 * CVE-2024-41010 * CVE-2024-41011 * CVE-2024-41012 * CVE-2024-41015 * CVE-2024-41016 * CVE-2024-41020 * CVE-2024-41022 * CVE-2024-41024 * CVE-2024-41025 * CVE-2024-41028 * CVE-2024-41032 * CVE-2024-41035 * CVE-2024-41036 * CVE-2024-41037 * CVE-2024-41038 * CVE-2024-41039 * CVE-2024-41040 * CVE-2024-41041 * CVE-2024-41044 * CVE-2024-41045 * CVE-2024-41048 * CVE-2024-41049 * CVE-2024-41050 * CVE-2024-41051 * CVE-2024-41056 * CVE-2024-41057 * CVE-2024-41058 * CVE-2024-41059 * CVE-2024-41060 * CVE-2024-41061 * CVE-2024-41062 * CVE-2024-41063 * CVE-2024-41064 * CVE-2024-41065 * CVE-2024-41066 * CVE-2024-41068 * CVE-2024-41069 * CVE-2024-41070 * CVE-2024-41071 * CVE-2024-41072 * CVE-2024-41073 * CVE-2024-41074 * CVE-2024-41075 * CVE-2024-41076 * CVE-2024-41078 * CVE-2024-41079 * CVE-2024-41080 * CVE-2024-41081 * CVE-2024-41084 * CVE-2024-41087 * CVE-2024-41088 * CVE-2024-41089 * CVE-2024-41092 * CVE-2024-41093 * CVE-2024-41094 * CVE-2024-41095 * CVE-2024-41096 * CVE-2024-41097 * CVE-2024-41098 * CVE-2024-42064 * CVE-2024-42069 * CVE-2024-42070 * CVE-2024-42073 * CVE-2024-42074 * CVE-2024-42076 * CVE-2024-42077 * CVE-2024-42079 * CVE-2024-42080 * CVE-2024-42082 * CVE-2024-42085 * CVE-2024-42086 * CVE-2024-42087 * CVE-2024-42089 * CVE-2024-42090 * CVE-2024-42092 * CVE-2024-42093 * CVE-2024-42095 * CVE-2024-42096 * CVE-2024-42097 * CVE-2024-42098 * CVE-2024-42101 * CVE-2024-42104 * CVE-2024-42105 * CVE-2024-42106 * CVE-2024-42107 * CVE-2024-42109 * CVE-2024-42110 * CVE-2024-42113 * CVE-2024-42114 * CVE-2024-42115 * CVE-2024-42117 * CVE-2024-42119 * CVE-2024-42120 * CVE-2024-42121 * CVE-2024-42122 * CVE-2024-42124 * CVE-2024-42125 * CVE-2024-42126 * CVE-2024-42127 * CVE-2024-42130 * CVE-2024-42131 * CVE-2024-42132 * CVE-2024-42133 * CVE-2024-42136 * CVE-2024-42137 * CVE-2024-42138 * CVE-2024-42139 * CVE-2024-42141 * CVE-2024-42142 * CVE-2024-42143 * CVE-2024-42144 * CVE-2024-42145 * CVE-2024-42147 * CVE-2024-42148 * CVE-2024-42152 * CVE-2024-42153 * CVE-2024-42155 * CVE-2024-42156 * CVE-2024-42157 * CVE-2024-42158 * CVE-2024-42159 * CVE-2024-42161 * CVE-2024-42162 * CVE-2024-42223 * CVE-2024-42224 * CVE-2024-42225 * CVE-2024-42226 * CVE-2024-42227 * CVE-2024-42228 * CVE-2024-42229 * CVE-2024-42230 * CVE-2024-42232 * CVE-2024-42236 * CVE-2024-42237 * CVE-2024-42238 * CVE-2024-42239 * CVE-2024-42240 * CVE-2024-42241 * CVE-2024-42244 * CVE-2024-42245 * CVE-2024-42246 * CVE-2024-42247 * CVE-2024-42250 * CVE-2024-42253 * CVE-2024-42259 * CVE-2024-42268 * CVE-2024-42269 * CVE-2024-42270 * CVE-2024-42271 * CVE-2024-42274 * CVE-2024-42276 * CVE-2024-42277 * CVE-2024-42278 * CVE-2024-42279 * CVE-2024-42280 * CVE-2024-42281 * CVE-2024-42283 * CVE-2024-42284 * CVE-2024-42285 * CVE-2024-42286 * CVE-2024-42287 * CVE-2024-42288 * CVE-2024-42289 * CVE-2024-42290 * CVE-2024-42291 * CVE-2024-42292 * CVE-2024-42295 * CVE-2024-42298 * CVE-2024-42301 * CVE-2024-42302 * CVE-2024-42303 * CVE-2024-42308 * CVE-2024-42309 * CVE-2024-42310 * CVE-2024-42311 * CVE-2024-42312 * CVE-2024-42313 * CVE-2024-42314 * CVE-2024-42315 * CVE-2024-42316 * CVE-2024-42318 * CVE-2024-42319 * CVE-2024-42320 * CVE-2024-42322 * CVE-2024-43816 * CVE-2024-43817 * CVE-2024-43818 * CVE-2024-43819 * CVE-2024-43821 * CVE-2024-43823 * CVE-2024-43824 * CVE-2024-43825 * CVE-2024-43826 * CVE-2024-43829 * CVE-2024-43830 * CVE-2024-43831 * CVE-2024-43833 * CVE-2024-43834 * CVE-2024-43837 * CVE-2024-43839 * CVE-2024-43840 * CVE-2024-43841 * CVE-2024-43842 * CVE-2024-43846 * CVE-2024-43847 * CVE-2024-43849 * CVE-2024-43850 * CVE-2024-43851 * CVE-2024-43853 * CVE-2024-43854 * CVE-2024-43855 * CVE-2024-43856 * CVE-2024-43858 * CVE-2024-43860 * CVE-2024-43861 * CVE-2024-43863 * CVE-2024-43864 * CVE-2024-43866 * CVE-2024-43867 * CVE-2024-43871 * CVE-2024-43872 * CVE-2024-43873 * CVE-2024-43874 * CVE-2024-43875 * CVE-2024-43876 * CVE-2024-43877 * CVE-2024-43879 * CVE-2024-43880 * CVE-2024-43881 * CVE-2024-43882 * CVE-2024-43883 * CVE-2024-43884 * CVE-2024-43885 * CVE-2024-43889 * CVE-2024-43892 * CVE-2024-43893 * CVE-2024-43894 * CVE-2024-43895 * CVE-2024-43897 * CVE-2024-43899 * CVE-2024-43900 * CVE-2024-43902 * CVE-2024-43903 * CVE-2024-43905 * CVE-2024-43906 * CVE-2024-43907 * CVE-2024-43908 * CVE-2024-43909 * CVE-2024-43911 * CVE-2024-43912 * CVE-2024-44931 * CVE-2024-44938 * CVE-2024-44939
CVSS scores:
* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52886 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52887 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26682 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-26849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27049 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27050 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36881 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36910 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-36911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36970 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36979 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38563 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39483 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-39483 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39484 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39486 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39491 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2024-39493 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-39500 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39505 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39508 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39510 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-39510 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40899 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40903 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40913 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40922 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40927 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40934 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40936 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-40938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40958 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40967 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40976 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40981 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-40981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40994 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41001 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41002 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41004 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41012 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41020 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41022 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41024 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41024 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41025 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41028 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41040 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41041 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41057 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41057 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41058 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41058 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41061 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-41061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41063 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41065 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41066 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-41066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41069 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41070 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-41071 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41076 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41094 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41096 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42086 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2024-42093 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42097 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42105 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42105 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42117 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42136 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-42136 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-42136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42143 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2024-42144 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42155 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42159 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42161 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42161 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42227 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42230 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42232 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42236 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42253 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42259 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42271 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42274 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42314 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43881 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-43881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43883 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43884 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-43911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43912 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44938 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6
An update that solves 394 vulnerabilities, contains eight features and has 85 security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (bsc#1229827). * CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c (bsc#1229754). * CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503) * CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct objagg_ops (bsc#1229481). * CVE-2024-43866: net/mlx5: Always drain health in shutdown callback (bsc#1229495). * CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header context (bsc#1229496). * CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio (bsc#1229342). * CVE-2024-43854: block: initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove (bsc#1229316). * CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301). * CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map (bsc#1229297). * CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy() (bsc#1229314) * CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi (bsc#1229309). * CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference (bsc#1229315). * CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service (bsc#1229347) * CVE-2024-42318: landlock: Do not lose track of restrictions on cred_transfer (bsc#1229351). * CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level() (bsc#1229353). * CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357) * CVE-2024-42308: Update DRM patch reference (bsc#1229411) * CVE-2024-42301: dev/parport: fix the array out-of-bounds risk (bsc#1229407). * CVE-2024-42295: nilfs2: handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370). * CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters (bsc#1229374). * CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management correctly (bsc#1229379). * CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382) * CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops (bsc#1229383) * CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size (bsc#1229386). * CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409). * CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init() (bsc#1229404). * CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init() (bsc#1229402). * CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload (bsc#1229391). * CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory accesses (bsc#1228988). * CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989). * CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least one movable task" (bsc#1228978). * CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed (bsc#1228986). * CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723). * CVE-2024-42162: gve: Account for stopped queues when reading NIC stats (bsc#1228706). * CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756). * CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys (bsc#1228754). * CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720). * CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727). * CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure (bsc#1228722). * CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys (bsc#1228733). * CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487). * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743). * CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed (bsc#1228491). * CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503). * CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file (bsc#1228500). * CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705). * CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591). * CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts (bsc#1228568). * CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501). * CVE-2024-42109: netfilter: nf_tables: unconditionally flush pending work before notifier (bsc#1228505). * CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494). * CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493). * CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633). * CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level check (bsc#1228446). * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680). * CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482). * CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672). * CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems (bsc#1228457). * CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470). * CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup (bsc#1228472). * CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617). * CVE-2024-41080: io_uring: fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616). * CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655). * CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649). * CVE-2024-41075: cachefiles: add consistency check for copen/cread (bsc#1228646). * CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in copen (bsc#1228643). * CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581). * CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644). * CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure (bsc#1228579). * CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640). * CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599). * CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576). * CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459). * CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462). * CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when dropping object (bsc#1228468). * CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse (bsc#1228499). * CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565). * CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530). * CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520). * CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518). * CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant (bsc#1228496). * CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask (bsc#1228460). * CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path (bsc#1228427). * CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409). * CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247). * CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021). * CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020). * CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863). * CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867). * CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829). * CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823). * CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884). * CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812). * CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (bsc#1227811). * CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (bsc#1227799). * CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840). * CVE-2024-40921: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state (bsc#1227784). * CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state (bsc#1227781). * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798). * CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from() (bsc#1227761) * CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729). * CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623) * CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885). * CVE-2024-36979: net: bridge: mst: fix vlan use-after-free (bsc#1226604). * CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832). * CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814). * CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745). * CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717). * CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744). * CVE-2024-36881: mm/userfaultfd: Fix reset ptes when close() for wr-protected (bsc#1225718). * CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874) * CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801) * CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if- IP-has-been-disabled-on.patch (bsc#1226798) * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700). * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535). * CVE-2024-35897: netfilter: nf_tables: discard table flag update with pending basechain deletion (bsc#1224510). * CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625). * CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe() (bsc#1224711). * CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init() (bsc#1224415). * CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release (bsc#1223742). * CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777). * CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path (bsc#1223803). * CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion (bsc#1223720). * CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (bsc#1223074) * CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973). * CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register failure (bsc#1222967). * CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808). * CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only from destroy path (bsc#1222633). * CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634). * CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-26677: blacklist.conf: Add e7870cf13d20 ("rxrpc: Fix delayed ACKs to not set the reference serial number") (bsc#1222387) * CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload (bsc#1222350). * CVE-2024-26668: netfilter: nft_limit: reject configurations that cause integer overflow (bsc#1222335). * CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630). * CVE-2024-26590: erofs: fix inconsistent per-file compression format (bsc#1220252). * CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during sock creation (bsc#1229287). * CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails (bsc#1225582). * CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255 elements expired (bsc#1220877). * CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326).
The following non-security bugs were fixed:
* ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes). * ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes). * ACPI: battery: create alarm sysfs attribute atomically (stable-fixes). * ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git- fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes). * ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes). * ALSA: hda/realtek - Fixed ALC285 headphone no sound (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes). * ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable- fixes). * ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git- fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra (stable-fixes). * ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3 Pro 360 (stable-fixes). * ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable- fixes). * ALSA: hda/tas2781: Use correct endian conversion (git-fixes). * ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable- fixes). * ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes). * ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git- fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: line6: Fix racy access to midibuf (stable-fixes). * ALSA: seq: Skip event type filtering for UMP events (git-fixes). * ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes). * ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes). * ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes). * ALSA: timer: Relax start tick time check for slave timer elements (git- fixes). * ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes). * ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable- fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable- fixes). * ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes). * ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes). * ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes). * ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before suspend (stable-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: Remove libraries from topology lookups (git-fixes). * ASoC: SOF: amd: Fix for acp init sequence (git-fixes). * ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes). * ASoC: SOF: mediatek: Add missing board compatible (stable-fixes). * ASoC: allow module autoloading for table board_ids (stable-fixes). * ASoC: allow module autoloading for table db1200_pids (stable-fixes). * ASoC: amd: acp: fix module autoloading (git-fixes). * ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx (bsc#1227182). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes). * ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable- fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes). * ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable- fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * ASoC: nau8822: Lower debug print priority (stable-fixes). * Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes). * Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes). * Bluetooth: L2CAP: Fix deadlock (git-fixes). * Bluetooth: MGMT: Add error handling to pair_device() (git-fixes). * Bluetooth: SMP: Fix assumption of Central always being Initiator (git- fixes). * Bluetooth: bnep: Fix out-of-bound access (stable-fixes). * Bluetooth: btintel: Fail setup on error (git-fixes). * Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading (stable-fixes). * Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable- fixes). * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable- fixes). * Bluetooth: hci_conn: Check non NULL function before calling for HFP offload (stable-fixes). * Bluetooth: hci_core: Fix LE quote calculation (git-fixes). * Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes). * Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes). * Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv monitor (git-fixes). * Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git- fixes). * Drop libata patch that caused a regression (bsc#1229054) * HID: wacom: Defer calculation of resolution until resolution_code is known (git-fixes). * Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056). * Input: i8042 - add forcenorestore quirk to leave controller untouched even on s3 (stable-fixes). * Input: i8042 - use new forcenorestore quirk to replace old buggy quirk combination (stable-fixes). * KVM: Always flush async #PF workqueue when vCPU is being destroyed (git- fixes). * KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git- fixes). * KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869). * KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE (bsc#1215199). * KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes). * KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes). * KVM: Stop processing _all_ memslots when "null" mmu_notifier handler is found (git-fixes). * KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes). * KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() (git-fixes). * KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git- fixes). * KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git- fixes). * KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes). * KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git- fixes). * KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes). * KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes). * KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes) * KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes). * KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes). * KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes). * KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes). * KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes). * KVM: arm64: vgic-v4: Restore pending state on host userspace write (git- fixes). * KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() (git-fixes). * KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes). * KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes). * KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes). * KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector (git-fixes). * KVM: nVMX: Check for pending posted interrupts when looking for nested events (git-fixes). * KVM: nVMX: Request immediate exit iff pending nested event needs injection (git-fixes). * KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * KVM: s390: fix validity interception issue when gisa is switched off (git- fixes bsc#1229167). * KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes). * KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes). * Move upstreamed powerpc patches into sorted section * Move upstreamed sound patches into sorted section * Moved upstreamed ASoC patch into sorted section * NFSD: Support write delegations in LAYOUTGET (git-fixes). * NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes). * PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes). * PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git- fixes). * PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes). * RDMA/cache: Release GID table even if leak is detected (git-fixes) * RDMA/device: Return error earlier if port in not valid (git-fixes) * RDMA/hns: Check atomic wr length (git-fixes) * RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes) * RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes) * RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes) * RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes) * RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes) * RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes) * RDMA/hns: Fix unmatch exception handling when init eq table fails (git- fixes) * RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes) * RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes). * RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes) * RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes) * RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes) * RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes) * RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes) * Revert "ALSA: firewire-lib: obsolete workqueue for period update" (bsc#1208783). * Revert "ALSA: firewire-lib: operate for period elapse event in process context" (bsc#1208783). * Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes). * Revert "Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"" (git- fixes). * Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" (git-fixes). * Revert "misc: fastrpc: Restrict untrusted app to attach to privileged PD" (git-fixes). * Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" (bsc#1230413). * Revert "mm, kmsan: fix infinite recursion due to RCU critical section" (bsc#1230413). * Revert "mm/sparsemem: fix race in accessing memory_section->usage" (bsc#1230413). * Revert "usb: gadget: uvc: cleanup request when not in correct state" (stable-fixes). * Revert "usb: typec: tcpm: clear pd_event queue in PORT_RESET" (git-fixes). * SUNRPC: Fix a race to wake a sync task (git-fixes). * SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * Squashfs: fix variable overflow triggered by sysbot (git-fixes). * USB: serial: debug: do not echo input by default (stable-fixes). * Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920) * Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET (jsc#PED-8954, bsc#1227834) * Update patch references for ASoC regression fixes (bsc#1229045, bsc#1229046) * afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes). * apparmor: unpack transition table if dfa is not present (bsc#1226031). * arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git- fixes) * arm64: Add Neoverse-V2 part (git-fixes) * arm64: Fix KASAN random tag seed initialization (git-fixes) * arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git- fixes) * arm64: barrier: Restore spec_bar() macro (git-fixes) * arm64: cputype: Add Cortex-A720 definitions (git-fixes) * arm64: cputype: Add Cortex-A725 definitions (git-fixes) * arm64: cputype: Add Cortex-X1C definitions (git-fixes) * arm64: cputype: Add Cortex-X3 definitions (git-fixes) * arm64: cputype: Add Cortex-X4 definitions (git-fixes) * arm64: cputype: Add Cortex-X925 definitions (git-fixes) * arm64: cputype: Add Neoverse-V3 definitions (git-fixes) * arm64: dts: imx8mp: Add NPU Node (git-fixes) * arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes) * arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes) * arm64: dts: imx8mp: add HDMI power-domains (git-fixes) * arm64: errata: Expand speculative SSBS workaround (again) (git-fixes) * arm64: errata: Expand speculative SSBS workaround (git-fixes) * arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update config files. * arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git- fixes) * ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable- fixes). * ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable- fixes). * blacklist.conf: Add libata upstream revert entry (bsc#1229054) * bnxt_re: Fix imm_data endianness (git-fixes) * bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes) * bpf, lpm: Fix check prefixlen before walking trie (git-fixes). * bpf/tests: Remove duplicate JSGT tests (git-fixes). * bpf: Add crosstask check to __bpf_get_stack (git-fixes). * bpf: Detect IP == ksym.end as part of BPF program (git-fixes). * bpf: Ensure proper register state printing for cond jumps (git-fixes). * bpf: Fix a few selftest failures due to llvm18 change (git-fixes). * bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903). * bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes). * bpf: Fix kfunc callback register type handling (git-fixes). * bpf: Fix prog_array_map_poke_run map poke update (git-fixes). * bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes). * bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git- fixes). * bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes). * bpf: Set uattr->batch.count as zero before batched update or deletion (git- fixes). * bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git- fixes). * bpf: enforce precision of R0 on callback return (git-fixes). * bpf: extract bpf_ctx_convert_map logic and make it more reusable (git- fixes). * bpf: fix control-flow graph checking in privileged mode (git-fixes). * bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg (git-fixes). * bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes). * bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes). * bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git- fixes). * bpftool: Align output skeleton ELF code (git-fixes). * bpftool: Fix -Wcast-qual warning (git-fixes). * bpftool: Silence build warning about calloc() (git-fixes). * bpftool: mark orphaned programs during prog show (git-fixes). * btrfs: add a btrfs_finish_ordered_extent helper (git-fixes). * btrfs: add a is_data_bbio helper (git-fixes). * btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes). * btrfs: copy dir permission and time when creating a stub subvolume (bsc#1228321). * btrfs: ensure fast fsync waits for ordered extents after a write failure (git-fixes). * btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes). * btrfs: factor out a can_finish_ordered_extent helper (git-fixes). * btrfs: fix corruption after buffer fault in during direct IO append write (git-fixes). * btrfs: fix double inode unlock for direct IO sync writes (git-fixes). * btrfs: fix extent map use-after-free when adding pages to compressed bio (git-fixes). * btrfs: fix leak of qgroup extent records after transaction abort (git- fixes). * btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git- fixes). * btrfs: limit write bios to a single ordered extent (git-fixes). * btrfs: make btrfs_finish_ordered_extent() return void (git-fixes). * btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow (git-fixes). * btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes). * btrfs: open code end_extent_writepage in end_bio_extent_writepage (git- fixes). * btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes). * btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes). * btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes). * btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes). * btrfs: remove btrfs_add_ordered_extent (git-fixes). * btrfs: rename err to ret in btrfs_direct_write() (git-fixes). * btrfs: uninline some static inline helpers from tree-log.h (git-fixes). * btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git- fixes). * btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes). * btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes). * btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git- fixes). * btrfs: use btrfs_finish_ordered_extent to complete direct writes (git- fixes). * btrfs: use irq safe locking when running and adding delayed iputs (git- fixes). * cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand- mode (bsc#1229245). * cachefiles: add missing lock protection when polling (bsc#1229256). * cachefiles: add restore command to recover inflight ondemand read requests (bsc#1229244). * cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249). * cachefiles: cancel all requests for the object that is being dropped (bsc#1229255). * cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (bsc#1229251). * cachefiles: extract ondemand info field from cachefiles_object (bsc#1229240). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() (bsc#1229247). * cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() (bsc#1229246). * cachefiles: introduce object ondemand state (bsc#1229239). * cachefiles: make on-demand read killable (bsc#1229252). * cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode (bsc#1229243). * cachefiles: never get a new anonymous fd if ondemand_id is valid (bsc#1229250). * cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229253). * cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read() (bsc#1229248). * cachefiles: resend an open request if the read request's object is closed (bsc#1229241). * cachefiles: stop sending new request when dropping object (bsc#1229254). * can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index erratum (stable-fixes). * can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes). * ceph: periodically flush the cap releases (bsc#1230056). * cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801). * cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254). * cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254). * cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254). * cgroup: Remove unnecessary list_empty() (bsc#1222254). * cgroup: preserve KABI of cgroup_root (bsc#1222254). * char: xillybus: Check USB endpoints when probing device (git-fixes). * char: xillybus: Do not destroy workqueue from work item running on it (stable-fixes). * char: xillybus: Refine workqueue handling (git-fixes). * clk: en7523: fix rate divider for slic and spi clocks (git-fixes). * clk: qcom: Park shared RCGs upon registration (git-fixes). * clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git- fixes). * clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git- fixes). * clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git- fixes). * clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags (git-fixes). * clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes). * clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git- fixes). * clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error (git-fixes). * clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider (stable-fixes). * clocksource/drivers/sh_cmt: Address race condition for clock events (stable- fixes). * cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * dev/parport: fix the array out-of-bounds risk (stable-fixes). * device property: Add cleanup.h based fwnode_handle_put() scope based cleanup (stable-fixes). * dmaengine: dw: Add memory bus width verification (git-fixes). * dmaengine: dw: Add peripheral bus width verification (git-fixes). * docs: KVM: Fix register ID of SPSR_FIQ (git-fixes). * driver core: Fix uevent_show() vs driver detach race (git-fixes). * drm/admgpu: fix dereferencing null pointer context (stable-fixes). * drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes). * drm/amd/display: Add null checker before passing variables (stable-fixes). * drm/amd/display: Adjust cursor position (git-fixes). * drm/amd/display: Check for NULL pointer (stable-fixes). * drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable- fixes). * drm/amd/display: avoid using null object of framebuffer (git-fixes). * drm/amd/display: fix cursor offset on rotation 180 (git-fixes). * drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes). * drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable- fixes). * drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes). * drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes). * drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes). * drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes). * drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable- fixes). * drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes). * drm/amdgpu: Actually check flags for all context ops (stable-fixes). * drm/amdgpu: Add lock around VF RLCG interface (stable-fixes). * drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes). * drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes). * drm/amdgpu: Validate TA binary size (stable-fixes). * drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes). * drm/amdgpu: fix potential resource leak warning (stable-fixes). * drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable- fixes). * drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes). * drm/client: fix null pointer dereference in drm_client_modeset_probe (git- fixes). * drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes). * drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes). * drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes). * drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes). * drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes). * drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes). * drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git- fixes). * drm/lima: set gp bus_stop bit before hard reset (stable-fixes). * drm/mediatek/dp: Fix spurious kfree() (git-fixes). * drm/msm/dp: fix the max supported bpp logic (git-fixes). * drm/msm/dp: reset the link phy params before link training (git-fixes). * drm/msm/dpu: capture snapshot on the first commit_done timeout (stable- fixes). * drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes). * drm/msm/dpu: do not play tricks with debug macros (git-fixes). * drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes). * drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() (git-fixes). * drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable- fixes). * drm/msm/dpu: take plane rotation into account for wide planes (git-fixes). * drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes). * drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable- fixes). * drm/msm/mdss: Rename path references to mdp_path (stable-fixes). * drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes). * drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes). * drm/nouveau: prime: fix refcount underflow (git-fixes). * drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes). * drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024). * drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes). * drm/rockchip: vop2: clear afbc en and transform bit for cluster window at linear mode (stable-fixes). * drm/virtio: Fix type of dma-fence context variable (git-fixes). * drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes). * drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes). * drm/vmwgfx: Fix prime with external buffers (git-fixes). * efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes). * evm: do not copy up 'security.evm' xattr (git-fixes). * firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes). * fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229455). * fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229456). * genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git- fixes). * genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git- fixes). * genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git- fixes). * gfs2: setattr_chown: Add missing initialization (git-fixes). * gpio: mlxbf3: Support shutdown() function (git-fixes). * gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable- fixes). * gpio: sysfs: extend the critical section for unregistering sysfs devices (stable-fixes). * gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git- fixes). * hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes). * hwmon: (ltc2992) Avoid division by zero (stable-fixes). * hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes). * hwmon: (pc87360) Bounds check data->innr usage (stable-fixes). * i2c: Fix conditional for substituting empty ACPI functions (stable-fixes). * i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes). * i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes). * i2c: riic: avoid potential division by zero (stable-fixes). * i2c: smbus: Improve handling of stuck alerts (git-fixes). * i2c: smbus: Send alert notifications to all devices if source not found (git-fixes). * i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes). * i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable- fixes). * i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable- fixes). * i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes). * ice: Fix NULL pointer access, if PF does not support SRIOV_LAG (bsc#1228737). * io_uring/advise: support 64-bit lengths (git-fixes). * io_uring: Drop per-ctx dummy_ubuf (git-fixes). * io_uring: Fix probe of disabled operations (git-fixes). * io_uring: fix io_match_task must_hold (git-fixes). * io_uring: tighten task exit cancellations (git-fixes). * iommu/amd: Convert comma to semicolon (git-fixes). * iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes). * iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git- fixes). * ip6_tunnel: Fix broken GRO (bsc#1229444). * ipv6: sr: fix incorrect unregister order (git-fixes). * irqdomain: Fixed unbalanced fwnode get and put (git-fixes). * jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes). * jfs: define xtree root and page independently (git-fixes). * jfs: fix null ptr deref in dtInsertEntry (git-fixes). * jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git- fixes). * jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes). * jump_label: Fix the fix, brown paper bags galore (git-fixes). * jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git- fixes). * kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes). * kABI workaround for sound core UMP conversion (stable-fixes). * kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes). * kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes). * kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783) * kabi: more build fix without patches.kabi (bsc#1226502) * kcov: properly check for softirq context (git-fixes). * kernel-binary.spec.in: Enable klp_symbols on openSUSE Tumbleweed (boo#1229042). * kernel-binary: generate and install compile_commands.json (bsc#1228971). * kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() (bsc#1229134). * kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git- fixes). * kprobes: Fix to check symbol prefixes correctly (git-fixes). * kprobes: Prohibit probing on CFI preamble symbol (git-fixes). * kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes bsc#1229168). * libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API (git-fixes). * libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git- fixes). * libbpf: Fix faccessat() usage on Android (git-fixes). * libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix hanging issue while a new disk adding (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395). * md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26 (bsc#1223395). * md/md-bitmap: fix writing non bitmap pages (git-fixes). * md/raid1: set max_sectors during early return from choose_slow_rdev() (git- fixes). * md/raid1: support read error check (git-fixes). * md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (git-fixes). * md/raid5: fix spares errors about rcu usage (git-fixes). * md/raid5: recheck if reshape has finished with device_lock held (git-fixes). * md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git- fixes). * md: add a mddev_add_trace_msg helper (git-fixes). * md: add check for sleepers in md_wakeup_thread() (git-fixes). * md: change the return value type of md_write_start to void (git-fixes). * md: do not account sync_io if iostats of the disk is disabled (git-fixes). * md: do not delete safemode_timer in mddev_suspend (git-fixes). * md: factor out a helper exceed_read_errors() to check read_errors (git- fixes). * md: fix a suspicious RCU usage warning (git-fixes). * media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes). * media: amphion: Remove lock in s_ctrl callback (stable-fixes). * media: drivers/media/dvb-core: copy user arrays safely (stable-fixes). * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes). * media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes). * media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes). * media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes). * media: uvcvideo: Ignore empty TS packets (stable-fixes). * media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes). * media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes). * memcg: protect concurrent access to mem_cgroup_idr (git-fixes). * memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes). * memory: tegra: Skip SID programming if SID registers are not set (stable- fixes). * minmax: add a few more MIN_T/MAX_T users (bsc#1229024). * minmax: avoid overly complicated constant expressions in VM code (bsc#1229024). * minmax: do not use max() in situations that want a C constant expression (bsc#1229024). * minmax: fix up min3() and max3() too (bsc#1229024). * minmax: improve macro expansion and type checking (bsc#1229024). * minmax: make generic MIN() and MAX() macros available everywhere (bsc#1229024). * minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024). * minmax: simplify min()/max()/clamp() implementation (bsc#1229024). * mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes). * mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes). * mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes). * mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes). * mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes). * net/iucv: fix the allocation size of iucv_path_table array (git-fixes bsc#1229451). * net/iucv: fix use after free in iucv_sock_close() (bsc#1228973). * net/rds: fix possible cp null dereference (git-fixes). * net/sched: initialize noop_qdisc owner (git-fixes). * net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes). * net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() (git-fixes). * net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757). * net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530). * net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086). * net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: missing check virtio (git-fixes). * net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes). * net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes). * net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462). * nfc: pn533: Add poll mod list filling check (git-fixes). * nfs: do not invalidate dentries on transient errors (git-fixes). * nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes). * nfs: make the rpc_stat per net namespace (git-fixes). * nfs: pass explicit offset/count to trace events (git-fixes). * nfs: propagate readlink errors in nfs_symlink_filler (git-fixes). * nouveau/firmware: use dma non-coherent allocator (git-fixes). * nvme-multipath: find NUMA path only for online numa-node (git-fixes). * nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706). * nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706). * nvme-pci: Fix the instructions for disabling power management (git-fixes). * nvme-pci: add missing condition check for existence of mapped data (git- fixes). * nvme-pci: do not directly handle subsys reset fallout (bsc#1220066). * nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857). * nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857). * nvme-tcp: check for invalidated or revoked key (bsc#1221857). * nvme-tcp: sanitize TLS key handling (bsc#1221857). * nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857). * nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes). * nvme: avoid double free special payload (git-fixes). * nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git- fixes). * nvme: fixup comment for nvme RDMA Provider Type (git-fixes). * nvme: split off TLS sysfs attributes into a separate group (bsc#1221857). * nvme: tcp: remove unnecessary goto statement (bsc#1221857). * nvme_core: scan namespaces asynchronously (bsc#1224105). * nvmet-auth: fix nvmet_auth hash error handling (git-fixes). * nvmet: always initialize cqe.result (git-fixes). * nvmet: do not return 'reserved' for empty TSAS values (git-fixes). * nvmet: fix a possible leak when destroy a ctrl during qp establishment (git- fixes). * nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes). * ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes). * perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git- fixes). * pinctrl: mediatek: common-v2: Fix broken bias-disable for PULL_PU_PD_RSEL_TYPE (git-fixes). * pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git- fixes). * pinctrl: single: fix potential NULL dereference in pcs_get_function() (git- fixes). * pinctrl: starfive: jh7110: Correct the level trigger configuration of iev register (git-fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git- fixes). * platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes). * platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779). * platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779). * platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779). * platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779). * platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779). * platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779). * platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779). * platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779). * platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779). * platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779). * platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779). * platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779). * platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes). * platform/x86: lg-laptop: fix %s null argument warning (stable-fixes). * power: supply: axp288_charger: Fix constant_charge_voltage writes (git- fixes). * power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes). * power: supply: qcom_battmgr: return EAGAIN when firmware service is not up (git-fixes). * powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869). * powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869). * powerpc/kexec: make the update_cpus_node() function public (bsc#1194869). * powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869). * powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869). * powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869). * powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869). * powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869). * powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes). * powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869). * powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869). * powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869). * printk/panic: Allow cpu backtraces to be written into ringbuffer during panic (bsc#1225607). * reiserfs: fix uninit-value in comp_keys (git-fixes). * rtc: nct3018y: fix possible NULL dereference (stable-fixes). * s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes bsc#1229171). * s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229173). * s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229452). * s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes bsc#1229174). * s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes bsc#1229172). * s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172). * s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720). * s390/pkey: introduce dynamic debugging for pkey (bsc#1228720). * s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169). * s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229170). * samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes). * samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes). * sbitmap: use READ_ONCE to access map->word (stable-fixes). * scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857). * scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857). * scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857). * scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857). * scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857). * scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857). * scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857). * scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857). * scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850). * scsi: qla2xxx: Complete command early within lock (bsc#1228850). * scsi: qla2xxx: Convert comma to semicolon (bsc#1228850). * scsi: qla2xxx: Drop driver owner assignment (bsc#1228850). * scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850). * scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850). * scsi: qla2xxx: Fix flash read failure (bsc#1228850). * scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850). * scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850). * scsi: qla2xxx: Indent help text (bsc#1228850). * scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850). * scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850). * scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850). * scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850). * scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850). * scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850). * scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850). * selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values (git-fixes). * selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903). * selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes). * selftests/bpf: Add netkit to tc_redirect selftest (git-fixes). * selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes). * selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes). * selftests/bpf: Fix erroneous bitmask operation (git-fixes). * selftests/bpf: Fix issues in setup_classid_environment() (git-fixes). * selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes). * selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes). * selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes). * selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes). * selftests/bpf: Make linked_list failure test more robust (git-fixes). * selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git- fixes). * selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not available (git-fixes). * selftests/bpf: Wait for the netstamp_needed_key static key to be turned on (git-fixes). * selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes). * selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git- fixes). * selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes). * selftests/bpf: satisfy compiler by having explicit return in btf test (git- fixes). * serial: core: check uartclk for zero to avoid divide by zero (stable-fixes). * soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes). * soc: qcom: pmic_glink: Actually communicate when remote goes down (git- fixes). * soundwire: stream: fix programming slave ports for non-continous port maps (git-fixes). * spi: Add empty versions of ACPI functions (stable-fixes). * spi: microchip-core: fix init function not setting the master and motorola modes (git-fixes). * spi: microchip-core: switch to use modern name (stable-fixes). * spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes). * spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes). * squashfs: squashfs_read_data need to check if the length is 0 (git-fixes). * ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes). * staging: iio: resolver: ad2s1210: fix use before initialization (stable- fixes). * staging: ks7010: disable bh on tx_dev_lock (stable-fixes). * string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849). * sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes). * swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git- fixes). * swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes). * syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes). * thermal/drivers/broadcom: Fix race between removal and clock disable (git- fixes). * thermal: bcm2835: Convert to platform remove callback returning void (stable-fixes). * thunderbolt: Mark XDomain as unplugged when router is removed (stable- fixes). * tools/perf: Fix perf bench epoll to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix perf bench futex to enable the run when some CPU's are offline (bsc#1227747). * tools/perf: Fix timing issue with parallel threads in perf bench wake-up- parallel (bsc#1227747). * tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids (git-fixes). * tools/resolve_btfids: Fix cross-compilation to non-host endianness (git- fixes). * tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git- fixes). * tools/resolve_btfids: fix build with musl libc (git-fixes). * trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes). * tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes). * tty: atmel_serial: use the correct RTS flag (git-fixes). * tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git- fixes). * usb: cdnsp: fix for Link TRB with TC (git-fixes). * usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes). * usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in remove_power_attributes() (git-fixes). * usb: dwc3: core: Skip setting event buffers for host only controllers (stable-fixes). * usb: dwc3: omap: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: add missing depopulate in probe error path (git-fixes). * usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes). * usb: gadget: core: Check for unset descriptor (git-fixes). * usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes). * usb: gadget: u_audio: Check return codes from usb_ep_enable and config_ep_by_speed (git-fixes). * usb: gadget: u_serial: Set start_delayed during suspend (git-fixes). * usb: gadget: uvc: cleanup request when not in correct state (stable-fixes). * usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes). * usb: typec: fsa4480: Check if the chip is really there (git-fixes). * usb: typec: fsa4480: Relax CHIP_ID check (git-fixes). * usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes). * usb: typec: fsa4480: rework mux & switch setup to handle more states (git- fixes). * usb: vhci-hcd: Do not drop references before new references are gained (stable-fixes). * vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes). * vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes). * vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes). * vhost/vsock: always initialize seqpacket_allow (git-fixes). * vhost: Release worker mutex during flushes (git-fixes). * vhost: Use virtqueue mutex for swapping worker (git-fixes). * virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes). * virtio-crypto: handle config changed by work queue (git-fixes). * virtio: reenable config if freezing device failed (git-fixes). * virtio_net: use u64_stats_t infra to avoid data-races (git-fixes). * virtiofs: forbid newlines in tags (bsc#1229940). * wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable- fixes). * wifi: ath12k: fix soft lockup on suspend (git-fixes). * wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes). * wifi: cfg80211: fix reporting failed MLO links status with cfg80211_connect_done (git-fixes). * wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes). * wifi: mac80211: use monitor sdata with driver only if desired (git-fixes). * wifi: mwifiex: duplicate static structs used in driver instances (git- fixes). * wifi: nl80211: disallow setting special AP channel widths (stable-fixes). * wifi: nl80211: do not give key data to userspace (stable-fixes). * wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes). * wifi: wfx: repair open network AP mode (git-fixes). * workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454). * workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454). * x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git- fixes). * x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes). * x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes). * x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes). * x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes). * x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git- fixes). * x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes). * x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes). * x86/numa: Introduce numa_fill_memblks() (git-fixes). * x86/pci: Skip early E820 check for ECAM region (git-fixes). * x86/xen: Convert comma to semicolon (git-fixes). * xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes). * xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes). * xfs: allow cross-linking special files without project quota (git-fixes). * xfs: allow symlinks with short remote targets (bsc#1229160). * xfs: allow unlinked symlinks and dirs with zero size (git-fixes). * xfs: attr forks require attr, not attr2 (git-fixes). * xfs: convert comma to semicolon (git-fixes). * xfs: do not use current->journal_info (git-fixes). * xfs: fix unlink vs cluster buffer instantiation race (git-fixes). * xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes). * xfs: journal geometry is not properly bounds checked (git-fixes). * xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes). * xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item recovery (git-fixes). * xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git- fixes). * xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes). * xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes). * xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes). * xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6 zypper in -t patch SUSE-2024-3383=1 openSUSE-SLE-15.6-2024-3383=1
* Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3383=1
* Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3383=1
* Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3383=1
* SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3383=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3383=1
* SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3383=1
## Package List:
* openSUSE Leap 15.6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (noarch) * kernel-devel-6.4.0-150600.23.22.1 * kernel-macros-6.4.0-150600.23.22.1 * kernel-docs-html-6.4.0-150600.23.22.1 * kernel-source-6.4.0-150600.23.22.1 * kernel-source-vanilla-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (nosrc ppc64le x86_64) * kernel-debug-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (ppc64le x86_64) * kernel-debug-livepatch-devel-6.4.0-150600.23.22.1 * kernel-debug-devel-6.4.0-150600.23.22.1 * kernel-debug-debugsource-6.4.0-150600.23.22.1 * kernel-debug-devel-debuginfo-6.4.0-150600.23.22.1 * kernel-debug-debuginfo-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (x86_64) * kernel-debug-vdso-debuginfo-6.4.0-150600.23.22.1 * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.22.1 * kernel-debug-vdso-6.4.0-150600.23.22.1 * kernel-default-vdso-6.4.0-150600.23.22.1 * kernel-kvmsmall-vdso-6.4.0-150600.23.22.1 * kernel-default-vdso-debuginfo-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3 * kernel-kvmsmall-devel-6.4.0-150600.23.22.1 * kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.22.1 * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.22.1 * kernel-kvmsmall-debugsource-6.4.0-150600.23.22.1 * kernel-kvmsmall-debuginfo-6.4.0-150600.23.22.1 * kernel-default-base-rebuild-6.4.0-150600.23.22.1.150600.12.8.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kernel-syms-6.4.0-150600.23.22.1 * kernel-default-extra-6.4.0-150600.23.22.1 * cluster-md-kmp-default-6.4.0-150600.23.22.1 * dlm-kmp-default-6.4.0-150600.23.22.1 * kernel-default-optional-6.4.0-150600.23.22.1 * kernel-obs-build-debugsource-6.4.0-150600.23.22.1 * kernel-default-livepatch-6.4.0-150600.23.22.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-livepatch-devel-6.4.0-150600.23.22.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-optional-debuginfo-6.4.0-150600.23.22.1 * kselftests-kmp-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.22.1 * kselftests-kmp-default-6.4.0-150600.23.22.1 * ocfs2-kmp-default-6.4.0-150600.23.22.1 * kernel-obs-build-6.4.0-150600.23.22.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.22.1 * kernel-default-devel-6.4.0-150600.23.22.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1 * gfs2-kmp-default-6.4.0-150600.23.22.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1 * reiserfs-kmp-default-6.4.0-150600.23.22.1 * kernel-obs-qa-6.4.0-150600.23.22.1 * kernel-default-debugsource-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3 * kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3 * kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3 * openSUSE Leap 15.6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1 * kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (nosrc) * dtb-aarch64-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (aarch64) * kernel-64kb-extra-6.4.0-150600.23.22.1 * kselftests-kmp-64kb-6.4.0-150600.23.22.1 * dtb-apple-6.4.0-150600.23.22.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1 * dlm-kmp-64kb-6.4.0-150600.23.22.1 * kernel-64kb-debugsource-6.4.0-150600.23.22.1 * kernel-64kb-debuginfo-6.4.0-150600.23.22.1 * dtb-arm-6.4.0-150600.23.22.1 * kernel-64kb-optional-6.4.0-150600.23.22.1 * kernel-64kb-extra-debuginfo-6.4.0-150600.23.22.1 * dtb-allwinner-6.4.0-150600.23.22.1 * dtb-broadcom-6.4.0-150600.23.22.1 * dtb-qcom-6.4.0-150600.23.22.1 * dtb-amd-6.4.0-150600.23.22.1 * kernel-64kb-livepatch-devel-6.4.0-150600.23.22.1 * ocfs2-kmp-64kb-6.4.0-150600.23.22.1 * dtb-amazon-6.4.0-150600.23.22.1 * kernel-64kb-devel-6.4.0-150600.23.22.1 * dtb-hisilicon-6.4.0-150600.23.22.1 * gfs2-kmp-64kb-6.4.0-150600.23.22.1 * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.22.1 * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.22.1 * dtb-renesas-6.4.0-150600.23.22.1 * dtb-sprd-6.4.0-150600.23.22.1 * dtb-nvidia-6.4.0-150600.23.22.1 * dtb-apm-6.4.0-150600.23.22.1 * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1 * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1 * dtb-altera-6.4.0-150600.23.22.1 * dtb-amlogic-6.4.0-150600.23.22.1 * dtb-lg-6.4.0-150600.23.22.1 * dtb-xilinx-6.4.0-150600.23.22.1 * kernel-64kb-optional-debuginfo-6.4.0-150600.23.22.1 * dtb-marvell-6.4.0-150600.23.22.1 * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.22.1 * dtb-freescale-6.4.0-150600.23.22.1 * dtb-cavium-6.4.0-150600.23.22.1 * cluster-md-kmp-64kb-6.4.0-150600.23.22.1 * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.22.1 * dtb-rockchip-6.4.0-150600.23.22.1 * dtb-mediatek-6.4.0-150600.23.22.1 * reiserfs-kmp-64kb-6.4.0-150600.23.22.1 * dtb-exynos-6.4.0-150600.23.22.1 * dtb-socionext-6.4.0-150600.23.22.1 * openSUSE Leap 15.6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.22.1 * Basesystem Module 15-SP6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.22.1 * Basesystem Module 15-SP6 (aarch64) * kernel-64kb-debugsource-6.4.0-150600.23.22.1 * kernel-64kb-debuginfo-6.4.0-150600.23.22.1 * kernel-64kb-devel-6.4.0-150600.23.22.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.22.1 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-6.4.0-150600.23.22.1 * kernel-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-devel-6.4.0-150600.23.22.1 * kernel-default-debugsource-6.4.0-150600.23.22.1 * Basesystem Module 15-SP6 (noarch) * kernel-devel-6.4.0-150600.23.22.1 * kernel-macros-6.4.0-150600.23.22.1 * Basesystem Module 15-SP6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.22.1 * Basesystem Module 15-SP6 (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1 * kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1 * Development Tools Module 15-SP6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.22.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.4.0-150600.23.22.1 * kernel-syms-6.4.0-150600.23.22.1 * kernel-obs-build-debugsource-6.4.0-150600.23.22.1 * Development Tools Module 15-SP6 (noarch) * kernel-source-6.4.0-150600.23.22.1 * Legacy Module 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.22.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-6.4.0-150600.23.22.1 * kernel-default-debuginfo-6.4.0-150600.23.22.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-debugsource-6.4.0-150600.23.22.1 * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.22.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-default-livepatch-6.4.0-150600.23.22.1 * kernel-default-livepatch-devel-6.4.0-150600.23.22.1 * kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3 * kernel-default-debuginfo-6.4.0-150600.23.22.1 * kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3 * kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3 * kernel-default-debugsource-6.4.0-150600.23.22.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1 * gfs2-kmp-default-6.4.0-150600.23.22.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-debuginfo-6.4.0-150600.23.22.1 * ocfs2-kmp-default-6.4.0-150600.23.22.1 * cluster-md-kmp-default-6.4.0-150600.23.22.1 * dlm-kmp-default-6.4.0-150600.23.22.1 * kernel-default-debugsource-6.4.0-150600.23.22.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.22.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.22.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * kernel-default-extra-debuginfo-6.4.0-150600.23.22.1 * kernel-default-debuginfo-6.4.0-150600.23.22.1 * kernel-default-extra-6.4.0-150600.23.22.1 * kernel-default-debugsource-6.4.0-150600.23.22.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52489.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52668.html * https://www.suse.com/security/cve/CVE-2023-52688.html * https://www.suse.com/security/cve/CVE-2023-52735.html * https://www.suse.com/security/cve/CVE-2023-52859.html * https://www.suse.com/security/cve/CVE-2023-52885.html * https://www.suse.com/security/cve/CVE-2023-52886.html * https://www.suse.com/security/cve/CVE-2023-52887.html * https://www.suse.com/security/cve/CVE-2023-52889.html * https://www.suse.com/security/cve/CVE-2024-26590.html * https://www.suse.com/security/cve/CVE-2024-26631.html * https://www.suse.com/security/cve/CVE-2024-26637.html * https://www.suse.com/security/cve/CVE-2024-26668.html * https://www.suse.com/security/cve/CVE-2024-26669.html * https://www.suse.com/security/cve/CVE-2024-26677.html * https://www.suse.com/security/cve/CVE-2024-26682.html * https://www.suse.com/security/cve/CVE-2024-26683.html * https://www.suse.com/security/cve/CVE-2024-26691.html * https://www.suse.com/security/cve/CVE-2024-26735.html * https://www.suse.com/security/cve/CVE-2024-26808.html * https://www.suse.com/security/cve/CVE-2024-26809.html * https://www.suse.com/security/cve/CVE-2024-26812.html * https://www.suse.com/security/cve/CVE-2024-26835.html * https://www.suse.com/security/cve/CVE-2024-26837.html * https://www.suse.com/security/cve/CVE-2024-26849.html * https://www.suse.com/security/cve/CVE-2024-26851.html * https://www.suse.com/security/cve/CVE-2024-26889.html * https://www.suse.com/security/cve/CVE-2024-26920.html * https://www.suse.com/security/cve/CVE-2024-26944.html * https://www.suse.com/security/cve/CVE-2024-26976.html * https://www.suse.com/security/cve/CVE-2024-27010.html * https://www.suse.com/security/cve/CVE-2024-27011.html * https://www.suse.com/security/cve/CVE-2024-27024.html * https://www.suse.com/security/cve/CVE-2024-27049.html * https://www.suse.com/security/cve/CVE-2024-27050.html * https://www.suse.com/security/cve/CVE-2024-27079.html * https://www.suse.com/security/cve/CVE-2024-27403.html * https://www.suse.com/security/cve/CVE-2024-27433.html * https://www.suse.com/security/cve/CVE-2024-27437.html * https://www.suse.com/security/cve/CVE-2024-31076.html * https://www.suse.com/security/cve/CVE-2024-35854.html * https://www.suse.com/security/cve/CVE-2024-35855.html * https://www.suse.com/security/cve/CVE-2024-35897.html * https://www.suse.com/security/cve/CVE-2024-35902.html * https://www.suse.com/security/cve/CVE-2024-35913.html * https://www.suse.com/security/cve/CVE-2024-35939.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36270.html * https://www.suse.com/security/cve/CVE-2024-36286.html * https://www.suse.com/security/cve/CVE-2024-36288.html * https://www.suse.com/security/cve/CVE-2024-36489.html * https://www.suse.com/security/cve/CVE-2024-36881.html * https://www.suse.com/security/cve/CVE-2024-36907.html * https://www.suse.com/security/cve/CVE-2024-36909.html * https://www.suse.com/security/cve/CVE-2024-36910.html * https://www.suse.com/security/cve/CVE-2024-36911.html * https://www.suse.com/security/cve/CVE-2024-36929.html * https://www.suse.com/security/cve/CVE-2024-36933.html * https://www.suse.com/security/cve/CVE-2024-36939.html * https://www.suse.com/security/cve/CVE-2024-36970.html * https://www.suse.com/security/cve/CVE-2024-36979.html * https://www.suse.com/security/cve/CVE-2024-38548.html * https://www.suse.com/security/cve/CVE-2024-38563.html * https://www.suse.com/security/cve/CVE-2024-38609.html * https://www.suse.com/security/cve/CVE-2024-38662.html * https://www.suse.com/security/cve/CVE-2024-39476.html * https://www.suse.com/security/cve/CVE-2024-39483.html * https://www.suse.com/security/cve/CVE-2024-39484.html * https://www.suse.com/security/cve/CVE-2024-39486.html * https://www.suse.com/security/cve/CVE-2024-39488.html * https://www.suse.com/security/cve/CVE-2024-39489.html * https://www.suse.com/security/cve/CVE-2024-39491.html * https://www.suse.com/security/cve/CVE-2024-39493.html * https://www.suse.com/security/cve/CVE-2024-39497.html * https://www.suse.com/security/cve/CVE-2024-39499.html * https://www.suse.com/security/cve/CVE-2024-39500.html * https://www.suse.com/security/cve/CVE-2024-39501.html * https://www.suse.com/security/cve/CVE-2024-39505.html * https://www.suse.com/security/cve/CVE-2024-39506.html * https://www.suse.com/security/cve/CVE-2024-39508.html * https://www.suse.com/security/cve/CVE-2024-39509.html * https://www.suse.com/security/cve/CVE-2024-39510.html * https://www.suse.com/security/cve/CVE-2024-40899.html * https://www.suse.com/security/cve/CVE-2024-40900.html * https://www.suse.com/security/cve/CVE-2024-40902.html * https://www.suse.com/security/cve/CVE-2024-40903.html * https://www.suse.com/security/cve/CVE-2024-40904.html * https://www.suse.com/security/cve/CVE-2024-40905.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40910.html * https://www.suse.com/security/cve/CVE-2024-40911.html * https://www.suse.com/security/cve/CVE-2024-40912.html * https://www.suse.com/security/cve/CVE-2024-40913.html * https://www.suse.com/security/cve/CVE-2024-40916.html * https://www.suse.com/security/cve/CVE-2024-40920.html * https://www.suse.com/security/cve/CVE-2024-40921.html * https://www.suse.com/security/cve/CVE-2024-40922.html * https://www.suse.com/security/cve/CVE-2024-40924.html * https://www.suse.com/security/cve/CVE-2024-40926.html * https://www.suse.com/security/cve/CVE-2024-40927.html * https://www.suse.com/security/cve/CVE-2024-40929.html * https://www.suse.com/security/cve/CVE-2024-40930.html * https://www.suse.com/security/cve/CVE-2024-40932.html * https://www.suse.com/security/cve/CVE-2024-40934.html * https://www.suse.com/security/cve/CVE-2024-40936.html * https://www.suse.com/security/cve/CVE-2024-40938.html * https://www.suse.com/security/cve/CVE-2024-40939.html * https://www.suse.com/security/cve/CVE-2024-40941.html * https://www.suse.com/security/cve/CVE-2024-40942.html * https://www.suse.com/security/cve/CVE-2024-40943.html * https://www.suse.com/security/cve/CVE-2024-40944.html * https://www.suse.com/security/cve/CVE-2024-40945.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-40956.html * https://www.suse.com/security/cve/CVE-2024-40957.html * https://www.suse.com/security/cve/CVE-2024-40958.html * https://www.suse.com/security/cve/CVE-2024-40959.html * https://www.suse.com/security/cve/CVE-2024-40962.html * https://www.suse.com/security/cve/CVE-2024-40964.html * https://www.suse.com/security/cve/CVE-2024-40967.html * https://www.suse.com/security/cve/CVE-2024-40976.html * https://www.suse.com/security/cve/CVE-2024-40977.html * https://www.suse.com/security/cve/CVE-2024-40978.html * https://www.suse.com/security/cve/CVE-2024-40981.html * https://www.suse.com/security/cve/CVE-2024-40982.html * https://www.suse.com/security/cve/CVE-2024-40984.html * https://www.suse.com/security/cve/CVE-2024-40987.html * https://www.suse.com/security/cve/CVE-2024-40988.html * https://www.suse.com/security/cve/CVE-2024-40989.html * https://www.suse.com/security/cve/CVE-2024-40990.html * https://www.suse.com/security/cve/CVE-2024-40992.html * https://www.suse.com/security/cve/CVE-2024-40994.html * https://www.suse.com/security/cve/CVE-2024-40995.html * https://www.suse.com/security/cve/CVE-2024-40997.html * https://www.suse.com/security/cve/CVE-2024-41000.html * https://www.suse.com/security/cve/CVE-2024-41001.html * https://www.suse.com/security/cve/CVE-2024-41002.html * https://www.suse.com/security/cve/CVE-2024-41004.html * https://www.suse.com/security/cve/CVE-2024-41007.html * https://www.suse.com/security/cve/CVE-2024-41009.html * https://www.suse.com/security/cve/CVE-2024-41010.html * https://www.suse.com/security/cve/CVE-2024-41011.html * https://www.suse.com/security/cve/CVE-2024-41012.html * https://www.suse.com/security/cve/CVE-2024-41015.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41020.html * https://www.suse.com/security/cve/CVE-2024-41022.html * https://www.suse.com/security/cve/CVE-2024-41024.html * https://www.suse.com/security/cve/CVE-2024-41025.html * https://www.suse.com/security/cve/CVE-2024-41028.html * https://www.suse.com/security/cve/CVE-2024-41032.html * https://www.suse.com/security/cve/CVE-2024-41035.html * https://www.suse.com/security/cve/CVE-2024-41036.html * https://www.suse.com/security/cve/CVE-2024-41037.html * https://www.suse.com/security/cve/CVE-2024-41038.html * https://www.suse.com/security/cve/CVE-2024-41039.html * https://www.suse.com/security/cve/CVE-2024-41040.html * https://www.suse.com/security/cve/CVE-2024-41041.html * https://www.suse.com/security/cve/CVE-2024-41044.html * https://www.suse.com/security/cve/CVE-2024-41045.html * https://www.suse.com/security/cve/CVE-2024-41048.html * https://www.suse.com/security/cve/CVE-2024-41049.html * https://www.suse.com/security/cve/CVE-2024-41050.html * https://www.suse.com/security/cve/CVE-2024-41051.html * https://www.suse.com/security/cve/CVE-2024-41056.html * https://www.suse.com/security/cve/CVE-2024-41057.html * https://www.suse.com/security/cve/CVE-2024-41058.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-41060.html * https://www.suse.com/security/cve/CVE-2024-41061.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://www.suse.com/security/cve/CVE-2024-41063.html * https://www.suse.com/security/cve/CVE-2024-41064.html * https://www.suse.com/security/cve/CVE-2024-41065.html * https://www.suse.com/security/cve/CVE-2024-41066.html * https://www.suse.com/security/cve/CVE-2024-41068.html * https://www.suse.com/security/cve/CVE-2024-41069.html * https://www.suse.com/security/cve/CVE-2024-41070.html * https://www.suse.com/security/cve/CVE-2024-41071.html * https://www.suse.com/security/cve/CVE-2024-41072.html * https://www.suse.com/security/cve/CVE-2024-41073.html * https://www.suse.com/security/cve/CVE-2024-41074.html * https://www.suse.com/security/cve/CVE-2024-41075.html * https://www.suse.com/security/cve/CVE-2024-41076.html * https://www.suse.com/security/cve/CVE-2024-41078.html * https://www.suse.com/security/cve/CVE-2024-41079.html * https://www.suse.com/security/cve/CVE-2024-41080.html * https://www.suse.com/security/cve/CVE-2024-41081.html * https://www.suse.com/security/cve/CVE-2024-41084.html * https://www.suse.com/security/cve/CVE-2024-41087.html * https://www.suse.com/security/cve/CVE-2024-41088.html * https://www.suse.com/security/cve/CVE-2024-41089.html * https://www.suse.com/security/cve/CVE-2024-41092.html * https://www.suse.com/security/cve/CVE-2024-41093.html * https://www.suse.com/security/cve/CVE-2024-41094.html * https://www.suse.com/security/cve/CVE-2024-41095.html * https://www.suse.com/security/cve/CVE-2024-41096.html * https://www.suse.com/security/cve/CVE-2024-41097.html * https://www.suse.com/security/cve/CVE-2024-41098.html * https://www.suse.com/security/cve/CVE-2024-42064.html * https://www.suse.com/security/cve/CVE-2024-42069.html * https://www.suse.com/security/cve/CVE-2024-42070.html * https://www.suse.com/security/cve/CVE-2024-42073.html * https://www.suse.com/security/cve/CVE-2024-42074.html * https://www.suse.com/security/cve/CVE-2024-42076.html * https://www.suse.com/security/cve/CVE-2024-42077.html * https://www.suse.com/security/cve/CVE-2024-42079.html * https://www.suse.com/security/cve/CVE-2024-42080.html * https://www.suse.com/security/cve/CVE-2024-42082.html * https://www.suse.com/security/cve/CVE-2024-42085.html * https://www.suse.com/security/cve/CVE-2024-42086.html * https://www.suse.com/security/cve/CVE-2024-42087.html * https://www.suse.com/security/cve/CVE-2024-42089.html * https://www.suse.com/security/cve/CVE-2024-42090.html * https://www.suse.com/security/cve/CVE-2024-42092.html * https://www.suse.com/security/cve/CVE-2024-42093.html * https://www.suse.com/security/cve/CVE-2024-42095.html * https://www.suse.com/security/cve/CVE-2024-42096.html * https://www.suse.com/security/cve/CVE-2024-42097.html * https://www.suse.com/security/cve/CVE-2024-42098.html * https://www.suse.com/security/cve/CVE-2024-42101.html * https://www.suse.com/security/cve/CVE-2024-42104.html * https://www.suse.com/security/cve/CVE-2024-42105.html * https://www.suse.com/security/cve/CVE-2024-42106.html * https://www.suse.com/security/cve/CVE-2024-42107.html * https://www.suse.com/security/cve/CVE-2024-42109.html * https://www.suse.com/security/cve/CVE-2024-42110.html * https://www.suse.com/security/cve/CVE-2024-42113.html * https://www.suse.com/security/cve/CVE-2024-42114.html * https://www.suse.com/security/cve/CVE-2024-42115.html * https://www.suse.com/security/cve/CVE-2024-42117.html * https://www.suse.com/security/cve/CVE-2024-42119.html * https://www.suse.com/security/cve/CVE-2024-42120.html * https://www.suse.com/security/cve/CVE-2024-42121.html * https://www.suse.com/security/cve/CVE-2024-42122.html * https://www.suse.com/security/cve/CVE-2024-42124.html * https://www.suse.com/security/cve/CVE-2024-42125.html * https://www.suse.com/security/cve/CVE-2024-42126.html * https://www.suse.com/security/cve/CVE-2024-42127.html * https://www.suse.com/security/cve/CVE-2024-42130.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-42132.html * https://www.suse.com/security/cve/CVE-2024-42133.html * https://www.suse.com/security/cve/CVE-2024-42136.html * https://www.suse.com/security/cve/CVE-2024-42137.html * https://www.suse.com/security/cve/CVE-2024-42138.html * https://www.suse.com/security/cve/CVE-2024-42139.html * https://www.suse.com/security/cve/CVE-2024-42141.html * https://www.suse.com/security/cve/CVE-2024-42142.html * https://www.suse.com/security/cve/CVE-2024-42143.html * https://www.suse.com/security/cve/CVE-2024-42144.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-42147.html * https://www.suse.com/security/cve/CVE-2024-42148.html * https://www.suse.com/security/cve/CVE-2024-42152.html * https://www.suse.com/security/cve/CVE-2024-42153.html * https://www.suse.com/security/cve/CVE-2024-42155.html * https://www.suse.com/security/cve/CVE-2024-42156.html * https://www.suse.com/security/cve/CVE-2024-42157.html * https://www.suse.com/security/cve/CVE-2024-42158.html * https://www.suse.com/security/cve/CVE-2024-42159.html * https://www.suse.com/security/cve/CVE-2024-42161.html * https://www.suse.com/security/cve/CVE-2024-42162.html * https://www.suse.com/security/cve/CVE-2024-42223.html * https://www.suse.com/security/cve/CVE-2024-42224.html * https://www.suse.com/security/cve/CVE-2024-42225.html * https://www.suse.com/security/cve/CVE-2024-42226.html * https://www.suse.com/security/cve/CVE-2024-42227.html * https://www.suse.com/security/cve/CVE-2024-42228.html * https://www.suse.com/security/cve/CVE-2024-42229.html * https://www.suse.com/security/cve/CVE-2024-42230.html * https://www.suse.com/security/cve/CVE-2024-42232.html * https://www.suse.com/security/cve/CVE-2024-42236.html * https://www.suse.com/security/cve/CVE-2024-42237.html * https://www.suse.com/security/cve/CVE-2024-42238.html * https://www.suse.com/security/cve/CVE-2024-42239.html * https://www.suse.com/security/cve/CVE-2024-42240.html * https://www.suse.com/security/cve/CVE-2024-42241.html * https://www.suse.com/security/cve/CVE-2024-42244.html * https://www.suse.com/security/cve/CVE-2024-42245.html * https://www.suse.com/security/cve/CVE-2024-42246.html * https://www.suse.com/security/cve/CVE-2024-42247.html * https://www.suse.com/security/cve/CVE-2024-42250.html * https://www.suse.com/security/cve/CVE-2024-42253.html * https://www.suse.com/security/cve/CVE-2024-42259.html * https://www.suse.com/security/cve/CVE-2024-42268.html * https://www.suse.com/security/cve/CVE-2024-42269.html * https://www.suse.com/security/cve/CVE-2024-42270.html * https://www.suse.com/security/cve/CVE-2024-42271.html * https://www.suse.com/security/cve/CVE-2024-42274.html * https://www.suse.com/security/cve/CVE-2024-42276.html * https://www.suse.com/security/cve/CVE-2024-42277.html * https://www.suse.com/security/cve/CVE-2024-42278.html * https://www.suse.com/security/cve/CVE-2024-42279.html * https://www.suse.com/security/cve/CVE-2024-42280.html * https://www.suse.com/security/cve/CVE-2024-42281.html * https://www.suse.com/security/cve/CVE-2024-42283.html * https://www.suse.com/security/cve/CVE-2024-42284.html * https://www.suse.com/security/cve/CVE-2024-42285.html * https://www.suse.com/security/cve/CVE-2024-42286.html * https://www.suse.com/security/cve/CVE-2024-42287.html * https://www.suse.com/security/cve/CVE-2024-42288.html * https://www.suse.com/security/cve/CVE-2024-42289.html * https://www.suse.com/security/cve/CVE-2024-42290.html * https://www.suse.com/security/cve/CVE-2024-42291.html * https://www.suse.com/security/cve/CVE-2024-42292.html * https://www.suse.com/security/cve/CVE-2024-42295.html * https://www.suse.com/security/cve/CVE-2024-42298.html * https://www.suse.com/security/cve/CVE-2024-42301.html * https://www.suse.com/security/cve/CVE-2024-42302.html * https://www.suse.com/security/cve/CVE-2024-42303.html * https://www.suse.com/security/cve/CVE-2024-42308.html * https://www.suse.com/security/cve/CVE-2024-42309.html * https://www.suse.com/security/cve/CVE-2024-42310.html * https://www.suse.com/security/cve/CVE-2024-42311.html * https://www.suse.com/security/cve/CVE-2024-42312.html * https://www.suse.com/security/cve/CVE-2024-42313.html * https://www.suse.com/security/cve/CVE-2024-42314.html * https://www.suse.com/security/cve/CVE-2024-42315.html * https://www.suse.com/security/cve/CVE-2024-42316.html * https://www.suse.com/security/cve/CVE-2024-42318.html * https://www.suse.com/security/cve/CVE-2024-42319.html * https://www.suse.com/security/cve/CVE-2024-42320.html * https://www.suse.com/security/cve/CVE-2024-42322.html * https://www.suse.com/security/cve/CVE-2024-43816.html * https://www.suse.com/security/cve/CVE-2024-43817.html * https://www.suse.com/security/cve/CVE-2024-43818.html * https://www.suse.com/security/cve/CVE-2024-43819.html * https://www.suse.com/security/cve/CVE-2024-43821.html * https://www.suse.com/security/cve/CVE-2024-43823.html * https://www.suse.com/security/cve/CVE-2024-43824.html * https://www.suse.com/security/cve/CVE-2024-43825.html * https://www.suse.com/security/cve/CVE-2024-43826.html * https://www.suse.com/security/cve/CVE-2024-43829.html * https://www.suse.com/security/cve/CVE-2024-43830.html * https://www.suse.com/security/cve/CVE-2024-43831.html * https://www.suse.com/security/cve/CVE-2024-43833.html * https://www.suse.com/security/cve/CVE-2024-43834.html * https://www.suse.com/security/cve/CVE-2024-43837.html * https://www.suse.com/security/cve/CVE-2024-43839.html * https://www.suse.com/security/cve/CVE-2024-43840.html * https://www.suse.com/security/cve/CVE-2024-43841.html * https://www.suse.com/security/cve/CVE-2024-43842.html * https://www.suse.com/security/cve/CVE-2024-43846.html * https://www.suse.com/security/cve/CVE-2024-43847.html * https://www.suse.com/security/cve/CVE-2024-43849.html * https://www.suse.com/security/cve/CVE-2024-43850.html * https://www.suse.com/security/cve/CVE-2024-43851.html * https://www.suse.com/security/cve/CVE-2024-43853.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-43855.html * https://www.suse.com/security/cve/CVE-2024-43856.html * https://www.suse.com/security/cve/CVE-2024-43858.html * https://www.suse.com/security/cve/CVE-2024-43860.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://www.suse.com/security/cve/CVE-2024-43863.html * https://www.suse.com/security/cve/CVE-2024-43864.html * https://www.suse.com/security/cve/CVE-2024-43866.html * https://www.suse.com/security/cve/CVE-2024-43867.html * https://www.suse.com/security/cve/CVE-2024-43871.html * https://www.suse.com/security/cve/CVE-2024-43872.html * https://www.suse.com/security/cve/CVE-2024-43873.html * https://www.suse.com/security/cve/CVE-2024-43874.html * https://www.suse.com/security/cve/CVE-2024-43875.html * https://www.suse.com/security/cve/CVE-2024-43876.html * https://www.suse.com/security/cve/CVE-2024-43877.html * https://www.suse.com/security/cve/CVE-2024-43879.html * https://www.suse.com/security/cve/CVE-2024-43880.html * https://www.suse.com/security/cve/CVE-2024-43881.html * https://www.suse.com/security/cve/CVE-2024-43882.html * https://www.suse.com/security/cve/CVE-2024-43883.html * https://www.suse.com/security/cve/CVE-2024-43884.html * https://www.suse.com/security/cve/CVE-2024-43885.html * https://www.suse.com/security/cve/CVE-2024-43889.html * https://www.suse.com/security/cve/CVE-2024-43892.html * https://www.suse.com/security/cve/CVE-2024-43893.html * https://www.suse.com/security/cve/CVE-2024-43894.html * https://www.suse.com/security/cve/CVE-2024-43895.html * https://www.suse.com/security/cve/CVE-2024-43897.html * https://www.suse.com/security/cve/CVE-2024-43899.html * https://www.suse.com/security/cve/CVE-2024-43900.html * https://www.suse.com/security/cve/CVE-2024-43902.html * https://www.suse.com/security/cve/CVE-2024-43903.html * https://www.suse.com/security/cve/CVE-2024-43905.html * https://www.suse.com/security/cve/CVE-2024-43906.html * https://www.suse.com/security/cve/CVE-2024-43907.html * https://www.suse.com/security/cve/CVE-2024-43908.html * https://www.suse.com/security/cve/CVE-2024-43909.html * https://www.suse.com/security/cve/CVE-2024-43911.html * https://www.suse.com/security/cve/CVE-2024-43912.html * https://www.suse.com/security/cve/CVE-2024-44931.html * https://www.suse.com/security/cve/CVE-2024-44938.html * https://www.suse.com/security/cve/CVE-2024-44939.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1193454 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1208783 * https://bugzilla.suse.com/show_bug.cgi?id=1213123 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1220066 * https://bugzilla.suse.com/show_bug.cgi?id=1220252 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1221326 * https://bugzilla.suse.com/show_bug.cgi?id=1221630 * https://bugzilla.suse.com/show_bug.cgi?id=1221645 * https://bugzilla.suse.com/show_bug.cgi?id=1221652 * https://bugzilla.suse.com/show_bug.cgi?id=1221857 * https://bugzilla.suse.com/show_bug.cgi?id=1222254 * https://bugzilla.suse.com/show_bug.cgi?id=1222335 * https://bugzilla.suse.com/show_bug.cgi?id=1222350 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222372 * https://bugzilla.suse.com/show_bug.cgi?id=1222387 * https://bugzilla.suse.com/show_bug.cgi?id=1222433 * https://bugzilla.suse.com/show_bug.cgi?id=1222434 * https://bugzilla.suse.com/show_bug.cgi?id=1222463 * https://bugzilla.suse.com/show_bug.cgi?id=1222625 * https://bugzilla.suse.com/show_bug.cgi?id=1222633 * https://bugzilla.suse.com/show_bug.cgi?id=1222634 * https://bugzilla.suse.com/show_bug.cgi?id=1222808 * https://bugzilla.suse.com/show_bug.cgi?id=1222967 * https://bugzilla.suse.com/show_bug.cgi?id=1222973 * https://bugzilla.suse.com/show_bug.cgi?id=1223053 * https://bugzilla.suse.com/show_bug.cgi?id=1223074 * https://bugzilla.suse.com/show_bug.cgi?id=1223191 * https://bugzilla.suse.com/show_bug.cgi?id=1223395 * https://bugzilla.suse.com/show_bug.cgi?id=1223635 * https://bugzilla.suse.com/show_bug.cgi?id=1223720 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1223742 * https://bugzilla.suse.com/show_bug.cgi?id=1223763 * https://bugzilla.suse.com/show_bug.cgi?id=1223767 * https://bugzilla.suse.com/show_bug.cgi?id=1223777 * https://bugzilla.suse.com/show_bug.cgi?id=1223803 * https://bugzilla.suse.com/show_bug.cgi?id=1224105 * https://bugzilla.suse.com/show_bug.cgi?id=1224415 * https://bugzilla.suse.com/show_bug.cgi?id=1224485 * https://bugzilla.suse.com/show_bug.cgi?id=1224496 * https://bugzilla.suse.com/show_bug.cgi?id=1224510 * https://bugzilla.suse.com/show_bug.cgi?id=1224535 * https://bugzilla.suse.com/show_bug.cgi?id=1224631 * https://bugzilla.suse.com/show_bug.cgi?id=1224636 * https://bugzilla.suse.com/show_bug.cgi?id=1224690 * https://bugzilla.suse.com/show_bug.cgi?id=1224694 * https://bugzilla.suse.com/show_bug.cgi?id=1224700 * https://bugzilla.suse.com/show_bug.cgi?id=1224711 * https://bugzilla.suse.com/show_bug.cgi?id=1225475 * https://bugzilla.suse.com/show_bug.cgi?id=1225582 * https://bugzilla.suse.com/show_bug.cgi?id=1225607 * https://bugzilla.suse.com/show_bug.cgi?id=1225717 * https://bugzilla.suse.com/show_bug.cgi?id=1225718 * https://bugzilla.suse.com/show_bug.cgi?id=1225744 * https://bugzilla.suse.com/show_bug.cgi?id=1225745 * https://bugzilla.suse.com/show_bug.cgi?id=1225751 * https://bugzilla.suse.com/show_bug.cgi?id=1225814 * https://bugzilla.suse.com/show_bug.cgi?id=1225832 * https://bugzilla.suse.com/show_bug.cgi?id=1225838 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226031 * https://bugzilla.suse.com/show_bug.cgi?id=1226127 * https://bugzilla.suse.com/show_bug.cgi?id=1226502 * https://bugzilla.suse.com/show_bug.cgi?id=1226530 * https://bugzilla.suse.com/show_bug.cgi?id=1226588 * https://bugzilla.suse.com/show_bug.cgi?id=1226604 * https://bugzilla.suse.com/show_bug.cgi?id=1226743 * https://bugzilla.suse.com/show_bug.cgi?id=1226751 * https://bugzilla.suse.com/show_bug.cgi?id=1226765 * https://bugzilla.suse.com/show_bug.cgi?id=1226798 * https://bugzilla.suse.com/show_bug.cgi?id=1226801 * https://bugzilla.suse.com/show_bug.cgi?id=1226834 * https://bugzilla.suse.com/show_bug.cgi?id=1226874 * https://bugzilla.suse.com/show_bug.cgi?id=1226885 * https://bugzilla.suse.com/show_bug.cgi?id=1226920 * https://bugzilla.suse.com/show_bug.cgi?id=1227149 * https://bugzilla.suse.com/show_bug.cgi?id=1227182 * https://bugzilla.suse.com/show_bug.cgi?id=1227383 * https://bugzilla.suse.com/show_bug.cgi?id=1227437 * https://bugzilla.suse.com/show_bug.cgi?id=1227492 * https://bugzilla.suse.com/show_bug.cgi?id=1227493 * https://bugzilla.suse.com/show_bug.cgi?id=1227494 * https://bugzilla.suse.com/show_bug.cgi?id=1227618 * https://bugzilla.suse.com/show_bug.cgi?id=1227620 * https://bugzilla.suse.com/show_bug.cgi?id=1227623 * https://bugzilla.suse.com/show_bug.cgi?id=1227627 * https://bugzilla.suse.com/show_bug.cgi?id=1227634 * https://bugzilla.suse.com/show_bug.cgi?id=1227706 * https://bugzilla.suse.com/show_bug.cgi?id=1227722 * https://bugzilla.suse.com/show_bug.cgi?id=1227724 * https://bugzilla.suse.com/show_bug.cgi?id=1227725 * https://bugzilla.suse.com/show_bug.cgi?id=1227728 * https://bugzilla.suse.com/show_bug.cgi?id=1227729 * https://bugzilla.suse.com/show_bug.cgi?id=1227732 * https://bugzilla.suse.com/show_bug.cgi?id=1227733 * https://bugzilla.suse.com/show_bug.cgi?id=1227734 * https://bugzilla.suse.com/show_bug.cgi?id=1227747 * https://bugzilla.suse.com/show_bug.cgi?id=1227750 * https://bugzilla.suse.com/show_bug.cgi?id=1227754 * https://bugzilla.suse.com/show_bug.cgi?id=1227758 * https://bugzilla.suse.com/show_bug.cgi?id=1227760 * https://bugzilla.suse.com/show_bug.cgi?id=1227761 * https://bugzilla.suse.com/show_bug.cgi?id=1227764 * https://bugzilla.suse.com/show_bug.cgi?id=1227766 * https://bugzilla.suse.com/show_bug.cgi?id=1227770 * https://bugzilla.suse.com/show_bug.cgi?id=1227771 * https://bugzilla.suse.com/show_bug.cgi?id=1227772 * https://bugzilla.suse.com/show_bug.cgi?id=1227774 * https://bugzilla.suse.com/show_bug.cgi?id=1227781 * https://bugzilla.suse.com/show_bug.cgi?id=1227784 * https://bugzilla.suse.com/show_bug.cgi?id=1227785 * https://bugzilla.suse.com/show_bug.cgi?id=1227787 * https://bugzilla.suse.com/show_bug.cgi?id=1227790 * https://bugzilla.suse.com/show_bug.cgi?id=1227791 * https://bugzilla.suse.com/show_bug.cgi?id=1227792 * https://bugzilla.suse.com/show_bug.cgi?id=1227796 * https://bugzilla.suse.com/show_bug.cgi?id=1227798 * https://bugzilla.suse.com/show_bug.cgi?id=1227799 * https://bugzilla.suse.com/show_bug.cgi?id=1227802 * https://bugzilla.suse.com/show_bug.cgi?id=1227808 * https://bugzilla.suse.com/show_bug.cgi?id=1227810 * https://bugzilla.suse.com/show_bug.cgi?id=1227811 * https://bugzilla.suse.com/show_bug.cgi?id=1227812 * https://bugzilla.suse.com/show_bug.cgi?id=1227815 * https://bugzilla.suse.com/show_bug.cgi?id=1227816 * https://bugzilla.suse.com/show_bug.cgi?id=1227818 * https://bugzilla.suse.com/show_bug.cgi?id=1227820 * https://bugzilla.suse.com/show_bug.cgi?id=1227823 * https://bugzilla.suse.com/show_bug.cgi?id=1227824 * https://bugzilla.suse.com/show_bug.cgi?id=1227826 * https://bugzilla.suse.com/show_bug.cgi?id=1227828 * https://bugzilla.suse.com/show_bug.cgi?id=1227829 * https://bugzilla.suse.com/show_bug.cgi?id=1227830 * https://bugzilla.suse.com/show_bug.cgi?id=1227832 * https://bugzilla.suse.com/show_bug.cgi?id=1227833 * https://bugzilla.suse.com/show_bug.cgi?id=1227834 * https://bugzilla.suse.com/show_bug.cgi?id=1227839 * https://bugzilla.suse.com/show_bug.cgi?id=1227840 * https://bugzilla.suse.com/show_bug.cgi?id=1227846 * https://bugzilla.suse.com/show_bug.cgi?id=1227849 * https://bugzilla.suse.com/show_bug.cgi?id=1227851 * https://bugzilla.suse.com/show_bug.cgi?id=1227853 * https://bugzilla.suse.com/show_bug.cgi?id=1227863 * https://bugzilla.suse.com/show_bug.cgi?id=1227864 * https://bugzilla.suse.com/show_bug.cgi?id=1227865 * https://bugzilla.suse.com/show_bug.cgi?id=1227867 * https://bugzilla.suse.com/show_bug.cgi?id=1227869 * https://bugzilla.suse.com/show_bug.cgi?id=1227870 * https://bugzilla.suse.com/show_bug.cgi?id=1227883 * https://bugzilla.suse.com/show_bug.cgi?id=1227884 * https://bugzilla.suse.com/show_bug.cgi?id=1227891 * https://bugzilla.suse.com/show_bug.cgi?id=1227893 * https://bugzilla.suse.com/show_bug.cgi?id=1227929 * https://bugzilla.suse.com/show_bug.cgi?id=1227950 * https://bugzilla.suse.com/show_bug.cgi?id=1227957 * https://bugzilla.suse.com/show_bug.cgi?id=1227981 * https://bugzilla.suse.com/show_bug.cgi?id=1228020 * https://bugzilla.suse.com/show_bug.cgi?id=1228021 * https://bugzilla.suse.com/show_bug.cgi?id=1228114 * https://bugzilla.suse.com/show_bug.cgi?id=1228192 * https://bugzilla.suse.com/show_bug.cgi?id=1228195 * https://bugzilla.suse.com/show_bug.cgi?id=1228202 * https://bugzilla.suse.com/show_bug.cgi?id=1228235 * https://bugzilla.suse.com/show_bug.cgi?id=1228236 * https://bugzilla.suse.com/show_bug.cgi?id=1228237 * https://bugzilla.suse.com/show_bug.cgi?id=1228247 * https://bugzilla.suse.com/show_bug.cgi?id=1228321 * https://bugzilla.suse.com/show_bug.cgi?id=1228409 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228426 * https://bugzilla.suse.com/show_bug.cgi?id=1228427 * https://bugzilla.suse.com/show_bug.cgi?id=1228429 * https://bugzilla.suse.com/show_bug.cgi?id=1228446 * https://bugzilla.suse.com/show_bug.cgi?id=1228447 * https://bugzilla.suse.com/show_bug.cgi?id=1228449 * https://bugzilla.suse.com/show_bug.cgi?id=1228450 * https://bugzilla.suse.com/show_bug.cgi?id=1228452 * https://bugzilla.suse.com/show_bug.cgi?id=1228456 * https://bugzilla.suse.com/show_bug.cgi?id=1228457 * https://bugzilla.suse.com/show_bug.cgi?id=1228458 * https://bugzilla.suse.com/show_bug.cgi?id=1228459 * https://bugzilla.suse.com/show_bug.cgi?id=1228460 * https://bugzilla.suse.com/show_bug.cgi?id=1228462 * https://bugzilla.suse.com/show_bug.cgi?id=1228463 * https://bugzilla.suse.com/show_bug.cgi?id=1228466 * https://bugzilla.suse.com/show_bug.cgi?id=1228467 * https://bugzilla.suse.com/show_bug.cgi?id=1228468 * https://bugzilla.suse.com/show_bug.cgi?id=1228469 * https://bugzilla.suse.com/show_bug.cgi?id=1228470 * https://bugzilla.suse.com/show_bug.cgi?id=1228472 * https://bugzilla.suse.com/show_bug.cgi?id=1228479 * https://bugzilla.suse.com/show_bug.cgi?id=1228480 * https://bugzilla.suse.com/show_bug.cgi?id=1228481 * https://bugzilla.suse.com/show_bug.cgi?id=1228482 * https://bugzilla.suse.com/show_bug.cgi?id=1228483 * https://bugzilla.suse.com/show_bug.cgi?id=1228484 * https://bugzilla.suse.com/show_bug.cgi?id=1228485 * https://bugzilla.suse.com/show_bug.cgi?id=1228486 * https://bugzilla.suse.com/show_bug.cgi?id=1228487 * https://bugzilla.suse.com/show_bug.cgi?id=1228489 * https://bugzilla.suse.com/show_bug.cgi?id=1228491 * https://bugzilla.suse.com/show_bug.cgi?id=1228492 * https://bugzilla.suse.com/show_bug.cgi?id=1228493 * https://bugzilla.suse.com/show_bug.cgi?id=1228494 * https://bugzilla.suse.com/show_bug.cgi?id=1228495 * https://bugzilla.suse.com/show_bug.cgi?id=1228496 * https://bugzilla.suse.com/show_bug.cgi?id=1228499 * https://bugzilla.suse.com/show_bug.cgi?id=1228500 * https://bugzilla.suse.com/show_bug.cgi?id=1228501 * https://bugzilla.suse.com/show_bug.cgi?id=1228502 * https://bugzilla.suse.com/show_bug.cgi?id=1228503 * https://bugzilla.suse.com/show_bug.cgi?id=1228505 * https://bugzilla.suse.com/show_bug.cgi?id=1228508 * https://bugzilla.suse.com/show_bug.cgi?id=1228509 * https://bugzilla.suse.com/show_bug.cgi?id=1228510 * https://bugzilla.suse.com/show_bug.cgi?id=1228511 * https://bugzilla.suse.com/show_bug.cgi?id=1228513 * https://bugzilla.suse.com/show_bug.cgi?id=1228515 * https://bugzilla.suse.com/show_bug.cgi?id=1228516 * https://bugzilla.suse.com/show_bug.cgi?id=1228518 * https://bugzilla.suse.com/show_bug.cgi?id=1228520 * https://bugzilla.suse.com/show_bug.cgi?id=1228525 * https://bugzilla.suse.com/show_bug.cgi?id=1228527 * https://bugzilla.suse.com/show_bug.cgi?id=1228530 * https://bugzilla.suse.com/show_bug.cgi?id=1228531 * https://bugzilla.suse.com/show_bug.cgi?id=1228539 * https://bugzilla.suse.com/show_bug.cgi?id=1228561 * https://bugzilla.suse.com/show_bug.cgi?id=1228563 * https://bugzilla.suse.com/show_bug.cgi?id=1228564 * https://bugzilla.suse.com/show_bug.cgi?id=1228565 * https://bugzilla.suse.com/show_bug.cgi?id=1228567 * https://bugzilla.suse.com/show_bug.cgi?id=1228568 * https://bugzilla.suse.com/show_bug.cgi?id=1228572 * https://bugzilla.suse.com/show_bug.cgi?id=1228576 * https://bugzilla.suse.com/show_bug.cgi?id=1228579 * https://bugzilla.suse.com/show_bug.cgi?id=1228580 * https://bugzilla.suse.com/show_bug.cgi?id=1228581 * https://bugzilla.suse.com/show_bug.cgi?id=1228582 * https://bugzilla.suse.com/show_bug.cgi?id=1228584 * https://bugzilla.suse.com/show_bug.cgi?id=1228586 * https://bugzilla.suse.com/show_bug.cgi?id=1228588 * https://bugzilla.suse.com/show_bug.cgi?id=1228590 * https://bugzilla.suse.com/show_bug.cgi?id=1228591 * https://bugzilla.suse.com/show_bug.cgi?id=1228599 * https://bugzilla.suse.com/show_bug.cgi?id=1228615 * https://bugzilla.suse.com/show_bug.cgi?id=1228616 * https://bugzilla.suse.com/show_bug.cgi?id=1228617 * https://bugzilla.suse.com/show_bug.cgi?id=1228625 * https://bugzilla.suse.com/show_bug.cgi?id=1228626 * https://bugzilla.suse.com/show_bug.cgi?id=1228633 * https://bugzilla.suse.com/show_bug.cgi?id=1228635 * https://bugzilla.suse.com/show_bug.cgi?id=1228636 * https://bugzilla.suse.com/show_bug.cgi?id=1228640 * https://bugzilla.suse.com/show_bug.cgi?id=1228643 * https://bugzilla.suse.com/show_bug.cgi?id=1228644 * https://bugzilla.suse.com/show_bug.cgi?id=1228646 * https://bugzilla.suse.com/show_bug.cgi?id=1228649 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228654 * https://bugzilla.suse.com/show_bug.cgi?id=1228655 * https://bugzilla.suse.com/show_bug.cgi?id=1228656 * https://bugzilla.suse.com/show_bug.cgi?id=1228658 * https://bugzilla.suse.com/show_bug.cgi?id=1228660 * https://bugzilla.suse.com/show_bug.cgi?id=1228662 * https://bugzilla.suse.com/show_bug.cgi?id=1228665 * https://bugzilla.suse.com/show_bug.cgi?id=1228666 * https://bugzilla.suse.com/show_bug.cgi?id=1228667 * https://bugzilla.suse.com/show_bug.cgi?id=1228672 * https://bugzilla.suse.com/show_bug.cgi?id=1228673 * https://bugzilla.suse.com/show_bug.cgi?id=1228674 * https://bugzilla.suse.com/show_bug.cgi?id=1228677 * https://bugzilla.suse.com/show_bug.cgi?id=1228680 * https://bugzilla.suse.com/show_bug.cgi?id=1228687 * https://bugzilla.suse.com/show_bug.cgi?id=1228705 * https://bugzilla.suse.com/show_bug.cgi?id=1228706 * https://bugzilla.suse.com/show_bug.cgi?id=1228707 * https://bugzilla.suse.com/show_bug.cgi?id=1228708 * https://bugzilla.suse.com/show_bug.cgi?id=1228709 * https://bugzilla.suse.com/show_bug.cgi?id=1228710 * https://bugzilla.suse.com/show_bug.cgi?id=1228718 * https://bugzilla.suse.com/show_bug.cgi?id=1228720 * https://bugzilla.suse.com/show_bug.cgi?id=1228721 * https://bugzilla.suse.com/show_bug.cgi?id=1228722 * https://bugzilla.suse.com/show_bug.cgi?id=1228723 * https://bugzilla.suse.com/show_bug.cgi?id=1228724 * https://bugzilla.suse.com/show_bug.cgi?id=1228726 * https://bugzilla.suse.com/show_bug.cgi?id=1228727 * https://bugzilla.suse.com/show_bug.cgi?id=1228733 * https://bugzilla.suse.com/show_bug.cgi?id=1228737 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228748 * https://bugzilla.suse.com/show_bug.cgi?id=1228754 * https://bugzilla.suse.com/show_bug.cgi?id=1228756 * https://bugzilla.suse.com/show_bug.cgi?id=1228757 * https://bugzilla.suse.com/show_bug.cgi?id=1228758 * https://bugzilla.suse.com/show_bug.cgi?id=1228764 * https://bugzilla.suse.com/show_bug.cgi?id=1228766 * https://bugzilla.suse.com/show_bug.cgi?id=1228779 * https://bugzilla.suse.com/show_bug.cgi?id=1228801 * https://bugzilla.suse.com/show_bug.cgi?id=1228849 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1228959 * https://bugzilla.suse.com/show_bug.cgi?id=1228964 * https://bugzilla.suse.com/show_bug.cgi?id=1228966 * https://bugzilla.suse.com/show_bug.cgi?id=1228967 * https://bugzilla.suse.com/show_bug.cgi?id=1228973 * https://bugzilla.suse.com/show_bug.cgi?id=1228977 * https://bugzilla.suse.com/show_bug.cgi?id=1228978 * https://bugzilla.suse.com/show_bug.cgi?id=1228979 * https://bugzilla.suse.com/show_bug.cgi?id=1228986 * https://bugzilla.suse.com/show_bug.cgi?id=1228988 * https://bugzilla.suse.com/show_bug.cgi?id=1228989 * https://bugzilla.suse.com/show_bug.cgi?id=1228991 * https://bugzilla.suse.com/show_bug.cgi?id=1228992 * https://bugzilla.suse.com/show_bug.cgi?id=1229005 * https://bugzilla.suse.com/show_bug.cgi?id=1229024 * https://bugzilla.suse.com/show_bug.cgi?id=1229042 * https://bugzilla.suse.com/show_bug.cgi?id=1229045 * https://bugzilla.suse.com/show_bug.cgi?id=1229046 * https://bugzilla.suse.com/show_bug.cgi?id=1229054 * https://bugzilla.suse.com/show_bug.cgi?id=1229056 * https://bugzilla.suse.com/show_bug.cgi?id=1229086 * https://bugzilla.suse.com/show_bug.cgi?id=1229134 * https://bugzilla.suse.com/show_bug.cgi?id=1229136 * https://bugzilla.suse.com/show_bug.cgi?id=1229154 * https://bugzilla.suse.com/show_bug.cgi?id=1229156 * https://bugzilla.suse.com/show_bug.cgi?id=1229160 * https://bugzilla.suse.com/show_bug.cgi?id=1229167 * https://bugzilla.suse.com/show_bug.cgi?id=1229168 * https://bugzilla.suse.com/show_bug.cgi?id=1229169 * https://bugzilla.suse.com/show_bug.cgi?id=1229170 * https://bugzilla.suse.com/show_bug.cgi?id=1229171 * https://bugzilla.suse.com/show_bug.cgi?id=1229172 * https://bugzilla.suse.com/show_bug.cgi?id=1229173 * https://bugzilla.suse.com/show_bug.cgi?id=1229174 * https://bugzilla.suse.com/show_bug.cgi?id=1229239 * https://bugzilla.suse.com/show_bug.cgi?id=1229240 * https://bugzilla.suse.com/show_bug.cgi?id=1229241 * https://bugzilla.suse.com/show_bug.cgi?id=1229243 * https://bugzilla.suse.com/show_bug.cgi?id=1229244 * https://bugzilla.suse.com/show_bug.cgi?id=1229245 * https://bugzilla.suse.com/show_bug.cgi?id=1229246 * https://bugzilla.suse.com/show_bug.cgi?id=1229247 * https://bugzilla.suse.com/show_bug.cgi?id=1229248 * https://bugzilla.suse.com/show_bug.cgi?id=1229249 * https://bugzilla.suse.com/show_bug.cgi?id=1229250 * https://bugzilla.suse.com/show_bug.cgi?id=1229251 * https://bugzilla.suse.com/show_bug.cgi?id=1229252 * https://bugzilla.suse.com/show_bug.cgi?id=1229253 * https://bugzilla.suse.com/show_bug.cgi?id=1229254 * https://bugzilla.suse.com/show_bug.cgi?id=1229255 * https://bugzilla.suse.com/show_bug.cgi?id=1229256 * https://bugzilla.suse.com/show_bug.cgi?id=1229287 * https://bugzilla.suse.com/show_bug.cgi?id=1229290 * https://bugzilla.suse.com/show_bug.cgi?id=1229291 * https://bugzilla.suse.com/show_bug.cgi?id=1229292 * https://bugzilla.suse.com/show_bug.cgi?id=1229294 * https://bugzilla.suse.com/show_bug.cgi?id=1229296 * https://bugzilla.suse.com/show_bug.cgi?id=1229297 * https://bugzilla.suse.com/show_bug.cgi?id=1229298 * https://bugzilla.suse.com/show_bug.cgi?id=1229299 * https://bugzilla.suse.com/show_bug.cgi?id=1229301 * https://bugzilla.suse.com/show_bug.cgi?id=1229303 * https://bugzilla.suse.com/show_bug.cgi?id=1229304 * https://bugzilla.suse.com/show_bug.cgi?id=1229305 * https://bugzilla.suse.com/show_bug.cgi?id=1229307 * https://bugzilla.suse.com/show_bug.cgi?id=1229309 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229313 * https://bugzilla.suse.com/show_bug.cgi?id=1229314 * https://bugzilla.suse.com/show_bug.cgi?id=1229315 * https://bugzilla.suse.com/show_bug.cgi?id=1229316 * https://bugzilla.suse.com/show_bug.cgi?id=1229317 * https://bugzilla.suse.com/show_bug.cgi?id=1229318 * https://bugzilla.suse.com/show_bug.cgi?id=1229319 * https://bugzilla.suse.com/show_bug.cgi?id=1229320 * https://bugzilla.suse.com/show_bug.cgi?id=1229327 * https://bugzilla.suse.com/show_bug.cgi?id=1229341 * https://bugzilla.suse.com/show_bug.cgi?id=1229342 * https://bugzilla.suse.com/show_bug.cgi?id=1229344 * https://bugzilla.suse.com/show_bug.cgi?id=1229345 * https://bugzilla.suse.com/show_bug.cgi?id=1229346 * https://bugzilla.suse.com/show_bug.cgi?id=1229347 * https://bugzilla.suse.com/show_bug.cgi?id=1229349 * https://bugzilla.suse.com/show_bug.cgi?id=1229350 * https://bugzilla.suse.com/show_bug.cgi?id=1229351 * https://bugzilla.suse.com/show_bug.cgi?id=1229353 * https://bugzilla.suse.com/show_bug.cgi?id=1229354 * https://bugzilla.suse.com/show_bug.cgi?id=1229355 * https://bugzilla.suse.com/show_bug.cgi?id=1229356 * https://bugzilla.suse.com/show_bug.cgi?id=1229357 * https://bugzilla.suse.com/show_bug.cgi?id=1229358 * https://bugzilla.suse.com/show_bug.cgi?id=1229359 * https://bugzilla.suse.com/show_bug.cgi?id=1229360 * https://bugzilla.suse.com/show_bug.cgi?id=1229365 * https://bugzilla.suse.com/show_bug.cgi?id=1229366 * https://bugzilla.suse.com/show_bug.cgi?id=1229369 * https://bugzilla.suse.com/show_bug.cgi?id=1229370 * https://bugzilla.suse.com/show_bug.cgi?id=1229373 * https://bugzilla.suse.com/show_bug.cgi?id=1229374 * https://bugzilla.suse.com/show_bug.cgi?id=1229379 * https://bugzilla.suse.com/show_bug.cgi?id=1229381 * https://bugzilla.suse.com/show_bug.cgi?id=1229382 * https://bugzilla.suse.com/show_bug.cgi?id=1229383 * https://bugzilla.suse.com/show_bug.cgi?id=1229386 * https://bugzilla.suse.com/show_bug.cgi?id=1229388 * https://bugzilla.suse.com/show_bug.cgi?id=1229390 * https://bugzilla.suse.com/show_bug.cgi?id=1229391 * https://bugzilla.suse.com/show_bug.cgi?id=1229392 * https://bugzilla.suse.com/show_bug.cgi?id=1229395 * https://bugzilla.suse.com/show_bug.cgi?id=1229398 * https://bugzilla.suse.com/show_bug.cgi?id=1229399 * https://bugzilla.suse.com/show_bug.cgi?id=1229400 * https://bugzilla.suse.com/show_bug.cgi?id=1229402 * https://bugzilla.suse.com/show_bug.cgi?id=1229403 * https://bugzilla.suse.com/show_bug.cgi?id=1229404 * https://bugzilla.suse.com/show_bug.cgi?id=1229407 * https://bugzilla.suse.com/show_bug.cgi?id=1229409 * https://bugzilla.suse.com/show_bug.cgi?id=1229410 * https://bugzilla.suse.com/show_bug.cgi?id=1229411 * https://bugzilla.suse.com/show_bug.cgi?id=1229413 * https://bugzilla.suse.com/show_bug.cgi?id=1229414 * https://bugzilla.suse.com/show_bug.cgi?id=1229417 * https://bugzilla.suse.com/show_bug.cgi?id=1229444 * https://bugzilla.suse.com/show_bug.cgi?id=1229451 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229455 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229480 * https://bugzilla.suse.com/show_bug.cgi?id=1229481 * https://bugzilla.suse.com/show_bug.cgi?id=1229482 * https://bugzilla.suse.com/show_bug.cgi?id=1229484 * https://bugzilla.suse.com/show_bug.cgi?id=1229485 * https://bugzilla.suse.com/show_bug.cgi?id=1229486 * https://bugzilla.suse.com/show_bug.cgi?id=1229487 * https://bugzilla.suse.com/show_bug.cgi?id=1229488 * https://bugzilla.suse.com/show_bug.cgi?id=1229489 * https://bugzilla.suse.com/show_bug.cgi?id=1229490 * https://bugzilla.suse.com/show_bug.cgi?id=1229493 * https://bugzilla.suse.com/show_bug.cgi?id=1229495 * https://bugzilla.suse.com/show_bug.cgi?id=1229496 * https://bugzilla.suse.com/show_bug.cgi?id=1229497 * https://bugzilla.suse.com/show_bug.cgi?id=1229500 * https://bugzilla.suse.com/show_bug.cgi?id=1229503 * https://bugzilla.suse.com/show_bug.cgi?id=1229707 * https://bugzilla.suse.com/show_bug.cgi?id=1229739 * https://bugzilla.suse.com/show_bug.cgi?id=1229743 * https://bugzilla.suse.com/show_bug.cgi?id=1229746 * https://bugzilla.suse.com/show_bug.cgi?id=1229747 * https://bugzilla.suse.com/show_bug.cgi?id=1229752 * https://bugzilla.suse.com/show_bug.cgi?id=1229754 * https://bugzilla.suse.com/show_bug.cgi?id=1229755 * https://bugzilla.suse.com/show_bug.cgi?id=1229756 * https://bugzilla.suse.com/show_bug.cgi?id=1229759 * https://bugzilla.suse.com/show_bug.cgi?id=1229761 * https://bugzilla.suse.com/show_bug.cgi?id=1229767 * https://bugzilla.suse.com/show_bug.cgi?id=1229781 * https://bugzilla.suse.com/show_bug.cgi?id=1229784 * https://bugzilla.suse.com/show_bug.cgi?id=1229785 * https://bugzilla.suse.com/show_bug.cgi?id=1229787 * https://bugzilla.suse.com/show_bug.cgi?id=1229788 * https://bugzilla.suse.com/show_bug.cgi?id=1229789 * https://bugzilla.suse.com/show_bug.cgi?id=1229792 * https://bugzilla.suse.com/show_bug.cgi?id=1229820 * https://bugzilla.suse.com/show_bug.cgi?id=1229827 * https://bugzilla.suse.com/show_bug.cgi?id=1229830 * https://bugzilla.suse.com/show_bug.cgi?id=1229837 * https://bugzilla.suse.com/show_bug.cgi?id=1229940 * https://bugzilla.suse.com/show_bug.cgi?id=1230056 * https://bugzilla.suse.com/show_bug.cgi?id=1230350 * https://bugzilla.suse.com/show_bug.cgi?id=1230413 * https://jira.suse.com/browse/PED-10029 * https://jira.suse.com/browse/PED-10045 * https://jira.suse.com/browse/PED-10055 * https://jira.suse.com/browse/PED-10105 * https://jira.suse.com/browse/PED-10108 * https://jira.suse.com/browse/PED-8491 * https://jira.suse.com/browse/PED-8779 * https://jira.suse.com/browse/PED-8954
--===============0241071922796769080== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2024:3383-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">bsc#1193454</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205462">bsc#1205462</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">bsc#1208783</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">bsc#1213123</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214285">bsc#1214285</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220066">bsc#1220066</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220252">bsc#1220252</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220877">bsc#1220877</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221326">bsc#1221326</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221630">bsc#1221630</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">bsc#1221645</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221652">bsc#1221652</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221857">bsc#1221857</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222254">bsc#1222254</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222335">bsc#1222335</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222350">bsc#1222350</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">bsc#1222364</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">bsc#1222372</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222387">bsc#1222387</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222433">bsc#1222433</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222434">bsc#1222434</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222463">bsc#1222463</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">bsc#1222625</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222633">bsc#1222633</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222634">bsc#1222634</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222808">bsc#1222808</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222967">bsc#1222967</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222973">bsc#1222973</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223053">bsc#1223053</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223074">bsc#1223074</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">bsc#1223191</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223395">bsc#1223395</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">bsc#1223635</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223720">bsc#1223720</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223731">bsc#1223731</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223742">bsc#1223742</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223763">bsc#1223763</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223767">bsc#1223767</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223777">bsc#1223777</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223803">bsc#1223803</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224105">bsc#1224105</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224415">bsc#1224415</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224485">bsc#1224485</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224496">bsc#1224496</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224510">bsc#1224510</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224535">bsc#1224535</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224631">bsc#1224631</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">bsc#1224636</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224690">bsc#1224690</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">bsc#1224694</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">bsc#1224700</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224711">bsc#1224711</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">bsc#1225475</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225582">bsc#1225582</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">bsc#1225607</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">bsc#1225717</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225718">bsc#1225718</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">bsc#1225744</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">bsc#1225745</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225751">bsc#1225751</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225814">bsc#1225814</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225832">bsc#1225832</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">bsc#1225838</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">bsc#1225903</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226031">bsc#1226031</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226127">bsc#1226127</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">bsc#1226502</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226530">bsc#1226530</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">bsc#1226588</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226604">bsc#1226604</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226743">bsc#1226743</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226751">bsc#1226751</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226765">bsc#1226765</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226798">bsc#1226798</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226801">bsc#1226801</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">bsc#1226834</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226874">bsc#1226874</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226885">bsc#1226885</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226920">bsc#1226920</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227149">bsc#1227149</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227182">bsc#1227182</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">bsc#1227383</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227437">bsc#1227437</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227492">bsc#1227492</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227493">bsc#1227493</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227494">bsc#1227494</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">bsc#1227618</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">bsc#1227620</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227623">bsc#1227623</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227627">bsc#1227627</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227634">bsc#1227634</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227706">bsc#1227706</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">bsc#1227722</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">bsc#1227724</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">bsc#1227725</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">bsc#1227728</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">bsc#1227729</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">bsc#1227732</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">bsc#1227733</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227734">bsc#1227734</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227747">bsc#1227747</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">bsc#1227750</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">bsc#1227754</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227758">bsc#1227758</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">bsc#1227760</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227761">bsc#1227761</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">bsc#1227764</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">bsc#1227766</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">bsc#1227770</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">bsc#1227771</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">bsc#1227772</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">bsc#1227774</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227781">bsc#1227781</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227784">bsc#1227784</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227785">bsc#1227785</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">bsc#1227787</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">bsc#1227790</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227791">bsc#1227791</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">bsc#1227792</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">bsc#1227796</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">bsc#1227798</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227799">bsc#1227799</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">bsc#1227802</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">bsc#1227808</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">bsc#1227810</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227811">bsc#1227811</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">bsc#1227812</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227815">bsc#1227815</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">bsc#1227816</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227818">bsc#1227818</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">bsc#1227820</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">bsc#1227823</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">bsc#1227824</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227826">bsc#1227826</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">bsc#1227828</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">bsc#1227829</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">bsc#1227830</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227832">bsc#1227832</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227833">bsc#1227833</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227834">bsc#1227834</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227839">bsc#1227839</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227840">bsc#1227840</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">bsc#1227846</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">bsc#1227849</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">bsc#1227851</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">bsc#1227853</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227863">bsc#1227863</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">bsc#1227864</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">bsc#1227865</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227867">bsc#1227867</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227869">bsc#1227869</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">bsc#1227870</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227883">bsc#1227883</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">bsc#1227884</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">bsc#1227891</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">bsc#1227893</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">bsc#1227929</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">bsc#1227950</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">bsc#1227957</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">bsc#1227981</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">bsc#1228020</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228021">bsc#1228021</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">bsc#1228114</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228192">bsc#1228192</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">bsc#1228195</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">bsc#1228202</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">bsc#1228235</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228236">bsc#1228236</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">bsc#1228237</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">bsc#1228247</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228321">bsc#1228321</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">bsc#1228409</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228426">bsc#1228426</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228427">bsc#1228427</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228429">bsc#1228429</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228446">bsc#1228446</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228447">bsc#1228447</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228449">bsc#1228449</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228450">bsc#1228450</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228452">bsc#1228452</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228456">bsc#1228456</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228457">bsc#1228457</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228458">bsc#1228458</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">bsc#1228459</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228460">bsc#1228460</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">bsc#1228462</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228463">bsc#1228463</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228466">bsc#1228466</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228467">bsc#1228467</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228468">bsc#1228468</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228469">bsc#1228469</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">bsc#1228470</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228472">bsc#1228472</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228479">bsc#1228479</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228480">bsc#1228480</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228481">bsc#1228481</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228482">bsc#1228482</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228483">bsc#1228483</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228484">bsc#1228484</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228485">bsc#1228485</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">bsc#1228486</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228487">bsc#1228487</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228489">bsc#1228489</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228491">bsc#1228491</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228492">bsc#1228492</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228493">bsc#1228493</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228494">bsc#1228494</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228495">bsc#1228495</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228496">bsc#1228496</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228499">bsc#1228499</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228500">bsc#1228500</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228501">bsc#1228501</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228502">bsc#1228502</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228503">bsc#1228503</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228505">bsc#1228505</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228508">bsc#1228508</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228509">bsc#1228509</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228510">bsc#1228510</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228511">bsc#1228511</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228513">bsc#1228513</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228515">bsc#1228515</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228516">bsc#1228516</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">bsc#1228518</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">bsc#1228520</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228525">bsc#1228525</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228527">bsc#1228527</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">bsc#1228530</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228531">bsc#1228531</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228539">bsc#1228539</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">bsc#1228561</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228563">bsc#1228563</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228564">bsc#1228564</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">bsc#1228565</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">bsc#1228567</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228568">bsc#1228568</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228572">bsc#1228572</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228576">bsc#1228576</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228579">bsc#1228579</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">bsc#1228580</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">bsc#1228581</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228582">bsc#1228582</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">bsc#1228584</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228586">bsc#1228586</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">bsc#1228588</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228590">bsc#1228590</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">bsc#1228591</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">bsc#1228599</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228615">bsc#1228615</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228616">bsc#1228616</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">bsc#1228617</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">bsc#1228625</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">bsc#1228626</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">bsc#1228633</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228635">bsc#1228635</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228636">bsc#1228636</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">bsc#1228640</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228643">bsc#1228643</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">bsc#1228644</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228646">bsc#1228646</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">bsc#1228649</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">bsc#1228650</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228654">bsc#1228654</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">bsc#1228655</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228656">bsc#1228656</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">bsc#1228658</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228660">bsc#1228660</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">bsc#1228662</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">bsc#1228665</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228666">bsc#1228666</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228667">bsc#1228667</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">bsc#1228672</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228673">bsc#1228673</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228674">bsc#1228674</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228677">bsc#1228677</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">bsc#1228680</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228687">bsc#1228687</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">bsc#1228705</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228706">bsc#1228706</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228707">bsc#1228707</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228708">bsc#1228708</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228709">bsc#1228709</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228710">bsc#1228710</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228718">bsc#1228718</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228720">bsc#1228720</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228721">bsc#1228721</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228722">bsc#1228722</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">bsc#1228723</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228724">bsc#1228724</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">bsc#1228726</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228727">bsc#1228727</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228733">bsc#1228733</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228737">bsc#1228737</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">bsc#1228743</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228748">bsc#1228748</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228754">bsc#1228754</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">bsc#1228756</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228757">bsc#1228757</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228758">bsc#1228758</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228764">bsc#1228764</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228766">bsc#1228766</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228779">bsc#1228779</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">bsc#1228801</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228849">bsc#1228849</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">bsc#1228850</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">bsc#1228857</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228959">bsc#1228959</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228964">bsc#1228964</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228966">bsc#1228966</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228967">bsc#1228967</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228973">bsc#1228973</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228977">bsc#1228977</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228978">bsc#1228978</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228979">bsc#1228979</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228986">bsc#1228986</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228988">bsc#1228988</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228989">bsc#1228989</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228991">bsc#1228991</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228992">bsc#1228992</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229005">bsc#1229005</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229024">bsc#1229024</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229042">bsc#1229042</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229045">bsc#1229045</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229046">bsc#1229046</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229054">bsc#1229054</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229056">bsc#1229056</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229086">bsc#1229086</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229134">bsc#1229134</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229136">bsc#1229136</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229154">bsc#1229154</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229156">bsc#1229156</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229160">bsc#1229160</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229167">bsc#1229167</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229168">bsc#1229168</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229169">bsc#1229169</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229170">bsc#1229170</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229171">bsc#1229171</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229172">bsc#1229172</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229173">bsc#1229173</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229174">bsc#1229174</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229239">bsc#1229239</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229240">bsc#1229240</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229241">bsc#1229241</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229243">bsc#1229243</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229244">bsc#1229244</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229245">bsc#1229245</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229246">bsc#1229246</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229247">bsc#1229247</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229248">bsc#1229248</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229249">bsc#1229249</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229250">bsc#1229250</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229251">bsc#1229251</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229252">bsc#1229252</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229253">bsc#1229253</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229254">bsc#1229254</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229255">bsc#1229255</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229256">bsc#1229256</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229287">bsc#1229287</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229290">bsc#1229290</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229291">bsc#1229291</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229292">bsc#1229292</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229294">bsc#1229294</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229296">bsc#1229296</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229297">bsc#1229297</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229298">bsc#1229298</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229299">bsc#1229299</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229301">bsc#1229301</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229303">bsc#1229303</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229304">bsc#1229304</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229305">bsc#1229305</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229307">bsc#1229307</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229309">bsc#1229309</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">bsc#1229312</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229313">bsc#1229313</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229314">bsc#1229314</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229315">bsc#1229315</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229316">bsc#1229316</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229317">bsc#1229317</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229318">bsc#1229318</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229319">bsc#1229319</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229320">bsc#1229320</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229327">bsc#1229327</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229341">bsc#1229341</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229342">bsc#1229342</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229344">bsc#1229344</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229345">bsc#1229345</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229346">bsc#1229346</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229347">bsc#1229347</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229349">bsc#1229349</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229350">bsc#1229350</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229351">bsc#1229351</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229353">bsc#1229353</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229354">bsc#1229354</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229355">bsc#1229355</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229356">bsc#1229356</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229357">bsc#1229357</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229358">bsc#1229358</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229359">bsc#1229359</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229360">bsc#1229360</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229365">bsc#1229365</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229366">bsc#1229366</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229369">bsc#1229369</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229370">bsc#1229370</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229373">bsc#1229373</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229374">bsc#1229374</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229379">bsc#1229379</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229381">bsc#1229381</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229382">bsc#1229382</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229383">bsc#1229383</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229386">bsc#1229386</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229388">bsc#1229388</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229390">bsc#1229390</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229391">bsc#1229391</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229392">bsc#1229392</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229395">bsc#1229395</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229398">bsc#1229398</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229399">bsc#1229399</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229400">bsc#1229400</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229402">bsc#1229402</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229403">bsc#1229403</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229404">bsc#1229404</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229407">bsc#1229407</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229409">bsc#1229409</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229410">bsc#1229410</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229411">bsc#1229411</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229413">bsc#1229413</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229414">bsc#1229414</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229417">bsc#1229417</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229444">bsc#1229444</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229451">bsc#1229451</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229452">bsc#1229452</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229455">bsc#1229455</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229456">bsc#1229456</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229480">bsc#1229480</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229481">bsc#1229481</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229482">bsc#1229482</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229484">bsc#1229484</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229485">bsc#1229485</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229486">bsc#1229486</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229487">bsc#1229487</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229488">bsc#1229488</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229489">bsc#1229489</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229490">bsc#1229490</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229493">bsc#1229493</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229495">bsc#1229495</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229496">bsc#1229496</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229497">bsc#1229497</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229500">bsc#1229500</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229503">bsc#1229503</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229707">bsc#1229707</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229739">bsc#1229739</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229743">bsc#1229743</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229746">bsc#1229746</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229747">bsc#1229747</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">bsc#1229752</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229754">bsc#1229754</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229755">bsc#1229755</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229756">bsc#1229756</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229759">bsc#1229759</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229761">bsc#1229761</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229767">bsc#1229767</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229781">bsc#1229781</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229784">bsc#1229784</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229785">bsc#1229785</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229787">bsc#1229787</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229788">bsc#1229788</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229789">bsc#1229789</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229792">bsc#1229792</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229820">bsc#1229820</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229827">bsc#1229827</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229830">bsc#1229830</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229837">bsc#1229837</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229940">bsc#1229940</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230056">bsc#1230056</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230350">bsc#1230350</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230413">bsc#1230413</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-10029">jsc#PED-10029</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-10045">jsc#PED-10045</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-10055">jsc#PED-10055</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-10105">jsc#PED-10105</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-10108">jsc#PED-10108</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-8491">jsc#PED-8491</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-8779">jsc#PED-8779</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-8954">jsc#PED-8954</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52489.html">CVE-2023-52489</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52581.html">CVE-2023-52581</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52668.html">CVE-2023-52668</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52688.html">CVE-2023-52688</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52735.html">CVE-2023-52735</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52859.html">CVE-2023-52859</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52885.html">CVE-2023-52885</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52886.html">CVE-2023-52886</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52887.html">CVE-2023-52887</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52889.html">CVE-2023-52889</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26590.html">CVE-2024-26590</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26631.html">CVE-2024-26631</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26637.html">CVE-2024-26637</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26668.html">CVE-2024-26668</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26669.html">CVE-2024-26669</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26677.html">CVE-2024-26677</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26682.html">CVE-2024-26682</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26683.html">CVE-2024-26683</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26691.html">CVE-2024-26691</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26735.html">CVE-2024-26735</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26808.html">CVE-2024-26808</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26809.html">CVE-2024-26809</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26812.html">CVE-2024-26812</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26835.html">CVE-2024-26835</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26837.html">CVE-2024-26837</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26849.html">CVE-2024-26849</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26851.html">CVE-2024-26851</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26889.html">CVE-2024-26889</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26920.html">CVE-2024-26920</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26944.html">CVE-2024-26944</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26976.html">CVE-2024-26976</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27010.html">CVE-2024-27010</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27011.html">CVE-2024-27011</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27024.html">CVE-2024-27024</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27049.html">CVE-2024-27049</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27050.html">CVE-2024-27050</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27079.html">CVE-2024-27079</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27403.html">CVE-2024-27403</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27433.html">CVE-2024-27433</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27437.html">CVE-2024-27437</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-31076.html">CVE-2024-31076</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35854.html">CVE-2024-35854</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35855.html">CVE-2024-35855</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35897.html">CVE-2024-35897</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35902.html">CVE-2024-35902</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35913.html">CVE-2024-35913</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35939.html">CVE-2024-35939</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-35949.html">CVE-2024-35949</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36270.html">CVE-2024-36270</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36286.html">CVE-2024-36286</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36288.html">CVE-2024-36288</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36489.html">CVE-2024-36489</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36881.html">CVE-2024-36881</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36907.html">CVE-2024-36907</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36909.html">CVE-2024-36909</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36910.html">CVE-2024-36910</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36911.html">CVE-2024-36911</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36929.html">CVE-2024-36929</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36933.html">CVE-2024-36933</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36939.html">CVE-2024-36939</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36970.html">CVE-2024-36970</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-36979.html">CVE-2024-36979</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38548.html">CVE-2024-38548</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38563.html">CVE-2024-38563</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38609.html">CVE-2024-38609</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-38662.html">CVE-2024-38662</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39476.html">CVE-2024-39476</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39483.html">CVE-2024-39483</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39484.html">CVE-2024-39484</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39486.html">CVE-2024-39486</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39488.html">CVE-2024-39488</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39489.html">CVE-2024-39489</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39491.html">CVE-2024-39491</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39493.html">CVE-2024-39493</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39497.html">CVE-2024-39497</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39499.html">CVE-2024-39499</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39500.html">CVE-2024-39500</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39501.html">CVE-2024-39501</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39505.html">CVE-2024-39505</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39506.html">CVE-2024-39506</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39508.html">CVE-2024-39508</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39509.html">CVE-2024-39509</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-39510.html">CVE-2024-39510</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40899.html">CVE-2024-40899</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40900.html">CVE-2024-40900</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40902.html">CVE-2024-40902</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40903.html">CVE-2024-40903</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40904.html">CVE-2024-40904</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40905.html">CVE-2024-40905</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40909.html">CVE-2024-40909</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40910.html">CVE-2024-40910</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40911.html">CVE-2024-40911</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40912.html">CVE-2024-40912</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40913.html">CVE-2024-40913</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40916.html">CVE-2024-40916</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40920.html">CVE-2024-40920</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40921.html">CVE-2024-40921</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40922.html">CVE-2024-40922</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40924.html">CVE-2024-40924</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40926.html">CVE-2024-40926</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40927.html">CVE-2024-40927</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40929.html">CVE-2024-40929</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40930.html">CVE-2024-40930</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40932.html">CVE-2024-40932</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40934.html">CVE-2024-40934</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40936.html">CVE-2024-40936</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40938.html">CVE-2024-40938</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40939.html">CVE-2024-40939</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40941.html">CVE-2024-40941</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40942.html">CVE-2024-40942</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40943.html">CVE-2024-40943</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40944.html">CVE-2024-40944</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40945.html">CVE-2024-40945</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40954.html">CVE-2024-40954</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40956.html">CVE-2024-40956</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40957.html">CVE-2024-40957</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40958.html">CVE-2024-40958</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40959.html">CVE-2024-40959</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40962.html">CVE-2024-40962</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40964.html">CVE-2024-40964</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40967.html">CVE-2024-40967</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40976.html">CVE-2024-40976</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40977.html">CVE-2024-40977</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40978.html">CVE-2024-40978</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40981.html">CVE-2024-40981</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40982.html">CVE-2024-40982</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40984.html">CVE-2024-40984</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40987.html">CVE-2024-40987</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40988.html">CVE-2024-40988</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40989.html">CVE-2024-40989</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40990.html">CVE-2024-40990</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40992.html">CVE-2024-40992</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40994.html">CVE-2024-40994</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40995.html">CVE-2024-40995</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-40997.html">CVE-2024-40997</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41000.html">CVE-2024-41000</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41001.html">CVE-2024-41001</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41002.html">CVE-2024-41002</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41004.html">CVE-2024-41004</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41007.html">CVE-2024-41007</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41009.html">CVE-2024-41009</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41010.html">CVE-2024-41010</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41011.html">CVE-2024-41011</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41012.html">CVE-2024-41012</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41015.html">CVE-2024-41015</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41020.html">CVE-2024-41020</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41022.html">CVE-2024-41022</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41024.html">CVE-2024-41024</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41025.html">CVE-2024-41025</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41028.html">CVE-2024-41028</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41032.html">CVE-2024-41032</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41035.html">CVE-2024-41035</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41036.html">CVE-2024-41036</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41037.html">CVE-2024-41037</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41038.html">CVE-2024-41038</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41039.html">CVE-2024-41039</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41040.html">CVE-2024-41040</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41041.html">CVE-2024-41041</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41044.html">CVE-2024-41044</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41045.html">CVE-2024-41045</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41048.html">CVE-2024-41048</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41049.html">CVE-2024-41049</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41050.html">CVE-2024-41050</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41051.html">CVE-2024-41051</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41056.html">CVE-2024-41056</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41057.html">CVE-2024-41057</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41058.html">CVE-2024-41058</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41059.html">CVE-2024-41059</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41060.html">CVE-2024-41060</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41061.html">CVE-2024-41061</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41062.html">CVE-2024-41062</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41063.html">CVE-2024-41063</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41064.html">CVE-2024-41064</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41065.html">CVE-2024-41065</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41066.html">CVE-2024-41066</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41068.html">CVE-2024-41068</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41069.html">CVE-2024-41069</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41070.html">CVE-2024-41070</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41071.html">CVE-2024-41071</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41072.html">CVE-2024-41072</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41073.html">CVE-2024-41073</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41074.html">CVE-2024-41074</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41075.html">CVE-2024-41075</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41076.html">CVE-2024-41076</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41078.html">CVE-2024-41078</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41079.html">CVE-2024-41079</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41080.html">CVE-2024-41080</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41081.html">CVE-2024-41081</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41084.html">CVE-2024-41084</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41087.html">CVE-2024-41087</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41088.html">CVE-2024-41088</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41089.html">CVE-2024-41089</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41092.html">CVE-2024-41092</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41093.html">CVE-2024-41093</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41094.html">CVE-2024-41094</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41095.html">CVE-2024-41095</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41096.html">CVE-2024-41096</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41097.html">CVE-2024-41097</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-41098.html">CVE-2024-41098</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42064.html">CVE-2024-42064</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42069.html">CVE-2024-42069</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42070.html">CVE-2024-42070</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42073.html">CVE-2024-42073</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42074.html">CVE-2024-42074</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42076.html">CVE-2024-42076</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42077.html">CVE-2024-42077</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42079.html">CVE-2024-42079</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42080.html">CVE-2024-42080</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42082.html">CVE-2024-42082</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42085.html">CVE-2024-42085</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42086.html">CVE-2024-42086</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42087.html">CVE-2024-42087</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42089.html">CVE-2024-42089</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42090.html">CVE-2024-42090</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42092.html">CVE-2024-42092</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42093.html">CVE-2024-42093</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42095.html">CVE-2024-42095</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42096.html">CVE-2024-42096</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42097.html">CVE-2024-42097</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42098.html">CVE-2024-42098</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42101.html">CVE-2024-42101</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42104.html">CVE-2024-42104</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42105.html">CVE-2024-42105</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42106.html">CVE-2024-42106</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42107.html">CVE-2024-42107</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42109.html">CVE-2024-42109</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42110.html">CVE-2024-42110</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42113.html">CVE-2024-42113</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42114.html">CVE-2024-42114</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42115.html">CVE-2024-42115</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42117.html">CVE-2024-42117</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42119.html">CVE-2024-42119</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42120.html">CVE-2024-42120</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42121.html">CVE-2024-42121</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42122.html">CVE-2024-42122</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42124.html">CVE-2024-42124</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42125.html">CVE-2024-42125</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42126.html">CVE-2024-42126</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42127.html">CVE-2024-42127</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42130.html">CVE-2024-42130</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42131.html">CVE-2024-42131</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42132.html">CVE-2024-42132</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42133.html">CVE-2024-42133</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42136.html">CVE-2024-42136</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42137.html">CVE-2024-42137</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42138.html">CVE-2024-42138</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42139.html">CVE-2024-42139</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42141.html">CVE-2024-42141</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42142.html">CVE-2024-42142</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42143.html">CVE-2024-42143</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42144.html">CVE-2024-42144</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42145.html">CVE-2024-42145</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42147.html">CVE-2024-42147</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42148.html">CVE-2024-42148</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42152.html">CVE-2024-42152</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42153.html">CVE-2024-42153</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42155.html">CVE-2024-42155</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42156.html">CVE-2024-42156</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42157.html">CVE-2024-42157</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42158.html">CVE-2024-42158</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42159.html">CVE-2024-42159</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42161.html">CVE-2024-42161</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42162.html">CVE-2024-42162</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42223.html">CVE-2024-42223</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42224.html">CVE-2024-42224</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42225.html">CVE-2024-42225</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42226.html">CVE-2024-42226</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42227.html">CVE-2024-42227</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42228.html">CVE-2024-42228</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42229.html">CVE-2024-42229</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42230.html">CVE-2024-42230</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42232.html">CVE-2024-42232</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42236.html">CVE-2024-42236</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42237.html">CVE-2024-42237</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42238.html">CVE-2024-42238</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42239.html">CVE-2024-42239</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42240.html">CVE-2024-42240</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42241.html">CVE-2024-42241</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42244.html">CVE-2024-42244</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42245.html">CVE-2024-42245</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42246.html">CVE-2024-42246</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42247.html">CVE-2024-42247</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42250.html">CVE-2024-42250</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42253.html">CVE-2024-42253</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42259.html">CVE-2024-42259</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42268.html">CVE-2024-42268</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42269.html">CVE-2024-42269</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42270.html">CVE-2024-42270</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42271.html">CVE-2024-42271</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42274.html">CVE-2024-42274</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42276.html">CVE-2024-42276</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42277.html">CVE-2024-42277</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42278.html">CVE-2024-42278</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42279.html">CVE-2024-42279</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42280.html">CVE-2024-42280</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42281.html">CVE-2024-42281</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42283.html">CVE-2024-42283</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42284.html">CVE-2024-42284</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42285.html">CVE-2024-42285</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42286.html">CVE-2024-42286</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42287.html">CVE-2024-42287</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42288.html">CVE-2024-42288</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42289.html">CVE-2024-42289</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42290.html">CVE-2024-42290</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42291.html">CVE-2024-42291</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42292.html">CVE-2024-42292</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42295.html">CVE-2024-42295</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42298.html">CVE-2024-42298</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42301.html">CVE-2024-42301</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42302.html">CVE-2024-42302</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42303.html">CVE-2024-42303</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42308.html">CVE-2024-42308</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42309.html">CVE-2024-42309</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42310.html">CVE-2024-42310</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42311.html">CVE-2024-42311</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42312.html">CVE-2024-42312</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42313.html">CVE-2024-42313</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42314.html">CVE-2024-42314</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42315.html">CVE-2024-42315</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42316.html">CVE-2024-42316</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42318.html">CVE-2024-42318</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42319.html">CVE-2024-42319</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42320.html">CVE-2024-42320</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-42322.html">CVE-2024-42322</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43816.html">CVE-2024-43816</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43817.html">CVE-2024-43817</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43818.html">CVE-2024-43818</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43819.html">CVE-2024-43819</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43821.html">CVE-2024-43821</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43823.html">CVE-2024-43823</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43824.html">CVE-2024-43824</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43825.html">CVE-2024-43825</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43826.html">CVE-2024-43826</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43829.html">CVE-2024-43829</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43830.html">CVE-2024-43830</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43831.html">CVE-2024-43831</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43833.html">CVE-2024-43833</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43834.html">CVE-2024-43834</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43837.html">CVE-2024-43837</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43839.html">CVE-2024-43839</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43840.html">CVE-2024-43840</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43841.html">CVE-2024-43841</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43842.html">CVE-2024-43842</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43846.html">CVE-2024-43846</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43847.html">CVE-2024-43847</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43849.html">CVE-2024-43849</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43850.html">CVE-2024-43850</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43851.html">CVE-2024-43851</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43853.html">CVE-2024-43853</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43854.html">CVE-2024-43854</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43855.html">CVE-2024-43855</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43856.html">CVE-2024-43856</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43858.html">CVE-2024-43858</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43860.html">CVE-2024-43860</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43861.html">CVE-2024-43861</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43863.html">CVE-2024-43863</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43864.html">CVE-2024-43864</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43866.html">CVE-2024-43866</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43867.html">CVE-2024-43867</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43871.html">CVE-2024-43871</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43872.html">CVE-2024-43872</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43873.html">CVE-2024-43873</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43874.html">CVE-2024-43874</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43875.html">CVE-2024-43875</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43876.html">CVE-2024-43876</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43877.html">CVE-2024-43877</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43879.html">CVE-2024-43879</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43880.html">CVE-2024-43880</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43881.html">CVE-2024-43881</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43882.html">CVE-2024-43882</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43883.html">CVE-2024-43883</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43884.html">CVE-2024-43884</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43885.html">CVE-2024-43885</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43889.html">CVE-2024-43889</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43892.html">CVE-2024-43892</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43893.html">CVE-2024-43893</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43894.html">CVE-2024-43894</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43895.html">CVE-2024-43895</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43897.html">CVE-2024-43897</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43899.html">CVE-2024-43899</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43900.html">CVE-2024-43900</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43902.html">CVE-2024-43902</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43903.html">CVE-2024-43903</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43905.html">CVE-2024-43905</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43906.html">CVE-2024-43906</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43907.html">CVE-2024-43907</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43908.html">CVE-2024-43908</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43909.html">CVE-2024-43909</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43911.html">CVE-2024-43911</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-43912.html">CVE-2024-43912</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-44931.html">CVE-2024-44931</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-44938.html">CVE-2024-44938</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-44939.html">CVE-2024-44939</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52489</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52581</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52668</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52688</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52735</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52859</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52885</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.1</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52885</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52886</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52886</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52887</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52887</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52889</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52889</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26590</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26590</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26631</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26637</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26668</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26669</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26677</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26682</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26683</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26691</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26735</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26808</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26809</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26812</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26835</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26837</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26849</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26851</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26889</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26920</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26944</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26976</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27010</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27011</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27024</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.3</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27049</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27050</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27079</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27403</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27433</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27437</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-31076</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35854</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35855</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35897</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35939</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-35949</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36270</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36270</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36286</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36288</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36288</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36489</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36489</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36881</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36907</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36909</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36910</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36911</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36929</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36933</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36939</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36970</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36979</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-36979</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38548</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38563</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38563</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38609</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38662</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-38662</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39476</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39476</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39483</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39483</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39484</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39484</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39486</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39486</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39488</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39489</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39489</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39491</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39493</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39493</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39497</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39499</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39500</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39501</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39505</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39506</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39506</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39508</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39509</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39510</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-39510</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40899</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40899</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40900</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40902</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40902</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40903</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40903</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40904</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40904</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40905</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40905</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40909</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40909</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40910</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40910</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40911</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40911</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40912</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40912</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40913</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40916</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40920</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40921</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40922</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40924</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40926</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40927</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40929</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40930</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40932</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40932</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40934</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40934</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40936</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40938</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40939</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40941</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40942</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40943</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40944</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40945</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40954</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40954</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40956</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40956</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40957</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40957</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40958</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40958</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40959</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40959</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40962</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40964</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40964</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40967</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40967</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40976</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40977</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40977</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40978</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40981</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40981</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40982</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40982</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40984</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40987</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40988</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40989</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40990</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40992</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40994</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40994</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40995</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40995</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40997</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-40997</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41000</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41000</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41001</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41001</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41002</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41002</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41004</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41007</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41007</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41009</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41009</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41010</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41010</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41011</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41011</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41012</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41012</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41015</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41016</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41020</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41020</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41022</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41022</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41024</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41024</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41025</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41028</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41032</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41035</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41036</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41036</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41037</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41037</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41038</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41038</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41039</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41039</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41040</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41040</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41041</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41044</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41045</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41048</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41049</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41049</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41050</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41056</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41057</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41057</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41057</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41058</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41058</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41058</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41059</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41059</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41059</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41060</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41060</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41060</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41061</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41061</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41062</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41062</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41063</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41063</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41063</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41064</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41064</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41064</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41065</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41065</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41066</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41066</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41066</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41068</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41069</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41069</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41070</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41070</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41071</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41071</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41072</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41073</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41073</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41074</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41075</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41075</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41076</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41076</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41078</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41079</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41080</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41080</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41081</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41084</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41084</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41087</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41087</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41088</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41088</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41089</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41089</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41092</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41092</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41093</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41093</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41094</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41094</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41094</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41095</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41095</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41096</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41096</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41097</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41097</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41098</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-41098</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42064</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42064</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42064</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42069</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42069</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42070</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42070</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42073</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42073</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42074</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42074</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42076</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42076</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42077</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42077</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42079</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42079</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42080</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42080</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42082</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42082</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42085</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42085</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42086</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42086</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42087</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42089</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42090</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42090</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42092</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42093</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42093</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42095</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42096</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42096</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42097</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.4</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42097</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42098</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42101</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42101</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42104</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42104</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42104</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42105</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42105</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42106</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42107</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42109</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42109</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42110</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42113</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42114</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42114</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42115</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42115</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42117</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42119</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42120</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42121</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42122</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42122</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42124</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42125</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42125</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42126</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42127</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42130</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42130</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42131</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42131</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42132</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42132</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42133</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42133</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42136</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.0</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42136</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42136</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42137</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42137</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42138</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42139</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42141</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42141</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42142</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42143</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42143</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42144</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42144</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42144</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42145</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.7</span> <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42145</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42147</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42147</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42148</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42148</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42152</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42152</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42153</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42153</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42155</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.6</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42155</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42155</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">1.9</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42156</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42156</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42157</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42157</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42158</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42158</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42159</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42159</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42159</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42161</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42161</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42161</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42162</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42162</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42223</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42223</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42224</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42224</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42225</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42225</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42226</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.6</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42226</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.6</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42227</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42227</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42228</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42228</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42229</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42229</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42230</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42230</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42230</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42232</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42232</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42232</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42236</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42236</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.6</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42236</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42237</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42237</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42238</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42238</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42239</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42240</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42240</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42240</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42241</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42241</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42244</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42244</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42244</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42245</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42245</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42246</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42246</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42247</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42247</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42250</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42250</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42253</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42253</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42253</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42259</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42259</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42259</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42268</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42268</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42269</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42269</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42270</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42270</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42271</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42271</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42271</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42274</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42274</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42276</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42276</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42277</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42277</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42277</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42278</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42278</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42279</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42280</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42280</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42281</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42283</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42283</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42284</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42284</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42285</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42285</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42286</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42286</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42287</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42287</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42288</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42288</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42289</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42289</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42290</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42291</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42292</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42295</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42298</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42298</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42301</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42301</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42302</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42302</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42303</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42308</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42308</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42309</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42309</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42310</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42310</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42311</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42311</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42312</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42313</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42313</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42314</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42314</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42315</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42315</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42316</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42316</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42318</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42319</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42320</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-42322</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43816</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43817</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43817</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43818</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43818</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43819</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43819</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43821</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43821</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43823</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43823</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43824</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43824</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43825</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43826</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43829</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43830</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43831</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43833</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43833</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43834</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43837</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43837</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43839</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43840</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43841</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43842</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43846</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43847</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43849</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43850</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43851</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43853</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43853</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43854</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43854</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43855</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43855</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43856</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43856</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43858</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43858</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43860</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43860</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43861</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43861</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43863</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43863</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43864</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43866</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43867</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43871</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43871</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43872</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43872</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43873</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43873</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43874</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43874</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43875</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43876</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43877</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43879</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43880</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43881</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43881</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43882</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43882</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43883</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.4</span> <span class="cvss-vector">CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43883</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43884</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43884</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43884</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43885</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43885</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43889</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43889</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43889</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43892</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43892</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43892</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43893</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43893</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43893</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43894</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43894</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43894</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43895</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43895</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43895</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43897</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43897</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43899</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43899</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43900</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43900</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43902</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43902</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43902</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43903</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43903</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43903</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43905</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43905</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43905</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43906</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43906</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43906</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43907</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43907</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43907</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43908</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43908</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43908</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43909</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43909</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43909</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43911</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43911</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43911</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43912</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43912</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-43912</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44931</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44931</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44931</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44938</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44938</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44938</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44939</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44939</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-44939</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">Basesystem Module 15-SP6</li> <li class="list-group-item">Development Tools Module 15-SP6</li> <li class="list-group-item">Legacy Module 15-SP6</li> <li class="list-group-item">openSUSE Leap 15.6</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP6</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Workstation Extension 15 SP6</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 394 vulnerabilities, contains eight features and has 85 security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (bsc#1229827).</li> <li>CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c (bsc#1229754).</li> <li>CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)</li> <li>CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct objagg_ops (bsc#1229481).</li> <li>CVE-2024-43866: net/mlx5: Always drain health in shutdown callback (bsc#1229495).</li> <li>CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header context (bsc#1229496).</li> <li>CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio (bsc#1229342).</li> <li>CVE-2024-43854: block: initialize integrity buffer to zero before writing it to media (bsc#1229345)</li> <li>CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove (bsc#1229316).</li> <li>CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).</li> <li>CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map (bsc#1229297).</li> <li>CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy() (bsc#1229314)</li> <li>CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi (bsc#1229309).</li> <li>CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference (bsc#1229315).</li> <li>CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service (bsc#1229347)</li> <li>CVE-2024-42318: landlock: Do not lose track of restrictions on cred_transfer (bsc#1229351).</li> <li>CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level() (bsc#1229353).</li> <li>CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357)</li> <li>CVE-2024-42308: Update DRM patch reference (bsc#1229411)</li> <li>CVE-2024-42301: dev/parport: fix the array out-of-bounds risk (bsc#1229407).</li> <li>CVE-2024-42295: nilfs2: handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370).</li> <li>CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters (bsc#1229374).</li> <li>CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management correctly (bsc#1229379).</li> <li>CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)</li> <li>CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops (bsc#1229383)</li> <li>CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size (bsc#1229386).</li> <li>CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).</li> <li>CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init() (bsc#1229404).</li> <li>CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init() (bsc#1229402).</li> <li>CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload (bsc#1229391).</li> <li>CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory accesses (bsc#1228988).</li> <li>CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).</li> <li>CVE-2024-42245: Revert "sched/fair: Make sure to try to detach at least one movable task" (bsc#1228978).</li> <li>CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed (bsc#1228986).</li> <li>CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).</li> <li>CVE-2024-42162: gve: Account for stopped queues when reading NIC stats (bsc#1228706).</li> <li>CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).</li> <li>CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys (bsc#1228754).</li> <li>CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).</li> <li>CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727).</li> <li>CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure (bsc#1228722).</li> <li>CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys (bsc#1228733).</li> <li>CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).</li> <li>CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).</li> <li>CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed (bsc#1228491).</li> <li>CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503).</li> <li>CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file (bsc#1228500).</li> <li>CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).</li> <li>CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591).</li> <li>CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts (bsc#1228568).</li> <li>CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).</li> <li>CVE-2024-42109: netfilter: nf_tables: unconditionally flush pending work before notifier (bsc#1228505).</li> <li>CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494).</li> <li>CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).</li> <li>CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).</li> <li>CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level check (bsc#1228446).</li> <li>CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).</li> <li>CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).</li> <li>CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).</li> <li>CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems (bsc#1228457).</li> <li>CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).</li> <li>CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup (bsc#1228472).</li> <li>CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).</li> <li>CVE-2024-41080: io_uring: fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616).</li> <li>CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).</li> <li>CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).</li> <li>CVE-2024-41075: cachefiles: add consistency check for copen/cread (bsc#1228646).</li> <li>CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in copen (bsc#1228643).</li> <li>CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).</li> <li>CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).</li> <li>CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure (bsc#1228579).</li> <li>CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).</li> <li>CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).</li> <li>CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576).</li> <li>CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).</li> <li>CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).</li> <li>CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when dropping object (bsc#1228468).</li> <li>CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse (bsc#1228499).</li> <li>CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).</li> <li>CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).</li> <li>CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520).</li> <li>CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518).</li> <li>CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant (bsc#1228496).</li> <li>CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask (bsc#1228460).</li> <li>CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path (bsc#1228427).</li> <li>CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).</li> <li>CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).</li> <li>CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021).</li> <li>CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).</li> <li>CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).</li> <li>CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867).</li> <li>CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).</li> <li>CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).</li> <li>CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).</li> <li>CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).</li> <li>CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).</li> <li>CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).</li> <li>CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (bsc#1227811).</li> <li>CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).</li> <li>CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)</li> <li>CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (bsc#1227799).</li> <li>CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840).</li> <li>CVE-2024-40921: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state (bsc#1227784).</li> <li>CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state (bsc#1227781).</li> <li>CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).</li> <li>CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)</li> <li>CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).</li> <li>CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623)</li> <li>CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).</li> <li>CVE-2024-36979: net: bridge: mst: fix vlan use-after-free (bsc#1226604).</li> <li>CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832).</li> <li>CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814).</li> <li>CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).</li> <li>CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).</li> <li>CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).</li> <li>CVE-2024-36881: mm/userfaultfd: Fix reset ptes when close() for wr-protected (bsc#1225718).</li> <li>CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874)</li> <li>CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)</li> <li>CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if-IP-has-been-disabled-on.patch (bsc#1226798)</li> <li>CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).</li> <li>CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).</li> <li>CVE-2024-35897: netfilter: nf_tables: discard table flag update with pending basechain deletion (bsc#1224510).</li> <li>CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).</li> <li>CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe() (bsc#1224711).</li> <li>CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init() (bsc#1224415).</li> <li>CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release (bsc#1223742).</li> <li>CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777).</li> <li>CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path (bsc#1223803).</li> <li>CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion (bsc#1223720).</li> <li>CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (bsc#1223074)</li> <li>CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973).</li> <li>CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register failure (bsc#1222967).</li> <li>CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808).</li> <li>CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only from destroy path (bsc#1222633).</li> <li>CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).</li> <li>CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).</li> <li>CVE-2024-26677: blacklist.conf: Add e7870cf13d20 ("rxrpc: Fix delayed ACKs to not set the reference serial number") (bsc#1222387)</li> <li>CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload (bsc#1222350).</li> <li>CVE-2024-26668: netfilter: nft_limit: reject configurations that cause integer overflow (bsc#1222335).</li> <li>CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).</li> <li>CVE-2024-26590: erofs: fix inconsistent per-file compression format (bsc#1220252).</li> <li>CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during sock creation (bsc#1229287).</li> <li>CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails (bsc#1225582).</li> <li>CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255 elements expired (bsc#1220877).</li> <li>CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326).</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes).</li> <li>ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes).</li> <li>ACPI: battery: create alarm sysfs attribute atomically (stable-fixes).</li> <li>ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git-fixes).</li> <li>ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).</li> <li>ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).</li> <li>ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).</li> <li>ALSA: hda/realtek - Fixed ALC285 headphone no sound (stable-fixes).</li> <li>ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).</li> <li>ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).</li> <li>ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes).</li> <li>ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes).</li> <li>ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable-fixes).</li> <li>ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes).</li> <li>ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra (stable-fixes).</li> <li>ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3 Pro 360 (stable-fixes).</li> <li>ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable-fixes).</li> <li>ALSA: hda/tas2781: Use correct endian conversion (git-fixes).</li> <li>ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes).</li> <li>ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).</li> <li>ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).</li> <li>ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes).</li> <li>ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-fixes).</li> <li>ALSA: line6: Fix racy access to midibuf (stable-fixes).</li> <li>ALSA: line6: Fix racy access to midibuf (stable-fixes).</li> <li>ALSA: seq: Skip event type filtering for UMP events (git-fixes).</li> <li>ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes).</li> <li>ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes).</li> <li>ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes).</li> <li>ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes).</li> <li>ALSA: timer: Relax start tick time check for slave timer elements (git-fixes).</li> <li>ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes).</li> <li>ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes).</li> <li>ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes).</li> <li>ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).</li> <li>ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).</li> <li>ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).</li> <li>ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).</li> <li>ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).</li> <li>ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before suspend (stable-fixes).</li> <li>ASoC: SOF: Remove libraries from topology lookups (git-fixes).</li> <li>ASoC: SOF: Remove libraries from topology lookups (git-fixes).</li> <li>ASoC: SOF: amd: Fix for acp init sequence (git-fixes).</li> <li>ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes).</li> <li>ASoC: SOF: mediatek: Add missing board compatible (stable-fixes).</li> <li>ASoC: allow module autoloading for table board_ids (stable-fixes).</li> <li>ASoC: allow module autoloading for table db1200_pids (stable-fixes).</li> <li>ASoC: amd: acp: fix module autoloading (git-fixes).</li> <li>ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx (bsc#1227182).</li> <li>ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).</li> <li>ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).</li> <li>ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).</li> <li>ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).</li> <li>ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).</li> <li>ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).</li> <li>ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).</li> <li>ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).</li> <li>ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).</li> <li>ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).</li> <li>ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).</li> <li>ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).</li> <li>ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes).</li> <li>ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).</li> <li>ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).</li> <li>ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).</li> <li>ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).</li> <li>ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).</li> <li>ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).</li> <li>ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable-fixes).</li> <li>ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).</li> <li>ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).</li> <li>ASoC: nau8822: Lower debug print priority (stable-fixes).</li> <li>ASoC: nau8822: Lower debug print priority (stable-fixes).</li> <li>Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes).</li> <li>Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).</li> <li>Bluetooth: L2CAP: Fix deadlock (git-fixes).</li> <li>Bluetooth: MGMT: Add error handling to pair_device() (git-fixes).</li> <li>Bluetooth: SMP: Fix assumption of Central always being Initiator (git-fixes).</li> <li>Bluetooth: bnep: Fix out-of-bound access (stable-fixes).</li> <li>Bluetooth: btintel: Fail setup on error (git-fixes).</li> <li>Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading (stable-fixes).</li> <li>Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable-fixes).</li> <li>Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable-fixes).</li> <li>Bluetooth: hci_conn: Check non NULL function before calling for HFP offload (stable-fixes).</li> <li>Bluetooth: hci_core: Fix LE quote calculation (git-fixes).</li> <li>Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).</li> <li>Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).</li> <li>Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv monitor (git-fixes).</li> <li>Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-fixes).</li> <li>Drop libata patch that caused a regression (bsc#1229054)</li> <li>HID: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).</li> <li>Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056).</li> <li>Input: i8042 - add forcenorestore quirk to leave controller untouched even on s3 (stable-fixes).</li> <li>Input: i8042 - use new forcenorestore quirk to replace old buggy quirk combination (stable-fixes).</li> <li>KVM: Always flush async #PF workqueue when vCPU is being destroyed (git-fixes).</li> <li>KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git-fixes).</li> <li>KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).</li> <li>KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE (bsc#1215199).</li> <li>KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes).</li> <li>KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).</li> <li>KVM: Stop processing <em>all</em> memslots when "null" mmu_notifier handler is found (git-fixes).</li> <li>KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes).</li> <li>KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() (git-fixes).</li> <li>KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git-fixes).</li> <li>KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git-fixes).</li> <li>KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).</li> <li>KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-fixes).</li> <li>KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).</li> <li>KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes).</li> <li>KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes)</li> <li>KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).</li> <li>KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes).</li> <li>KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes).</li> <li>KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).</li> <li>KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes).</li> <li>KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).</li> <li>KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-fixes).</li> <li>KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() (git-fixes).</li> <li>KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes).</li> <li>KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes).</li> <li>KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes).</li> <li>KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector (git-fixes).</li> <li>KVM: nVMX: Check for pending posted interrupts when looking for nested events (git-fixes).</li> <li>KVM: nVMX: Request immediate exit iff pending nested event needs injection (git-fixes).</li> <li>KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).</li> <li>KVM: s390: fix validity interception issue when gisa is switched off (git-fixes bsc#1229167).</li> <li>KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes).</li> <li>KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes).</li> <li>Move upstreamed powerpc patches into sorted section</li> <li>Move upstreamed sound patches into sorted section</li> <li>Moved upstreamed ASoC patch into sorted section</li> <li>NFSD: Support write delegations in LAYOUTGET (git-fixes).</li> <li>NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).</li> <li>PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes).</li> <li>PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).</li> <li>PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes).</li> <li>RDMA/cache: Release GID table even if leak is detected (git-fixes)</li> <li>RDMA/device: Return error earlier if port in not valid (git-fixes)</li> <li>RDMA/hns: Check atomic wr length (git-fixes)</li> <li>RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)</li> <li>RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)</li> <li>RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)</li> <li>RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)</li> <li>RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)</li> <li>RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)</li> <li>RDMA/hns: Fix unmatch exception handling when init eq table fails (git-fixes)</li> <li>RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)</li> <li>RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).</li> <li>RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)</li> <li>RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)</li> <li>RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)</li> <li>RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)</li> <li>RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes)</li> <li>Revert "ALSA: firewire-lib: obsolete workqueue for period update" (bsc#1208783).</li> <li>Revert "ALSA: firewire-lib: operate for period elapse event in process context" (bsc#1208783).</li> <li>Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes).</li> <li>Revert "Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"" (git-fixes).</li> <li>Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" (git-fixes).</li> <li>Revert "misc: fastrpc: Restrict untrusted app to attach to privileged PD" (git-fixes).</li> <li>Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" (bsc#1230413).</li> <li>Revert "mm, kmsan: fix infinite recursion due to RCU critical section" (bsc#1230413).</li> <li>Revert "mm/sparsemem: fix race in accessing memory_section->usage" (bsc#1230413).</li> <li>Revert "usb: gadget: uvc: cleanup request when not in correct state" (stable-fixes).</li> <li>Revert "usb: typec: tcpm: clear pd_event queue in PORT_RESET" (git-fixes).</li> <li>SUNRPC: Fix a race to wake a sync task (git-fixes).</li> <li>SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).</li> <li>Squashfs: fix variable overflow triggered by sysbot (git-fixes).</li> <li>USB: serial: debug: do not echo input by default (stable-fixes).</li> <li>Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920)</li> <li>Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET (jsc#PED-8954, bsc#1227834)</li> <li>Update patch references for ASoC regression fixes (bsc#1229045, bsc#1229046)</li> <li>afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes).</li> <li>apparmor: unpack transition table if dfa is not present (bsc#1226031).</li> <li>arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)</li> <li>arm64: Add Neoverse-V2 part (git-fixes)</li> <li>arm64: Fix KASAN random tag seed initialization (git-fixes)</li> <li>arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)</li> <li>arm64: barrier: Restore spec_bar() macro (git-fixes)</li> <li>arm64: cputype: Add Cortex-A720 definitions (git-fixes)</li> <li>arm64: cputype: Add Cortex-A725 definitions (git-fixes)</li> <li>arm64: cputype: Add Cortex-X1C definitions (git-fixes)</li> <li>arm64: cputype: Add Cortex-X3 definitions (git-fixes)</li> <li>arm64: cputype: Add Cortex-X4 definitions (git-fixes)</li> <li>arm64: cputype: Add Cortex-X925 definitions (git-fixes)</li> <li>arm64: cputype: Add Neoverse-V3 definitions (git-fixes)</li> <li>arm64: dts: imx8mp: Add NPU Node (git-fixes)</li> <li>arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes)</li> <li>arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes)</li> <li>arm64: dts: imx8mp: add HDMI power-domains (git-fixes)</li> <li>arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)</li> <li>arm64: errata: Expand speculative SSBS workaround (git-fixes)</li> <li>arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update config files.</li> <li>arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git-fixes)</li> <li>ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable-fixes).</li> <li>ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable-fixes).</li> <li>blacklist.conf: Add libata upstream revert entry (bsc#1229054)</li> <li>bnxt_re: Fix imm_data endianness (git-fixes)</li> <li>bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes)</li> <li>bpf, lpm: Fix check prefixlen before walking trie (git-fixes).</li> <li>bpf/tests: Remove duplicate JSGT tests (git-fixes).</li> <li>bpf: Add crosstask check to __bpf_get_stack (git-fixes).</li> <li>bpf: Detect IP == ksym.end as part of BPF program (git-fixes).</li> <li>bpf: Ensure proper register state printing for cond jumps (git-fixes).</li> <li>bpf: Fix a few selftest failures due to llvm18 change (git-fixes).</li> <li>bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).</li> <li>bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes).</li> <li>bpf: Fix kfunc callback register type handling (git-fixes).</li> <li>bpf: Fix prog_array_map_poke_run map poke update (git-fixes).</li> <li>bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes).</li> <li>bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git-fixes).</li> <li>bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes).</li> <li>bpf: Set uattr->batch.count as zero before batched update or deletion (git-fixes).</li> <li>bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git-fixes).</li> <li>bpf: enforce precision of R0 on callback return (git-fixes).</li> <li>bpf: extract bpf_ctx_convert_map logic and make it more reusable (git-fixes).</li> <li>bpf: fix control-flow graph checking in privileged mode (git-fixes).</li> <li>bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg (git-fixes).</li> <li>bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes).</li> <li>bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).</li> <li>bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git-fixes).</li> <li>bpftool: Align output skeleton ELF code (git-fixes).</li> <li>bpftool: Fix -Wcast-qual warning (git-fixes).</li> <li>bpftool: Silence build warning about calloc() (git-fixes).</li> <li>bpftool: mark orphaned programs during prog show (git-fixes).</li> <li>btrfs: add a btrfs_finish_ordered_extent helper (git-fixes).</li> <li>btrfs: add a is_data_bbio helper (git-fixes).</li> <li>btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes).</li> <li>btrfs: copy dir permission and time when creating a stub subvolume (bsc#1228321).</li> <li>btrfs: ensure fast fsync waits for ordered extents after a write failure (git-fixes).</li> <li>btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes).</li> <li>btrfs: factor out a can_finish_ordered_extent helper (git-fixes).</li> <li>btrfs: fix corruption after buffer fault in during direct IO append write (git-fixes).</li> <li>btrfs: fix double inode unlock for direct IO sync writes (git-fixes).</li> <li>btrfs: fix extent map use-after-free when adding pages to compressed bio (git-fixes).</li> <li>btrfs: fix leak of qgroup extent records after transaction abort (git-fixes).</li> <li>btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git-fixes).</li> <li>btrfs: limit write bios to a single ordered extent (git-fixes).</li> <li>btrfs: make btrfs_finish_ordered_extent() return void (git-fixes).</li> <li>btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow (git-fixes).</li> <li>btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes).</li> <li>btrfs: open code end_extent_writepage in end_bio_extent_writepage (git-fixes).</li> <li>btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes).</li> <li>btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes).</li> <li>btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes).</li> <li>btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes).</li> <li>btrfs: remove btrfs_add_ordered_extent (git-fixes).</li> <li>btrfs: rename err to ret in btrfs_direct_write() (git-fixes).</li> <li>btrfs: uninline some static inline helpers from tree-log.h (git-fixes).</li> <li>btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git-fixes).</li> <li>btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes).</li> <li>btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes).</li> <li>btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git-fixes).</li> <li>btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git-fixes).</li> <li>btrfs: use btrfs_finish_ordered_extent to complete direct writes (git-fixes).</li> <li>btrfs: use irq safe locking when running and adding delayed iputs (git-fixes).</li> <li>cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand-mode (bsc#1229245).</li> <li>cachefiles: add missing lock protection when polling (bsc#1229256).</li> <li>cachefiles: add restore command to recover inflight ondemand read requests (bsc#1229244).</li> <li>cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249).</li> <li>cachefiles: cancel all requests for the object that is being dropped (bsc#1229255).</li> <li>cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (bsc#1229251).</li> <li>cachefiles: extract ondemand info field from cachefiles_object (bsc#1229240).</li> <li>cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() (bsc#1229247).</li> <li>cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() (bsc#1229246).</li> <li>cachefiles: introduce object ondemand state (bsc#1229239).</li> <li>cachefiles: make on-demand read killable (bsc#1229252).</li> <li>cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode (bsc#1229243).</li> <li>cachefiles: never get a new anonymous fd if ondemand_id is valid (bsc#1229250).</li> <li>cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229253).</li> <li>cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read() (bsc#1229248).</li> <li>cachefiles: resend an open request if the read request's object is closed (bsc#1229241).</li> <li>cachefiles: stop sending new request when dropping object (bsc#1229254).</li> <li>can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index erratum (stable-fixes).</li> <li>can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes).</li> <li>ceph: periodically flush the cap releases (bsc#1230056).</li> <li>cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).</li> <li>cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).</li> <li>cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).</li> <li>cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).</li> <li>cgroup: Remove unnecessary list_empty() (bsc#1222254).</li> <li>cgroup: preserve KABI of cgroup_root (bsc#1222254).</li> <li>char: xillybus: Check USB endpoints when probing device (git-fixes).</li> <li>char: xillybus: Do not destroy workqueue from work item running on it (stable-fixes).</li> <li>char: xillybus: Refine workqueue handling (git-fixes).</li> <li>clk: en7523: fix rate divider for slic and spi clocks (git-fixes).</li> <li>clk: qcom: Park shared RCGs upon registration (git-fixes).</li> <li>clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git-fixes).</li> <li>clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git-fixes).</li> <li>clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git-fixes).</li> <li>clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git-fixes).</li> <li>clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags (git-fixes).</li> <li>clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes).</li> <li>clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git-fixes).</li> <li>clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error (git-fixes).</li> <li>clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider (stable-fixes).</li> <li>clocksource/drivers/sh_cmt: Address race condition for clock events (stable-fixes).</li> <li>cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).</li> <li>dev/parport: fix the array out-of-bounds risk (stable-fixes).</li> <li>device property: Add cleanup.h based fwnode_handle_put() scope based cleanup (stable-fixes).</li> <li>dmaengine: dw: Add memory bus width verification (git-fixes).</li> <li>dmaengine: dw: Add peripheral bus width verification (git-fixes).</li> <li>docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).</li> <li>driver core: Fix uevent_show() vs driver detach race (git-fixes).</li> <li>drm/admgpu: fix dereferencing null pointer context (stable-fixes).</li> <li>drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes).</li> <li>drm/amd/display: Add null checker before passing variables (stable-fixes).</li> <li>drm/amd/display: Adjust cursor position (git-fixes).</li> <li>drm/amd/display: Check for NULL pointer (stable-fixes).</li> <li>drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-fixes).</li> <li>drm/amd/display: avoid using null object of framebuffer (git-fixes).</li> <li>drm/amd/display: fix cursor offset on rotation 180 (git-fixes).</li> <li>drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes).</li> <li>drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-fixes).</li> <li>drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).</li> <li>drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes).</li> <li>drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).</li> <li>drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes).</li> <li>drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).</li> <li>drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable-fixes).</li> <li>drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes).</li> <li>drm/amdgpu: Actually check flags for all context ops (stable-fixes).</li> <li>drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).</li> <li>drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).</li> <li>drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes).</li> <li>drm/amdgpu: Validate TA binary size (stable-fixes).</li> <li>drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes).</li> <li>drm/amdgpu: fix potential resource leak warning (stable-fixes).</li> <li>drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable-fixes).</li> <li>drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes).</li> <li>drm/client: fix null pointer dereference in drm_client_modeset_probe (git-fixes).</li> <li>drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).</li> <li>drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes).</li> <li>drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes).</li> <li>drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes).</li> <li>drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes).</li> <li>drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes).</li> <li>drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git-fixes).</li> <li>drm/lima: set gp bus_stop bit before hard reset (stable-fixes).</li> <li>drm/mediatek/dp: Fix spurious kfree() (git-fixes).</li> <li>drm/msm/dp: fix the max supported bpp logic (git-fixes).</li> <li>drm/msm/dp: reset the link phy params before link training (git-fixes).</li> <li>drm/msm/dpu: capture snapshot on the first commit_done timeout (stable-fixes).</li> <li>drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).</li> <li>drm/msm/dpu: do not play tricks with debug macros (git-fixes).</li> <li>drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes).</li> <li>drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() (git-fixes).</li> <li>drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable-fixes).</li> <li>drm/msm/dpu: take plane rotation into account for wide planes (git-fixes).</li> <li>drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes).</li> <li>drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable-fixes).</li> <li>drm/msm/mdss: Rename path references to mdp_path (stable-fixes).</li> <li>drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes).</li> <li>drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes).</li> <li>drm/nouveau: prime: fix refcount underflow (git-fixes).</li> <li>drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes).</li> <li>drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024).</li> <li>drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes).</li> <li>drm/rockchip: vop2: clear afbc en and transform bit for cluster window at linear mode (stable-fixes).</li> <li>drm/virtio: Fix type of dma-fence context variable (git-fixes).</li> <li>drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).</li> <li>drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).</li> <li>drm/vmwgfx: Fix prime with external buffers (git-fixes).</li> <li>efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes).</li> <li>evm: do not copy up 'security.evm' xattr (git-fixes).</li> <li>firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes).</li> <li>fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229455).</li> <li>fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229456).</li> <li>genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-fixes).</li> <li>genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-fixes).</li> <li>genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-fixes).</li> <li>gfs2: setattr_chown: Add missing initialization (git-fixes).</li> <li>gpio: mlxbf3: Support shutdown() function (git-fixes).</li> <li>gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable-fixes).</li> <li>gpio: sysfs: extend the critical section for unregistering sysfs devices (stable-fixes).</li> <li>gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-fixes).</li> <li>hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes).</li> <li>hwmon: (ltc2992) Avoid division by zero (stable-fixes).</li> <li>hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes).</li> <li>hwmon: (pc87360) Bounds check data->innr usage (stable-fixes).</li> <li>i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).</li> <li>i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).</li> <li>i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume (git-fixes).</li> <li>i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes).</li> <li>i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes).</li> <li>i2c: riic: avoid potential division by zero (stable-fixes).</li> <li>i2c: smbus: Improve handling of stuck alerts (git-fixes).</li> <li>i2c: smbus: Send alert notifications to all devices if source not found (git-fixes).</li> <li>i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes).</li> <li>i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable-fixes).</li> <li>i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable-fixes).</li> <li>i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes).</li> <li>ice: Fix NULL pointer access, if PF does not support SRIOV_LAG (bsc#1228737).</li> <li>io_uring/advise: support 64-bit lengths (git-fixes).</li> <li>io_uring: Drop per-ctx dummy_ubuf (git-fixes).</li> <li>io_uring: Fix probe of disabled operations (git-fixes).</li> <li>io_uring: fix io_match_task must_hold (git-fixes).</li> <li>io_uring: tighten task exit cancellations (git-fixes).</li> <li>iommu/amd: Convert comma to semicolon (git-fixes).</li> <li>iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes).</li> <li>iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git-fixes).</li> <li>ip6_tunnel: Fix broken GRO (bsc#1229444).</li> <li>ipv6: sr: fix incorrect unregister order (git-fixes).</li> <li>irqdomain: Fixed unbalanced fwnode get and put (git-fixes).</li> <li>jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes).</li> <li>jfs: define xtree root and page independently (git-fixes).</li> <li>jfs: fix null ptr deref in dtInsertEntry (git-fixes).</li> <li>jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git-fixes).</li> <li>jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes).</li> <li>jump_label: Fix the fix, brown paper bags galore (git-fixes).</li> <li>jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git-fixes).</li> <li>kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes).</li> <li>kABI workaround for sound core UMP conversion (stable-fixes).</li> <li>kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).</li> <li>kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).</li> <li>kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)</li> <li>kabi: more build fix without patches.kabi (bsc#1226502)</li> <li>kcov: properly check for softirq context (git-fixes).</li> <li>kernel-binary.spec.in: Enable klp_symbols on openSUSE Tumbleweed (boo#1229042). </li> <li>kernel-binary: generate and install compile_commands.json (bsc#1228971). </li> <li>kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() (bsc#1229134).</li> <li>kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git-fixes).</li> <li>kprobes: Fix to check symbol prefixes correctly (git-fixes).</li> <li>kprobes: Prohibit probing on CFI preamble symbol (git-fixes).</li> <li>kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes bsc#1229168).</li> <li>libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API (git-fixes).</li> <li>libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git-fixes).</li> <li>libbpf: Fix faccessat() usage on Android (git-fixes).</li> <li>libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes).</li> <li>md-cluster: fix hanging issue while a new disk adding (bsc#1223395).</li> <li>md-cluster: fix hanging issue while a new disk adding (bsc#1223395).</li> <li>md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).</li> <li>md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).</li> <li>md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26 (bsc#1223395).</li> <li>md/md-bitmap: fix writing non bitmap pages (git-fixes).</li> <li>md/raid1: set max_sectors during early return from choose_slow_rdev() (git-fixes).</li> <li>md/raid1: support read error check (git-fixes).</li> <li>md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (git-fixes).</li> <li>md/raid5: fix spares errors about rcu usage (git-fixes).</li> <li>md/raid5: recheck if reshape has finished with device_lock held (git-fixes).</li> <li>md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git-fixes).</li> <li>md: add a mddev_add_trace_msg helper (git-fixes).</li> <li>md: add check for sleepers in md_wakeup_thread() (git-fixes).</li> <li>md: change the return value type of md_write_start to void (git-fixes).</li> <li>md: do not account sync_io if iostats of the disk is disabled (git-fixes).</li> <li>md: do not delete safemode_timer in mddev_suspend (git-fixes).</li> <li>md: factor out a helper exceed_read_errors() to check read_errors (git-fixes).</li> <li>md: fix a suspicious RCU usage warning (git-fixes).</li> <li>media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes).</li> <li>media: amphion: Remove lock in s_ctrl callback (stable-fixes).</li> <li>media: drivers/media/dvb-core: copy user arrays safely (stable-fixes).</li> <li>media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).</li> <li>media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes).</li> <li>media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes).</li> <li>media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes).</li> <li>media: uvcvideo: Ignore empty TS packets (stable-fixes).</li> <li>media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes).</li> <li>media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes).</li> <li>memcg: protect concurrent access to mem_cgroup_idr (git-fixes).</li> <li>memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes).</li> <li>memory: tegra: Skip SID programming if SID registers are not set (stable-fixes).</li> <li>minmax: add a few more MIN_T/MAX_T users (bsc#1229024).</li> <li>minmax: avoid overly complicated constant expressions in VM code (bsc#1229024).</li> <li>minmax: do not use max() in situations that want a C constant expression (bsc#1229024).</li> <li>minmax: fix up min3() and max3() too (bsc#1229024).</li> <li>minmax: improve macro expansion and type checking (bsc#1229024).</li> <li>minmax: make generic MIN() and MAX() macros available everywhere (bsc#1229024).</li> <li>minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024).</li> <li>minmax: simplify min()/max()/clamp() implementation (bsc#1229024).</li> <li>mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).</li> <li>mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).</li> <li>mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).</li> <li>mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).</li> <li>mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes).</li> <li>net/iucv: fix the allocation size of iucv_path_table array (git-fixes bsc#1229451).</li> <li>net/iucv: fix use after free in iucv_sock_close() (bsc#1228973).</li> <li>net/rds: fix possible cp null dereference (git-fixes).</li> <li>net/sched: initialize noop_qdisc owner (git-fixes).</li> <li>net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).</li> <li>net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() (git-fixes).</li> <li>net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757).</li> <li>net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530).</li> <li>net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086).</li> <li>net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154).</li> <li>net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).</li> <li>net: missing check virtio (git-fixes).</li> <li>net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes).</li> <li>net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes).</li> <li>net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).</li> <li>net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-fixes).</li> <li>netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462).</li> <li>nfc: pn533: Add poll mod list filling check (git-fixes).</li> <li>nfs: do not invalidate dentries on transient errors (git-fixes).</li> <li>nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).</li> <li>nfs: make the rpc_stat per net namespace (git-fixes).</li> <li>nfs: pass explicit offset/count to trace events (git-fixes).</li> <li>nfs: propagate readlink errors in nfs_symlink_filler (git-fixes).</li> <li>nouveau/firmware: use dma non-coherent allocator (git-fixes).</li> <li>nvme-multipath: find NUMA path only for online numa-node (git-fixes).</li> <li>nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706).</li> <li>nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706).</li> <li>nvme-pci: Fix the instructions for disabling power management (git-fixes).</li> <li>nvme-pci: add missing condition check for existence of mapped data (git-fixes).</li> <li>nvme-pci: do not directly handle subsys reset fallout (bsc#1220066).</li> <li>nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857).</li> <li>nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857).</li> <li>nvme-tcp: check for invalidated or revoked key (bsc#1221857).</li> <li>nvme-tcp: sanitize TLS key handling (bsc#1221857).</li> <li>nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857).</li> <li>nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).</li> <li>nvme: avoid double free special payload (git-fixes).</li> <li>nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git-fixes).</li> <li>nvme: fixup comment for nvme RDMA Provider Type (git-fixes).</li> <li>nvme: split off TLS sysfs attributes into a separate group (bsc#1221857).</li> <li>nvme: tcp: remove unnecessary goto statement (bsc#1221857).</li> <li>nvme_core: scan namespaces asynchronously (bsc#1224105).</li> <li>nvmet-auth: fix nvmet_auth hash error handling (git-fixes).</li> <li>nvmet: always initialize cqe.result (git-fixes).</li> <li>nvmet: do not return 'reserved' for empty TSAS values (git-fixes).</li> <li>nvmet: fix a possible leak when destroy a ctrl during qp establishment (git-fixes).</li> <li>nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes).</li> <li>ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).</li> <li>padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).</li> <li>perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-fixes).</li> <li>pinctrl: mediatek: common-v2: Fix broken bias-disable for PULL_PU_PD_RSEL_TYPE (git-fixes).</li> <li>pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git-fixes).</li> <li>pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-fixes).</li> <li>pinctrl: starfive: jh7110: Correct the level trigger configuration of iev register (git-fixes).</li> <li>platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).</li> <li>platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).</li> <li>platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).</li> <li>platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).</li> <li>platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).</li> <li>platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes).</li> <li>platform/x86: lg-laptop: fix %s null argument warning (stable-fixes).</li> <li>power: supply: axp288_charger: Fix constant_charge_voltage writes (git-fixes).</li> <li>power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes).</li> <li>power: supply: qcom_battmgr: return EAGAIN when firmware service is not up (git-fixes).</li> <li>powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869).</li> <li>powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).</li> <li>powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).</li> <li>powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).</li> <li>powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).</li> <li>powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869).</li> <li>powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869).</li> <li>powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).</li> <li>powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).</li> <li>powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869).</li> <li>powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).</li> <li>powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).</li> <li>printk/panic: Allow cpu backtraces to be written into ringbuffer during panic (bsc#1225607).</li> <li>reiserfs: fix uninit-value in comp_keys (git-fixes).</li> <li>rtc: nct3018y: fix possible NULL dereference (stable-fixes).</li> <li>s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes bsc#1229171).</li> <li>s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229173).</li> <li>s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229452).</li> <li>s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes bsc#1229174).</li> <li>s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes bsc#1229172).</li> <li>s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172).</li> <li>s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720).</li> <li>s390/pkey: introduce dynamic debugging for pkey (bsc#1228720).</li> <li>s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169).</li> <li>s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229170).</li> <li>samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes).</li> <li>samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes).</li> <li>sbitmap: use READ_ONCE to access map->word (stable-fixes).</li> <li>scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857).</li> <li>scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857).</li> <li>scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857).</li> <li>scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857).</li> <li>scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).</li> <li>scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857).</li> <li>scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857).</li> <li>scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).</li> <li>scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).</li> <li>scsi: qla2xxx: Complete command early within lock (bsc#1228850).</li> <li>scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).</li> <li>scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).</li> <li>scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).</li> <li>scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).</li> <li>scsi: qla2xxx: Fix flash read failure (bsc#1228850).</li> <li>scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).</li> <li>scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).</li> <li>scsi: qla2xxx: Indent help text (bsc#1228850).</li> <li>scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).</li> <li>scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).</li> <li>scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).</li> <li>scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).</li> <li>scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).</li> <li>scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).</li> <li>scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).</li> <li>selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values (git-fixes).</li> <li>selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903).</li> <li>selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes).</li> <li>selftests/bpf: Add netkit to tc_redirect selftest (git-fixes).</li> <li>selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes).</li> <li>selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes).</li> <li>selftests/bpf: Fix erroneous bitmask operation (git-fixes).</li> <li>selftests/bpf: Fix issues in setup_classid_environment() (git-fixes).</li> <li>selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes).</li> <li>selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes).</li> <li>selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes).</li> <li>selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes).</li> <li>selftests/bpf: Make linked_list failure test more robust (git-fixes).</li> <li>selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git-fixes).</li> <li>selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not available (git-fixes).</li> <li>selftests/bpf: Wait for the netstamp_needed_key static key to be turned on (git-fixes).</li> <li>selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes).</li> <li>selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git-fixes).</li> <li>selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes).</li> <li>selftests/bpf: satisfy compiler by having explicit return in btf test (git-fixes).</li> <li>serial: core: check uartclk for zero to avoid divide by zero (stable-fixes).</li> <li>soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes).</li> <li>soc: qcom: pmic_glink: Actually communicate when remote goes down (git-fixes).</li> <li>soundwire: stream: fix programming slave ports for non-continous port maps (git-fixes).</li> <li>spi: Add empty versions of ACPI functions (stable-fixes).</li> <li>spi: microchip-core: fix init function not setting the master and motorola modes (git-fixes).</li> <li>spi: microchip-core: switch to use modern name (stable-fixes).</li> <li>spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).</li> <li>spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes).</li> <li>squashfs: squashfs_read_data need to check if the length is 0 (git-fixes).</li> <li>ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes).</li> <li>staging: iio: resolver: ad2s1210: fix use before initialization (stable-fixes).</li> <li>staging: ks7010: disable bh on tx_dev_lock (stable-fixes).</li> <li>string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849).</li> <li>sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).</li> <li>swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git-fixes).</li> <li>swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).</li> <li>syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).</li> <li>thermal/drivers/broadcom: Fix race between removal and clock disable (git-fixes).</li> <li>thermal: bcm2835: Convert to platform remove callback returning void (stable-fixes).</li> <li>thunderbolt: Mark XDomain as unplugged when router is removed (stable-fixes).</li> <li>tools/perf: Fix perf bench epoll to enable the run when some CPU's are offline (bsc#1227747).</li> <li>tools/perf: Fix perf bench futex to enable the run when some CPU's are offline (bsc#1227747).</li> <li>tools/perf: Fix timing issue with parallel threads in perf bench wake-up-parallel (bsc#1227747).</li> <li>tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids (git-fixes).</li> <li>tools/resolve_btfids: Fix cross-compilation to non-host endianness (git-fixes).</li> <li>tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git-fixes).</li> <li>tools/resolve_btfids: fix build with musl libc (git-fixes).</li> <li>trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes).</li> <li>tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes).</li> <li>tty: atmel_serial: use the correct RTS flag (git-fixes).</li> <li>tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git-fixes).</li> <li>usb: cdnsp: fix for Link TRB with TC (git-fixes).</li> <li>usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes).</li> <li>usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in remove_power_attributes() (git-fixes).</li> <li>usb: dwc3: core: Skip setting event buffers for host only controllers (stable-fixes).</li> <li>usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).</li> <li>usb: dwc3: st: add missing depopulate in probe error path (git-fixes).</li> <li>usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes).</li> <li>usb: gadget: core: Check for unset descriptor (git-fixes).</li> <li>usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes).</li> <li>usb: gadget: u_audio: Check return codes from usb_ep_enable and config_ep_by_speed (git-fixes).</li> <li>usb: gadget: u_serial: Set start_delayed during suspend (git-fixes).</li> <li>usb: gadget: uvc: cleanup request when not in correct state (stable-fixes).</li> <li>usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes).</li> <li>usb: typec: fsa4480: Check if the chip is really there (git-fixes).</li> <li>usb: typec: fsa4480: Relax CHIP_ID check (git-fixes).</li> <li>usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes).</li> <li>usb: typec: fsa4480: rework mux & switch setup to handle more states (git-fixes).</li> <li>usb: vhci-hcd: Do not drop references before new references are gained (stable-fixes).</li> <li>vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).</li> <li>vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes).</li> <li>vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).</li> <li>vhost/vsock: always initialize seqpacket_allow (git-fixes).</li> <li>vhost: Release worker mutex during flushes (git-fixes).</li> <li>vhost: Use virtqueue mutex for swapping worker (git-fixes).</li> <li>virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes).</li> <li>virtio-crypto: handle config changed by work queue (git-fixes).</li> <li>virtio: reenable config if freezing device failed (git-fixes).</li> <li>virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).</li> <li>virtiofs: forbid newlines in tags (bsc#1229940).</li> <li>wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable-fixes).</li> <li>wifi: ath12k: fix soft lockup on suspend (git-fixes).</li> <li>wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes).</li> <li>wifi: cfg80211: fix reporting failed MLO links status with cfg80211_connect_done (git-fixes).</li> <li>wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).</li> <li>wifi: mac80211: use monitor sdata with driver only if desired (git-fixes).</li> <li>wifi: mwifiex: duplicate static structs used in driver instances (git-fixes).</li> <li>wifi: nl80211: disallow setting special AP channel widths (stable-fixes).</li> <li>wifi: nl80211: do not give key data to userspace (stable-fixes).</li> <li>wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes).</li> <li>wifi: wfx: repair open network AP mode (git-fixes).</li> <li>workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).</li> <li>workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).</li> <li>x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git-fixes).</li> <li>x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes).</li> <li>x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).</li> <li>x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes).</li> <li>x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).</li> <li>x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git-fixes).</li> <li>x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes).</li> <li>x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes).</li> <li>x86/numa: Introduce numa_fill_memblks() (git-fixes).</li> <li>x86/pci: Skip early E820 check for ECAM region (git-fixes).</li> <li>x86/xen: Convert comma to semicolon (git-fixes).</li> <li>xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).</li> <li>xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).</li> <li>xfs: allow cross-linking special files without project quota (git-fixes).</li> <li>xfs: allow symlinks with short remote targets (bsc#1229160).</li> <li>xfs: allow unlinked symlinks and dirs with zero size (git-fixes).</li> <li>xfs: attr forks require attr, not attr2 (git-fixes).</li> <li>xfs: convert comma to semicolon (git-fixes).</li> <li>xfs: do not use current->journal_info (git-fixes).</li> <li>xfs: fix unlink vs cluster buffer instantiation race (git-fixes).</li> <li>xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes).</li> <li>xfs: journal geometry is not properly bounds checked (git-fixes).</li> <li>xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes).</li> <li>xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item recovery (git-fixes).</li> <li>xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git-fixes).</li> <li>xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).</li> <li>xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes).</li> <li>xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes).</li> <li>xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> openSUSE Leap 15.6 <br/> <code>zypper in -t patch SUSE-2024-3383=1 openSUSE-SLE-15.6-2024-3383=1</code> </li> <li class="list-group-item"> Basesystem Module 15-SP6 <br/> <code>zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3383=1</code> </li> <li class="list-group-item"> Development Tools Module 15-SP6 <br/> <code>zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3383=1</code> </li> <li class="list-group-item"> Legacy Module 15-SP6 <br/> <code>zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3383=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Live Patching 15-SP6 <br/> <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3383=1</code> <br/> Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. </li> <li class="list-group-item"> SUSE Linux Enterprise High Availability Extension 15 SP6 <br/> <code>zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3383=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Workstation Extension 15 SP6 <br/> <code>zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3383=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> openSUSE Leap 15.6 (noarch nosrc) <ul> <li>kernel-docs-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (noarch) <ul> <li>kernel-devel-6.4.0-150600.23.22.1</li> <li>kernel-macros-6.4.0-150600.23.22.1</li> <li>kernel-docs-html-6.4.0-150600.23.22.1</li> <li>kernel-source-6.4.0-150600.23.22.1</li> <li>kernel-source-vanilla-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (nosrc ppc64le x86_64) <ul> <li>kernel-debug-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (ppc64le x86_64) <ul> <li>kernel-debug-livepatch-devel-6.4.0-150600.23.22.1</li> <li>kernel-debug-devel-6.4.0-150600.23.22.1</li> <li>kernel-debug-debugsource-6.4.0-150600.23.22.1</li> <li>kernel-debug-devel-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-debug-debuginfo-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (x86_64) <ul> <li>kernel-debug-vdso-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-debug-vdso-6.4.0-150600.23.22.1</li> <li>kernel-default-vdso-6.4.0-150600.23.22.1</li> <li>kernel-kvmsmall-vdso-6.4.0-150600.23.22.1</li> <li>kernel-default-vdso-debuginfo-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (aarch64 ppc64le x86_64) <ul> <li>kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3</li> <li>kernel-kvmsmall-devel-6.4.0-150600.23.22.1</li> <li>kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.22.1</li> <li>kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-kvmsmall-debugsource-6.4.0-150600.23.22.1</li> <li>kernel-kvmsmall-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-base-rebuild-6.4.0-150600.23.22.1.150600.12.8.3</li> </ul> </li> <li> openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-syms-6.4.0-150600.23.22.1</li> <li>kernel-default-extra-6.4.0-150600.23.22.1</li> <li>cluster-md-kmp-default-6.4.0-150600.23.22.1</li> <li>dlm-kmp-default-6.4.0-150600.23.22.1</li> <li>kernel-default-optional-6.4.0-150600.23.22.1</li> <li>kernel-obs-build-debugsource-6.4.0-150600.23.22.1</li> <li>kernel-default-livepatch-6.4.0-150600.23.22.1</li> <li>ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-livepatch-devel-6.4.0-150600.23.22.1</li> <li>reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-optional-debuginfo-6.4.0-150600.23.22.1</li> <li>kselftests-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-devel-debuginfo-6.4.0-150600.23.22.1</li> <li>kselftests-kmp-default-6.4.0-150600.23.22.1</li> <li>ocfs2-kmp-default-6.4.0-150600.23.22.1</li> <li>kernel-obs-build-6.4.0-150600.23.22.1</li> <li>cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-extra-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-devel-6.4.0-150600.23.22.1</li> <li>dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>gfs2-kmp-default-6.4.0-150600.23.22.1</li> <li>gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>reiserfs-kmp-default-6.4.0-150600.23.22.1</li> <li>kernel-obs-qa-6.4.0-150600.23.22.1</li> <li>kernel-default-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) <ul> <li>kernel-kvmsmall-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (ppc64le s390x x86_64) <ul> <li>kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3</li> <li>kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3</li> <li>kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3</li> </ul> </li> <li> openSUSE Leap 15.6 (nosrc s390x) <ul> <li>kernel-zfcpdump-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (s390x) <ul> <li>kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (nosrc) <ul> <li>dtb-aarch64-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (aarch64) <ul> <li>kernel-64kb-extra-6.4.0-150600.23.22.1</li> <li>kselftests-kmp-64kb-6.4.0-150600.23.22.1</li> <li>dtb-apple-6.4.0-150600.23.22.1</li> <li>kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1</li> <li>dlm-kmp-64kb-6.4.0-150600.23.22.1</li> <li>kernel-64kb-debugsource-6.4.0-150600.23.22.1</li> <li>kernel-64kb-debuginfo-6.4.0-150600.23.22.1</li> <li>dtb-arm-6.4.0-150600.23.22.1</li> <li>kernel-64kb-optional-6.4.0-150600.23.22.1</li> <li>kernel-64kb-extra-debuginfo-6.4.0-150600.23.22.1</li> <li>dtb-allwinner-6.4.0-150600.23.22.1</li> <li>dtb-broadcom-6.4.0-150600.23.22.1</li> <li>dtb-qcom-6.4.0-150600.23.22.1</li> <li>dtb-amd-6.4.0-150600.23.22.1</li> <li>kernel-64kb-livepatch-devel-6.4.0-150600.23.22.1</li> <li>ocfs2-kmp-64kb-6.4.0-150600.23.22.1</li> <li>dtb-amazon-6.4.0-150600.23.22.1</li> <li>kernel-64kb-devel-6.4.0-150600.23.22.1</li> <li>dtb-hisilicon-6.4.0-150600.23.22.1</li> <li>gfs2-kmp-64kb-6.4.0-150600.23.22.1</li> <li>cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li> <li>dlm-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li> <li>dtb-renesas-6.4.0-150600.23.22.1</li> <li>dtb-sprd-6.4.0-150600.23.22.1</li> <li>dtb-nvidia-6.4.0-150600.23.22.1</li> <li>dtb-apm-6.4.0-150600.23.22.1</li> <li>ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li> <li>gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li> <li>dtb-altera-6.4.0-150600.23.22.1</li> <li>dtb-amlogic-6.4.0-150600.23.22.1</li> <li>dtb-lg-6.4.0-150600.23.22.1</li> <li>dtb-xilinx-6.4.0-150600.23.22.1</li> <li>kernel-64kb-optional-debuginfo-6.4.0-150600.23.22.1</li> <li>dtb-marvell-6.4.0-150600.23.22.1</li> <li>reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li> <li>dtb-freescale-6.4.0-150600.23.22.1</li> <li>dtb-cavium-6.4.0-150600.23.22.1</li> <li>cluster-md-kmp-64kb-6.4.0-150600.23.22.1</li> <li>kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.22.1</li> <li>dtb-rockchip-6.4.0-150600.23.22.1</li> <li>dtb-mediatek-6.4.0-150600.23.22.1</li> <li>reiserfs-kmp-64kb-6.4.0-150600.23.22.1</li> <li>dtb-exynos-6.4.0-150600.23.22.1</li> <li>dtb-socionext-6.4.0-150600.23.22.1</li> </ul> </li> <li> openSUSE Leap 15.6 (aarch64 nosrc) <ul> <li>kernel-64kb-6.4.0-150600.23.22.1</li> </ul> </li> <li> Basesystem Module 15-SP6 (aarch64 nosrc) <ul> <li>kernel-64kb-6.4.0-150600.23.22.1</li> </ul> </li> <li> Basesystem Module 15-SP6 (aarch64) <ul> <li>kernel-64kb-debugsource-6.4.0-150600.23.22.1</li> <li>kernel-64kb-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-64kb-devel-6.4.0-150600.23.22.1</li> <li>kernel-64kb-devel-debuginfo-6.4.0-150600.23.22.1</li> </ul> </li> <li> Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-6.4.0-150600.23.22.1</li> </ul> </li> <li> Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) <ul> <li>kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3</li> </ul> </li> <li> Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-default-devel-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-devel-6.4.0-150600.23.22.1</li> <li>kernel-default-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> <li> Basesystem Module 15-SP6 (noarch) <ul> <li>kernel-devel-6.4.0-150600.23.22.1</li> <li>kernel-macros-6.4.0-150600.23.22.1</li> </ul> </li> <li> Basesystem Module 15-SP6 (nosrc s390x) <ul> <li>kernel-zfcpdump-6.4.0-150600.23.22.1</li> </ul> </li> <li> Basesystem Module 15-SP6 (s390x) <ul> <li>kernel-zfcpdump-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-zfcpdump-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> <li> Development Tools Module 15-SP6 (noarch nosrc) <ul> <li>kernel-docs-6.4.0-150600.23.22.1</li> </ul> </li> <li> Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-obs-build-6.4.0-150600.23.22.1</li> <li>kernel-syms-6.4.0-150600.23.22.1</li> <li>kernel-obs-build-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> <li> Development Tools Module 15-SP6 (noarch) <ul> <li>kernel-source-6.4.0-150600.23.22.1</li> </ul> </li> <li> Legacy Module 15-SP6 (nosrc) <ul> <li>kernel-default-6.4.0-150600.23.22.1</li> </ul> </li> <li> Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) <ul> <li>reiserfs-kmp-default-6.4.0-150600.23.22.1</li> <li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li> <li>reiserfs-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) <ul> <li>kernel-default-6.4.0-150600.23.22.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) <ul> <li>kernel-default-livepatch-6.4.0-150600.23.22.1</li> <li>kernel-default-livepatch-devel-6.4.0-150600.23.22.1</li> <li>kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-1-150600.13.3.3</li> <li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-livepatch-SLE15-SP6_Update_4-debugsource-1-150600.13.3.3</li> <li>kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3</li> <li>kernel-default-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) <ul> <li>ocfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>dlm-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>gfs2-kmp-default-6.4.0-150600.23.22.1</li> <li>gfs2-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>cluster-md-kmp-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li> <li>ocfs2-kmp-default-6.4.0-150600.23.22.1</li> <li>cluster-md-kmp-default-6.4.0-150600.23.22.1</li> <li>dlm-kmp-default-6.4.0-150600.23.22.1</li> <li>kernel-default-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) <ul> <li>kernel-default-6.4.0-150600.23.22.1</li> </ul> </li> <li> SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc) <ul> <li>kernel-default-6.4.0-150600.23.22.1</li> </ul> </li> <li> SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) <ul> <li>kernel-default-extra-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-debuginfo-6.4.0-150600.23.22.1</li> <li>kernel-default-extra-6.4.0-150600.23.22.1</li> <li>kernel-default-debugsource-6.4.0-150600.23.22.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52489.html">https://www.suse.com/security/cve/CVE-2023-52489.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52581.html">https://www.suse.com/security/cve/CVE-2023-52581.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52668.html">https://www.suse.com/security/cve/CVE-2023-52668.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52688.html">https://www.suse.com/security/cve/CVE-2023-52688.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52735.html">https://www.suse.com/security/cve/CVE-2023-52735.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52859.html">https://www.suse.com/security/cve/CVE-2023-52859.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52885.html">https://www.suse.com/security/cve/CVE-2023-52885.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52886.html">https://www.suse.com/security/cve/CVE-2023-52886.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52887.html">https://www.suse.com/security/cve/CVE-2023-52887.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52889.html">https://www.suse.com/security/cve/CVE-2023-52889.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26590.html">https://www.suse.com/security/cve/CVE-2024-26590.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26631.html">https://www.suse.com/security/cve/CVE-2024-26631.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26637.html">https://www.suse.com/security/cve/CVE-2024-26637.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26668.html">https://www.suse.com/security/cve/CVE-2024-26668.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26669.html">https://www.suse.com/security/cve/CVE-2024-26669.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26677.html">https://www.suse.com/security/cve/CVE-2024-26677.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26682.html">https://www.suse.com/security/cve/CVE-2024-26682.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26683.html">https://www.suse.com/security/cve/CVE-2024-26683.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26691.html">https://www.suse.com/security/cve/CVE-2024-26691.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26735.html">https://www.suse.com/security/cve/CVE-2024-26735.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26808.html">https://www.suse.com/security/cve/CVE-2024-26808.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26809.html">https://www.suse.com/security/cve/CVE-2024-26809.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26812.html">https://www.suse.com/security/cve/CVE-2024-26812.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26835.html">https://www.suse.com/security/cve/CVE-2024-26835.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26837.html">https://www.suse.com/security/cve/CVE-2024-26837.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26849.html">https://www.suse.com/security/cve/CVE-2024-26849.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26851.html">https://www.suse.com/security/cve/CVE-2024-26851.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26889.html">https://www.suse.com/security/cve/CVE-2024-26889.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26920.html">https://www.suse.com/security/cve/CVE-2024-26920.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26944.html">https://www.suse.com/security/cve/CVE-2024-26944.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26976.html">https://www.suse.com/security/cve/CVE-2024-26976.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27010.html">https://www.suse.com/security/cve/CVE-2024-27010.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27011.html">https://www.suse.com/security/cve/CVE-2024-27011.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27024.html">https://www.suse.com/security/cve/CVE-2024-27024.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27049.html">https://www.suse.com/security/cve/CVE-2024-27049.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27050.html">https://www.suse.com/security/cve/CVE-2024-27050.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27079.html">https://www.suse.com/security/cve/CVE-2024-27079.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27403.html">https://www.suse.com/security/cve/CVE-2024-27403.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27433.html">https://www.suse.com/security/cve/CVE-2024-27433.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27437.html">https://www.suse.com/security/cve/CVE-2024-27437.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-31076.html">https://www.suse.com/security/cve/CVE-2024-31076.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35854.html">https://www.suse.com/security/cve/CVE-2024-35854.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35855.html">https://www.suse.com/security/cve/CVE-2024-35855.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35897.html">https://www.suse.com/security/cve/CVE-2024-35897.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35902.html">https://www.suse.com/security/cve/CVE-2024-35902.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35913.html">https://www.suse.com/security/cve/CVE-2024-35913.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35939.html">https://www.suse.com/security/cve/CVE-2024-35939.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-35949.html">https://www.suse.com/security/cve/CVE-2024-35949.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36270.html">https://www.suse.com/security/cve/CVE-2024-36270.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36286.html">https://www.suse.com/security/cve/CVE-2024-36286.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36288.html">https://www.suse.com/security/cve/CVE-2024-36288.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36489.html">https://www.suse.com/security/cve/CVE-2024-36489.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36881.html">https://www.suse.com/security/cve/CVE-2024-36881.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36907.html">https://www.suse.com/security/cve/CVE-2024-36907.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36909.html">https://www.suse.com/security/cve/CVE-2024-36909.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36910.html">https://www.suse.com/security/cve/CVE-2024-36910.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36911.html">https://www.suse.com/security/cve/CVE-2024-36911.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36929.html">https://www.suse.com/security/cve/CVE-2024-36929.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36933.html">https://www.suse.com/security/cve/CVE-2024-36933.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36939.html">https://www.suse.com/security/cve/CVE-2024-36939.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36970.html">https://www.suse.com/security/cve/CVE-2024-36970.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-36979.html">https://www.suse.com/security/cve/CVE-2024-36979.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38548.html">https://www.suse.com/security/cve/CVE-2024-38548.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38563.html">https://www.suse.com/security/cve/CVE-2024-38563.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38609.html">https://www.suse.com/security/cve/CVE-2024-38609.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-38662.html">https://www.suse.com/security/cve/CVE-2024-38662.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39476.html">https://www.suse.com/security/cve/CVE-2024-39476.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39483.html">https://www.suse.com/security/cve/CVE-2024-39483.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39484.html">https://www.suse.com/security/cve/CVE-2024-39484.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39486.html">https://www.suse.com/security/cve/CVE-2024-39486.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39488.html">https://www.suse.com/security/cve/CVE-2024-39488.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39489.html">https://www.suse.com/security/cve/CVE-2024-39489.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39491.html">https://www.suse.com/security/cve/CVE-2024-39491.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39493.html">https://www.suse.com/security/cve/CVE-2024-39493.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39497.html">https://www.suse.com/security/cve/CVE-2024-39497.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39499.html">https://www.suse.com/security/cve/CVE-2024-39499.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39500.html">https://www.suse.com/security/cve/CVE-2024-39500.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39501.html">https://www.suse.com/security/cve/CVE-2024-39501.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39505.html">https://www.suse.com/security/cve/CVE-2024-39505.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39506.html">https://www.suse.com/security/cve/CVE-2024-39506.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39508.html">https://www.suse.com/security/cve/CVE-2024-39508.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39509.html">https://www.suse.com/security/cve/CVE-2024-39509.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-39510.html">https://www.suse.com/security/cve/CVE-2024-39510.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40899.html">https://www.suse.com/security/cve/CVE-2024-40899.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40900.html">https://www.suse.com/security/cve/CVE-2024-40900.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40902.html">https://www.suse.com/security/cve/CVE-2024-40902.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40903.html">https://www.suse.com/security/cve/CVE-2024-40903.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40904.html">https://www.suse.com/security/cve/CVE-2024-40904.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40905.html">https://www.suse.com/security/cve/CVE-2024-40905.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40909.html">https://www.suse.com/security/cve/CVE-2024-40909.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40910.html">https://www.suse.com/security/cve/CVE-2024-40910.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40911.html">https://www.suse.com/security/cve/CVE-2024-40911.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40912.html">https://www.suse.com/security/cve/CVE-2024-40912.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40913.html">https://www.suse.com/security/cve/CVE-2024-40913.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40916.html">https://www.suse.com/security/cve/CVE-2024-40916.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40920.html">https://www.suse.com/security/cve/CVE-2024-40920.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40921.html">https://www.suse.com/security/cve/CVE-2024-40921.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40922.html">https://www.suse.com/security/cve/CVE-2024-40922.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40924.html">https://www.suse.com/security/cve/CVE-2024-40924.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40926.html">https://www.suse.com/security/cve/CVE-2024-40926.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40927.html">https://www.suse.com/security/cve/CVE-2024-40927.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40929.html">https://www.suse.com/security/cve/CVE-2024-40929.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40930.html">https://www.suse.com/security/cve/CVE-2024-40930.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40932.html">https://www.suse.com/security/cve/CVE-2024-40932.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40934.html">https://www.suse.com/security/cve/CVE-2024-40934.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40936.html">https://www.suse.com/security/cve/CVE-2024-40936.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40938.html">https://www.suse.com/security/cve/CVE-2024-40938.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40939.html">https://www.suse.com/security/cve/CVE-2024-40939.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40941.html">https://www.suse.com/security/cve/CVE-2024-40941.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40942.html">https://www.suse.com/security/cve/CVE-2024-40942.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40943.html">https://www.suse.com/security/cve/CVE-2024-40943.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40944.html">https://www.suse.com/security/cve/CVE-2024-40944.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40945.html">https://www.suse.com/security/cve/CVE-2024-40945.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40954.html">https://www.suse.com/security/cve/CVE-2024-40954.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40956.html">https://www.suse.com/security/cve/CVE-2024-40956.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40957.html">https://www.suse.com/security/cve/CVE-2024-40957.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40958.html">https://www.suse.com/security/cve/CVE-2024-40958.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40959.html">https://www.suse.com/security/cve/CVE-2024-40959.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40962.html">https://www.suse.com/security/cve/CVE-2024-40962.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40964.html">https://www.suse.com/security/cve/CVE-2024-40964.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40967.html">https://www.suse.com/security/cve/CVE-2024-40967.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40976.html">https://www.suse.com/security/cve/CVE-2024-40976.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40977.html">https://www.suse.com/security/cve/CVE-2024-40977.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40978.html">https://www.suse.com/security/cve/CVE-2024-40978.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40981.html">https://www.suse.com/security/cve/CVE-2024-40981.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40982.html">https://www.suse.com/security/cve/CVE-2024-40982.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40984.html">https://www.suse.com/security/cve/CVE-2024-40984.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40987.html">https://www.suse.com/security/cve/CVE-2024-40987.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40988.html">https://www.suse.com/security/cve/CVE-2024-40988.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40989.html">https://www.suse.com/security/cve/CVE-2024-40989.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40990.html">https://www.suse.com/security/cve/CVE-2024-40990.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40992.html">https://www.suse.com/security/cve/CVE-2024-40992.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40994.html">https://www.suse.com/security/cve/CVE-2024-40994.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40995.html">https://www.suse.com/security/cve/CVE-2024-40995.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-40997.html">https://www.suse.com/security/cve/CVE-2024-40997.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41000.html">https://www.suse.com/security/cve/CVE-2024-41000.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41001.html">https://www.suse.com/security/cve/CVE-2024-41001.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41002.html">https://www.suse.com/security/cve/CVE-2024-41002.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41004.html">https://www.suse.com/security/cve/CVE-2024-41004.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41007.html">https://www.suse.com/security/cve/CVE-2024-41007.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41009.html">https://www.suse.com/security/cve/CVE-2024-41009.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41010.html">https://www.suse.com/security/cve/CVE-2024-41010.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41011.html">https://www.suse.com/security/cve/CVE-2024-41011.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41012.html">https://www.suse.com/security/cve/CVE-2024-41012.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41015.html">https://www.suse.com/security/cve/CVE-2024-41015.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41020.html">https://www.suse.com/security/cve/CVE-2024-41020.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41022.html">https://www.suse.com/security/cve/CVE-2024-41022.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41024.html">https://www.suse.com/security/cve/CVE-2024-41024.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41025.html">https://www.suse.com/security/cve/CVE-2024-41025.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41028.html">https://www.suse.com/security/cve/CVE-2024-41028.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41032.html">https://www.suse.com/security/cve/CVE-2024-41032.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41035.html">https://www.suse.com/security/cve/CVE-2024-41035.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41036.html">https://www.suse.com/security/cve/CVE-2024-41036.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41037.html">https://www.suse.com/security/cve/CVE-2024-41037.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41038.html">https://www.suse.com/security/cve/CVE-2024-41038.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41039.html">https://www.suse.com/security/cve/CVE-2024-41039.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41040.html">https://www.suse.com/security/cve/CVE-2024-41040.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41041.html">https://www.suse.com/security/cve/CVE-2024-41041.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41044.html">https://www.suse.com/security/cve/CVE-2024-41044.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41045.html">https://www.suse.com/security/cve/CVE-2024-41045.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41048.html">https://www.suse.com/security/cve/CVE-2024-41048.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41049.html">https://www.suse.com/security/cve/CVE-2024-41049.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41050.html">https://www.suse.com/security/cve/CVE-2024-41050.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41051.html">https://www.suse.com/security/cve/CVE-2024-41051.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41056.html">https://www.suse.com/security/cve/CVE-2024-41056.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41057.html">https://www.suse.com/security/cve/CVE-2024-41057.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41058.html">https://www.suse.com/security/cve/CVE-2024-41058.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41059.html">https://www.suse.com/security/cve/CVE-2024-41059.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41060.html">https://www.suse.com/security/cve/CVE-2024-41060.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41061.html">https://www.suse.com/security/cve/CVE-2024-41061.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41062.html">https://www.suse.com/security/cve/CVE-2024-41062.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41063.html">https://www.suse.com/security/cve/CVE-2024-41063.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41064.html">https://www.suse.com/security/cve/CVE-2024-41064.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41065.html">https://www.suse.com/security/cve/CVE-2024-41065.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41066.html">https://www.suse.com/security/cve/CVE-2024-41066.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41068.html">https://www.suse.com/security/cve/CVE-2024-41068.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41069.html">https://www.suse.com/security/cve/CVE-2024-41069.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41070.html">https://www.suse.com/security/cve/CVE-2024-41070.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41071.html">https://www.suse.com/security/cve/CVE-2024-41071.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41072.html">https://www.suse.com/security/cve/CVE-2024-41072.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41073.html">https://www.suse.com/security/cve/CVE-2024-41073.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41074.html">https://www.suse.com/security/cve/CVE-2024-41074.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41075.html">https://www.suse.com/security/cve/CVE-2024-41075.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41076.html">https://www.suse.com/security/cve/CVE-2024-41076.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41078.html">https://www.suse.com/security/cve/CVE-2024-41078.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41079.html">https://www.suse.com/security/cve/CVE-2024-41079.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41080.html">https://www.suse.com/security/cve/CVE-2024-41080.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41081.html">https://www.suse.com/security/cve/CVE-2024-41081.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41084.html">https://www.suse.com/security/cve/CVE-2024-41084.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41087.html">https://www.suse.com/security/cve/CVE-2024-41087.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41088.html">https://www.suse.com/security/cve/CVE-2024-41088.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41089.html">https://www.suse.com/security/cve/CVE-2024-41089.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41092.html">https://www.suse.com/security/cve/CVE-2024-41092.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41093.html">https://www.suse.com/security/cve/CVE-2024-41093.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41094.html">https://www.suse.com/security/cve/CVE-2024-41094.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41095.html">https://www.suse.com/security/cve/CVE-2024-41095.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41096.html">https://www.suse.com/security/cve/CVE-2024-41096.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41097.html">https://www.suse.com/security/cve/CVE-2024-41097.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-41098.html">https://www.suse.com/security/cve/CVE-2024-41098.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42064.html">https://www.suse.com/security/cve/CVE-2024-42064.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42069.html">https://www.suse.com/security/cve/CVE-2024-42069.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42070.html">https://www.suse.com/security/cve/CVE-2024-42070.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42073.html">https://www.suse.com/security/cve/CVE-2024-42073.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42074.html">https://www.suse.com/security/cve/CVE-2024-42074.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42076.html">https://www.suse.com/security/cve/CVE-2024-42076.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42077.html">https://www.suse.com/security/cve/CVE-2024-42077.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42079.html">https://www.suse.com/security/cve/CVE-2024-42079.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42080.html">https://www.suse.com/security/cve/CVE-2024-42080.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42082.html">https://www.suse.com/security/cve/CVE-2024-42082.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42085.html">https://www.suse.com/security/cve/CVE-2024-42085.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42086.html">https://www.suse.com/security/cve/CVE-2024-42086.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42087.html">https://www.suse.com/security/cve/CVE-2024-42087.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42089.html">https://www.suse.com/security/cve/CVE-2024-42089.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42090.html">https://www.suse.com/security/cve/CVE-2024-42090.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42092.html">https://www.suse.com/security/cve/CVE-2024-42092.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42093.html">https://www.suse.com/security/cve/CVE-2024-42093.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42095.html">https://www.suse.com/security/cve/CVE-2024-42095.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42096.html">https://www.suse.com/security/cve/CVE-2024-42096.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42097.html">https://www.suse.com/security/cve/CVE-2024-42097.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42098.html">https://www.suse.com/security/cve/CVE-2024-42098.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42101.html">https://www.suse.com/security/cve/CVE-2024-42101.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42104.html">https://www.suse.com/security/cve/CVE-2024-42104.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42105.html">https://www.suse.com/security/cve/CVE-2024-42105.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42106.html">https://www.suse.com/security/cve/CVE-2024-42106.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42107.html">https://www.suse.com/security/cve/CVE-2024-42107.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42109.html">https://www.suse.com/security/cve/CVE-2024-42109.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42110.html">https://www.suse.com/security/cve/CVE-2024-42110.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42113.html">https://www.suse.com/security/cve/CVE-2024-42113.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42114.html">https://www.suse.com/security/cve/CVE-2024-42114.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42115.html">https://www.suse.com/security/cve/CVE-2024-42115.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42117.html">https://www.suse.com/security/cve/CVE-2024-42117.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42119.html">https://www.suse.com/security/cve/CVE-2024-42119.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42120.html">https://www.suse.com/security/cve/CVE-2024-42120.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42121.html">https://www.suse.com/security/cve/CVE-2024-42121.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42122.html">https://www.suse.com/security/cve/CVE-2024-42122.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42124.html">https://www.suse.com/security/cve/CVE-2024-42124.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42125.html">https://www.suse.com/security/cve/CVE-2024-42125.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42126.html">https://www.suse.com/security/cve/CVE-2024-42126.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42127.html">https://www.suse.com/security/cve/CVE-2024-42127.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42130.html">https://www.suse.com/security/cve/CVE-2024-42130.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42131.html">https://www.suse.com/security/cve/CVE-2024-42131.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42132.html">https://www.suse.com/security/cve/CVE-2024-42132.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42133.html">https://www.suse.com/security/cve/CVE-2024-42133.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42136.html">https://www.suse.com/security/cve/CVE-2024-42136.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42137.html">https://www.suse.com/security/cve/CVE-2024-42137.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42138.html">https://www.suse.com/security/cve/CVE-2024-42138.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42139.html">https://www.suse.com/security/cve/CVE-2024-42139.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42141.html">https://www.suse.com/security/cve/CVE-2024-42141.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42142.html">https://www.suse.com/security/cve/CVE-2024-42142.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42143.html">https://www.suse.com/security/cve/CVE-2024-42143.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42144.html">https://www.suse.com/security/cve/CVE-2024-42144.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42145.html">https://www.suse.com/security/cve/CVE-2024-42145.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42147.html">https://www.suse.com/security/cve/CVE-2024-42147.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42148.html">https://www.suse.com/security/cve/CVE-2024-42148.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42152.html">https://www.suse.com/security/cve/CVE-2024-42152.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42153.html">https://www.suse.com/security/cve/CVE-2024-42153.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42155.html">https://www.suse.com/security/cve/CVE-2024-42155.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42156.html">https://www.suse.com/security/cve/CVE-2024-42156.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42157.html">https://www.suse.com/security/cve/CVE-2024-42157.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42158.html">https://www.suse.com/security/cve/CVE-2024-42158.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42159.html">https://www.suse.com/security/cve/CVE-2024-42159.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42161.html">https://www.suse.com/security/cve/CVE-2024-42161.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42162.html">https://www.suse.com/security/cve/CVE-2024-42162.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42223.html">https://www.suse.com/security/cve/CVE-2024-42223.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42224.html">https://www.suse.com/security/cve/CVE-2024-42224.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42225.html">https://www.suse.com/security/cve/CVE-2024-42225.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42226.html">https://www.suse.com/security/cve/CVE-2024-42226.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42227.html">https://www.suse.com/security/cve/CVE-2024-42227.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42228.html">https://www.suse.com/security/cve/CVE-2024-42228.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42229.html">https://www.suse.com/security/cve/CVE-2024-42229.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42230.html">https://www.suse.com/security/cve/CVE-2024-42230.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42232.html">https://www.suse.com/security/cve/CVE-2024-42232.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42236.html">https://www.suse.com/security/cve/CVE-2024-42236.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42237.html">https://www.suse.com/security/cve/CVE-2024-42237.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42238.html">https://www.suse.com/security/cve/CVE-2024-42238.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42239.html">https://www.suse.com/security/cve/CVE-2024-42239.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42240.html">https://www.suse.com/security/cve/CVE-2024-42240.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42241.html">https://www.suse.com/security/cve/CVE-2024-42241.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42244.html">https://www.suse.com/security/cve/CVE-2024-42244.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42245.html">https://www.suse.com/security/cve/CVE-2024-42245.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42246.html">https://www.suse.com/security/cve/CVE-2024-42246.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42247.html">https://www.suse.com/security/cve/CVE-2024-42247.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42250.html">https://www.suse.com/security/cve/CVE-2024-42250.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42253.html">https://www.suse.com/security/cve/CVE-2024-42253.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42259.html">https://www.suse.com/security/cve/CVE-2024-42259.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42268.html">https://www.suse.com/security/cve/CVE-2024-42268.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42269.html">https://www.suse.com/security/cve/CVE-2024-42269.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42270.html">https://www.suse.com/security/cve/CVE-2024-42270.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42271.html">https://www.suse.com/security/cve/CVE-2024-42271.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42274.html">https://www.suse.com/security/cve/CVE-2024-42274.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42276.html">https://www.suse.com/security/cve/CVE-2024-42276.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42277.html">https://www.suse.com/security/cve/CVE-2024-42277.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42278.html">https://www.suse.com/security/cve/CVE-2024-42278.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42279.html">https://www.suse.com/security/cve/CVE-2024-42279.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42280.html">https://www.suse.com/security/cve/CVE-2024-42280.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42281.html">https://www.suse.com/security/cve/CVE-2024-42281.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42283.html">https://www.suse.com/security/cve/CVE-2024-42283.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42284.html">https://www.suse.com/security/cve/CVE-2024-42284.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42285.html">https://www.suse.com/security/cve/CVE-2024-42285.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42286.html">https://www.suse.com/security/cve/CVE-2024-42286.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42287.html">https://www.suse.com/security/cve/CVE-2024-42287.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42288.html">https://www.suse.com/security/cve/CVE-2024-42288.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42289.html">https://www.suse.com/security/cve/CVE-2024-42289.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42290.html">https://www.suse.com/security/cve/CVE-2024-42290.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42291.html">https://www.suse.com/security/cve/CVE-2024-42291.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42292.html">https://www.suse.com/security/cve/CVE-2024-42292.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42295.html">https://www.suse.com/security/cve/CVE-2024-42295.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42298.html">https://www.suse.com/security/cve/CVE-2024-42298.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42301.html">https://www.suse.com/security/cve/CVE-2024-42301.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42302.html">https://www.suse.com/security/cve/CVE-2024-42302.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42303.html">https://www.suse.com/security/cve/CVE-2024-42303.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42308.html">https://www.suse.com/security/cve/CVE-2024-42308.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42309.html">https://www.suse.com/security/cve/CVE-2024-42309.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42310.html">https://www.suse.com/security/cve/CVE-2024-42310.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42311.html">https://www.suse.com/security/cve/CVE-2024-42311.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42312.html">https://www.suse.com/security/cve/CVE-2024-42312.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42313.html">https://www.suse.com/security/cve/CVE-2024-42313.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42314.html">https://www.suse.com/security/cve/CVE-2024-42314.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42315.html">https://www.suse.com/security/cve/CVE-2024-42315.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42316.html">https://www.suse.com/security/cve/CVE-2024-42316.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42318.html">https://www.suse.com/security/cve/CVE-2024-42318.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42319.html">https://www.suse.com/security/cve/CVE-2024-42319.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42320.html">https://www.suse.com/security/cve/CVE-2024-42320.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-42322.html">https://www.suse.com/security/cve/CVE-2024-42322.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43816.html">https://www.suse.com/security/cve/CVE-2024-43816.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43817.html">https://www.suse.com/security/cve/CVE-2024-43817.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43818.html">https://www.suse.com/security/cve/CVE-2024-43818.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43819.html">https://www.suse.com/security/cve/CVE-2024-43819.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43821.html">https://www.suse.com/security/cve/CVE-2024-43821.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43823.html">https://www.suse.com/security/cve/CVE-2024-43823.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43824.html">https://www.suse.com/security/cve/CVE-2024-43824.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43825.html">https://www.suse.com/security/cve/CVE-2024-43825.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43826.html">https://www.suse.com/security/cve/CVE-2024-43826.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43829.html">https://www.suse.com/security/cve/CVE-2024-43829.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43830.html">https://www.suse.com/security/cve/CVE-2024-43830.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43831.html">https://www.suse.com/security/cve/CVE-2024-43831.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43833.html">https://www.suse.com/security/cve/CVE-2024-43833.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43834.html">https://www.suse.com/security/cve/CVE-2024-43834.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43837.html">https://www.suse.com/security/cve/CVE-2024-43837.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43839.html">https://www.suse.com/security/cve/CVE-2024-43839.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43840.html">https://www.suse.com/security/cve/CVE-2024-43840.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43841.html">https://www.suse.com/security/cve/CVE-2024-43841.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43842.html">https://www.suse.com/security/cve/CVE-2024-43842.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43846.html">https://www.suse.com/security/cve/CVE-2024-43846.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43847.html">https://www.suse.com/security/cve/CVE-2024-43847.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43849.html">https://www.suse.com/security/cve/CVE-2024-43849.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43850.html">https://www.suse.com/security/cve/CVE-2024-43850.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43851.html">https://www.suse.com/security/cve/CVE-2024-43851.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43853.html">https://www.suse.com/security/cve/CVE-2024-43853.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43854.html">https://www.suse.com/security/cve/CVE-2024-43854.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43855.html">https://www.suse.com/security/cve/CVE-2024-43855.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43856.html">https://www.suse.com/security/cve/CVE-2024-43856.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43858.html">https://www.suse.com/security/cve/CVE-2024-43858.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43860.html">https://www.suse.com/security/cve/CVE-2024-43860.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43861.html">https://www.suse.com/security/cve/CVE-2024-43861.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43863.html">https://www.suse.com/security/cve/CVE-2024-43863.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43864.html">https://www.suse.com/security/cve/CVE-2024-43864.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43866.html">https://www.suse.com/security/cve/CVE-2024-43866.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43867.html">https://www.suse.com/security/cve/CVE-2024-43867.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43871.html">https://www.suse.com/security/cve/CVE-2024-43871.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43872.html">https://www.suse.com/security/cve/CVE-2024-43872.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43873.html">https://www.suse.com/security/cve/CVE-2024-43873.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43874.html">https://www.suse.com/security/cve/CVE-2024-43874.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43875.html">https://www.suse.com/security/cve/CVE-2024-43875.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43876.html">https://www.suse.com/security/cve/CVE-2024-43876.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43877.html">https://www.suse.com/security/cve/CVE-2024-43877.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43879.html">https://www.suse.com/security/cve/CVE-2024-43879.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43880.html">https://www.suse.com/security/cve/CVE-2024-43880.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43881.html">https://www.suse.com/security/cve/CVE-2024-43881.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43882.html">https://www.suse.com/security/cve/CVE-2024-43882.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43883.html">https://www.suse.com/security/cve/CVE-2024-43883.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43884.html">https://www.suse.com/security/cve/CVE-2024-43884.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43885.html">https://www.suse.com/security/cve/CVE-2024-43885.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43889.html">https://www.suse.com/security/cve/CVE-2024-43889.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43892.html">https://www.suse.com/security/cve/CVE-2024-43892.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43893.html">https://www.suse.com/security/cve/CVE-2024-43893.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43894.html">https://www.suse.com/security/cve/CVE-2024-43894.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43895.html">https://www.suse.com/security/cve/CVE-2024-43895.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43897.html">https://www.suse.com/security/cve/CVE-2024-43897.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43899.html">https://www.suse.com/security/cve/CVE-2024-43899.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43900.html">https://www.suse.com/security/cve/CVE-2024-43900.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43902.html">https://www.suse.com/security/cve/CVE-2024-43902.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43903.html">https://www.suse.com/security/cve/CVE-2024-43903.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43905.html">https://www.suse.com/security/cve/CVE-2024-43905.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43906.html">https://www.suse.com/security/cve/CVE-2024-43906.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43907.html">https://www.suse.com/security/cve/CVE-2024-43907.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43908.html">https://www.suse.com/security/cve/CVE-2024-43908.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43909.html">https://www.suse.com/security/cve/CVE-2024-43909.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43911.html">https://www.suse.com/security/cve/CVE-2024-43911.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-43912.html">https://www.suse.com/security/cve/CVE-2024-43912.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-44931.html">https://www.suse.com/security/cve/CVE-2024-44931.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-44938.html">https://www.suse.com/security/cve/CVE-2024-44938.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-44939.html">https://www.suse.com/security/cve/CVE-2024-44939.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193454">https://bugzilla.suse.com/show_bug.cgi?id=1193454</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205462">https://bugzilla.suse.com/show_bug.cgi?id=1205462</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208783">https://bugzilla.suse.com/show_bug.cgi?id=1208783</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213123">https://bugzilla.suse.com/show_bug.cgi?id=1213123</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214285">https://bugzilla.suse.com/show_bug.cgi?id=1214285</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220066">https://bugzilla.suse.com/show_bug.cgi?id=1220066</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220252">https://bugzilla.suse.com/show_bug.cgi?id=1220252</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220877">https://bugzilla.suse.com/show_bug.cgi?id=1220877</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221326">https://bugzilla.suse.com/show_bug.cgi?id=1221326</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221630">https://bugzilla.suse.com/show_bug.cgi?id=1221630</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221645">https://bugzilla.suse.com/show_bug.cgi?id=1221645</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221652">https://bugzilla.suse.com/show_bug.cgi?id=1221652</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221857">https://bugzilla.suse.com/show_bug.cgi?id=1221857</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222254">https://bugzilla.suse.com/show_bug.cgi?id=1222254</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222335">https://bugzilla.suse.com/show_bug.cgi?id=1222335</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222350">https://bugzilla.suse.com/show_bug.cgi?id=1222350</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">https://bugzilla.suse.com/show_bug.cgi?id=1222364</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222372">https://bugzilla.suse.com/show_bug.cgi?id=1222372</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222387">https://bugzilla.suse.com/show_bug.cgi?id=1222387</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222433">https://bugzilla.suse.com/show_bug.cgi?id=1222433</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222434">https://bugzilla.suse.com/show_bug.cgi?id=1222434</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222463">https://bugzilla.suse.com/show_bug.cgi?id=1222463</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222625">https://bugzilla.suse.com/show_bug.cgi?id=1222625</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222633">https://bugzilla.suse.com/show_bug.cgi?id=1222633</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222634">https://bugzilla.suse.com/show_bug.cgi?id=1222634</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222808">https://bugzilla.suse.com/show_bug.cgi?id=1222808</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222967">https://bugzilla.suse.com/show_bug.cgi?id=1222967</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222973">https://bugzilla.suse.com/show_bug.cgi?id=1222973</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223053">https://bugzilla.suse.com/show_bug.cgi?id=1223053</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223074">https://bugzilla.suse.com/show_bug.cgi?id=1223074</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223191">https://bugzilla.suse.com/show_bug.cgi?id=1223191</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223395">https://bugzilla.suse.com/show_bug.cgi?id=1223395</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223635">https://bugzilla.suse.com/show_bug.cgi?id=1223635</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223720">https://bugzilla.suse.com/show_bug.cgi?id=1223720</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223731">https://bugzilla.suse.com/show_bug.cgi?id=1223731</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223742">https://bugzilla.suse.com/show_bug.cgi?id=1223742</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223763">https://bugzilla.suse.com/show_bug.cgi?id=1223763</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223767">https://bugzilla.suse.com/show_bug.cgi?id=1223767</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223777">https://bugzilla.suse.com/show_bug.cgi?id=1223777</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223803">https://bugzilla.suse.com/show_bug.cgi?id=1223803</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224105">https://bugzilla.suse.com/show_bug.cgi?id=1224105</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224415">https://bugzilla.suse.com/show_bug.cgi?id=1224415</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224485">https://bugzilla.suse.com/show_bug.cgi?id=1224485</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224496">https://bugzilla.suse.com/show_bug.cgi?id=1224496</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224510">https://bugzilla.suse.com/show_bug.cgi?id=1224510</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224535">https://bugzilla.suse.com/show_bug.cgi?id=1224535</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224631">https://bugzilla.suse.com/show_bug.cgi?id=1224631</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224636">https://bugzilla.suse.com/show_bug.cgi?id=1224636</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224690">https://bugzilla.suse.com/show_bug.cgi?id=1224690</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224694">https://bugzilla.suse.com/show_bug.cgi?id=1224694</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224700">https://bugzilla.suse.com/show_bug.cgi?id=1224700</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1224711">https://bugzilla.suse.com/show_bug.cgi?id=1224711</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225475">https://bugzilla.suse.com/show_bug.cgi?id=1225475</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225582">https://bugzilla.suse.com/show_bug.cgi?id=1225582</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225607">https://bugzilla.suse.com/show_bug.cgi?id=1225607</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225717">https://bugzilla.suse.com/show_bug.cgi?id=1225717</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225718">https://bugzilla.suse.com/show_bug.cgi?id=1225718</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225744">https://bugzilla.suse.com/show_bug.cgi?id=1225744</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225745">https://bugzilla.suse.com/show_bug.cgi?id=1225745</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225751">https://bugzilla.suse.com/show_bug.cgi?id=1225751</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225814">https://bugzilla.suse.com/show_bug.cgi?id=1225814</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225832">https://bugzilla.suse.com/show_bug.cgi?id=1225832</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225838">https://bugzilla.suse.com/show_bug.cgi?id=1225838</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">https://bugzilla.suse.com/show_bug.cgi?id=1225903</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226031">https://bugzilla.suse.com/show_bug.cgi?id=1226031</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226127">https://bugzilla.suse.com/show_bug.cgi?id=1226127</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226502">https://bugzilla.suse.com/show_bug.cgi?id=1226502</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226530">https://bugzilla.suse.com/show_bug.cgi?id=1226530</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226588">https://bugzilla.suse.com/show_bug.cgi?id=1226588</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226604">https://bugzilla.suse.com/show_bug.cgi?id=1226604</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226743">https://bugzilla.suse.com/show_bug.cgi?id=1226743</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226751">https://bugzilla.suse.com/show_bug.cgi?id=1226751</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226765">https://bugzilla.suse.com/show_bug.cgi?id=1226765</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226798">https://bugzilla.suse.com/show_bug.cgi?id=1226798</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226801">https://bugzilla.suse.com/show_bug.cgi?id=1226801</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226834">https://bugzilla.suse.com/show_bug.cgi?id=1226834</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226874">https://bugzilla.suse.com/show_bug.cgi?id=1226874</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226885">https://bugzilla.suse.com/show_bug.cgi?id=1226885</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1226920">https://bugzilla.suse.com/show_bug.cgi?id=1226920</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227149">https://bugzilla.suse.com/show_bug.cgi?id=1227149</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227182">https://bugzilla.suse.com/show_bug.cgi?id=1227182</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227383">https://bugzilla.suse.com/show_bug.cgi?id=1227383</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227437">https://bugzilla.suse.com/show_bug.cgi?id=1227437</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227492">https://bugzilla.suse.com/show_bug.cgi?id=1227492</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227493">https://bugzilla.suse.com/show_bug.cgi?id=1227493</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227494">https://bugzilla.suse.com/show_bug.cgi?id=1227494</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227618">https://bugzilla.suse.com/show_bug.cgi?id=1227618</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227620">https://bugzilla.suse.com/show_bug.cgi?id=1227620</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227623">https://bugzilla.suse.com/show_bug.cgi?id=1227623</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227627">https://bugzilla.suse.com/show_bug.cgi?id=1227627</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227634">https://bugzilla.suse.com/show_bug.cgi?id=1227634</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227706">https://bugzilla.suse.com/show_bug.cgi?id=1227706</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227722">https://bugzilla.suse.com/show_bug.cgi?id=1227722</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227724">https://bugzilla.suse.com/show_bug.cgi?id=1227724</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227725">https://bugzilla.suse.com/show_bug.cgi?id=1227725</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227728">https://bugzilla.suse.com/show_bug.cgi?id=1227728</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227729">https://bugzilla.suse.com/show_bug.cgi?id=1227729</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227732">https://bugzilla.suse.com/show_bug.cgi?id=1227732</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227733">https://bugzilla.suse.com/show_bug.cgi?id=1227733</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227734">https://bugzilla.suse.com/show_bug.cgi?id=1227734</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227747">https://bugzilla.suse.com/show_bug.cgi?id=1227747</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227750">https://bugzilla.suse.com/show_bug.cgi?id=1227750</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227754">https://bugzilla.suse.com/show_bug.cgi?id=1227754</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227758">https://bugzilla.suse.com/show_bug.cgi?id=1227758</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227760">https://bugzilla.suse.com/show_bug.cgi?id=1227760</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227761">https://bugzilla.suse.com/show_bug.cgi?id=1227761</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227764">https://bugzilla.suse.com/show_bug.cgi?id=1227764</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227766">https://bugzilla.suse.com/show_bug.cgi?id=1227766</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227770">https://bugzilla.suse.com/show_bug.cgi?id=1227770</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227771">https://bugzilla.suse.com/show_bug.cgi?id=1227771</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227772">https://bugzilla.suse.com/show_bug.cgi?id=1227772</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227774">https://bugzilla.suse.com/show_bug.cgi?id=1227774</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227781">https://bugzilla.suse.com/show_bug.cgi?id=1227781</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227784">https://bugzilla.suse.com/show_bug.cgi?id=1227784</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227785">https://bugzilla.suse.com/show_bug.cgi?id=1227785</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227787">https://bugzilla.suse.com/show_bug.cgi?id=1227787</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227790">https://bugzilla.suse.com/show_bug.cgi?id=1227790</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227791">https://bugzilla.suse.com/show_bug.cgi?id=1227791</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227792">https://bugzilla.suse.com/show_bug.cgi?id=1227792</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227796">https://bugzilla.suse.com/show_bug.cgi?id=1227796</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227798">https://bugzilla.suse.com/show_bug.cgi?id=1227798</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227799">https://bugzilla.suse.com/show_bug.cgi?id=1227799</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227802">https://bugzilla.suse.com/show_bug.cgi?id=1227802</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227808">https://bugzilla.suse.com/show_bug.cgi?id=1227808</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227810">https://bugzilla.suse.com/show_bug.cgi?id=1227810</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227811">https://bugzilla.suse.com/show_bug.cgi?id=1227811</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227812">https://bugzilla.suse.com/show_bug.cgi?id=1227812</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227815">https://bugzilla.suse.com/show_bug.cgi?id=1227815</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227816">https://bugzilla.suse.com/show_bug.cgi?id=1227816</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227818">https://bugzilla.suse.com/show_bug.cgi?id=1227818</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227820">https://bugzilla.suse.com/show_bug.cgi?id=1227820</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227823">https://bugzilla.suse.com/show_bug.cgi?id=1227823</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227824">https://bugzilla.suse.com/show_bug.cgi?id=1227824</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227826">https://bugzilla.suse.com/show_bug.cgi?id=1227826</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227828">https://bugzilla.suse.com/show_bug.cgi?id=1227828</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227829">https://bugzilla.suse.com/show_bug.cgi?id=1227829</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227830">https://bugzilla.suse.com/show_bug.cgi?id=1227830</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227832">https://bugzilla.suse.com/show_bug.cgi?id=1227832</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227833">https://bugzilla.suse.com/show_bug.cgi?id=1227833</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227834">https://bugzilla.suse.com/show_bug.cgi?id=1227834</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227839">https://bugzilla.suse.com/show_bug.cgi?id=1227839</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227840">https://bugzilla.suse.com/show_bug.cgi?id=1227840</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227846">https://bugzilla.suse.com/show_bug.cgi?id=1227846</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227849">https://bugzilla.suse.com/show_bug.cgi?id=1227849</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227851">https://bugzilla.suse.com/show_bug.cgi?id=1227851</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">https://bugzilla.suse.com/show_bug.cgi?id=1227853</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227863">https://bugzilla.suse.com/show_bug.cgi?id=1227863</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227864">https://bugzilla.suse.com/show_bug.cgi?id=1227864</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227865">https://bugzilla.suse.com/show_bug.cgi?id=1227865</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227867">https://bugzilla.suse.com/show_bug.cgi?id=1227867</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227869">https://bugzilla.suse.com/show_bug.cgi?id=1227869</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227870">https://bugzilla.suse.com/show_bug.cgi?id=1227870</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227883">https://bugzilla.suse.com/show_bug.cgi?id=1227883</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227884">https://bugzilla.suse.com/show_bug.cgi?id=1227884</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227891">https://bugzilla.suse.com/show_bug.cgi?id=1227891</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227893">https://bugzilla.suse.com/show_bug.cgi?id=1227893</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227929">https://bugzilla.suse.com/show_bug.cgi?id=1227929</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227950">https://bugzilla.suse.com/show_bug.cgi?id=1227950</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227957">https://bugzilla.suse.com/show_bug.cgi?id=1227957</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1227981">https://bugzilla.suse.com/show_bug.cgi?id=1227981</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228020">https://bugzilla.suse.com/show_bug.cgi?id=1228020</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228021">https://bugzilla.suse.com/show_bug.cgi?id=1228021</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228114">https://bugzilla.suse.com/show_bug.cgi?id=1228114</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228192">https://bugzilla.suse.com/show_bug.cgi?id=1228192</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228195">https://bugzilla.suse.com/show_bug.cgi?id=1228195</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228202">https://bugzilla.suse.com/show_bug.cgi?id=1228202</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228235">https://bugzilla.suse.com/show_bug.cgi?id=1228235</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228236">https://bugzilla.suse.com/show_bug.cgi?id=1228236</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228237">https://bugzilla.suse.com/show_bug.cgi?id=1228237</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228247">https://bugzilla.suse.com/show_bug.cgi?id=1228247</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228321">https://bugzilla.suse.com/show_bug.cgi?id=1228321</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228409">https://bugzilla.suse.com/show_bug.cgi?id=1228409</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228426">https://bugzilla.suse.com/show_bug.cgi?id=1228426</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228427">https://bugzilla.suse.com/show_bug.cgi?id=1228427</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228429">https://bugzilla.suse.com/show_bug.cgi?id=1228429</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228446">https://bugzilla.suse.com/show_bug.cgi?id=1228446</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228447">https://bugzilla.suse.com/show_bug.cgi?id=1228447</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228449">https://bugzilla.suse.com/show_bug.cgi?id=1228449</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228450">https://bugzilla.suse.com/show_bug.cgi?id=1228450</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228452">https://bugzilla.suse.com/show_bug.cgi?id=1228452</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228456">https://bugzilla.suse.com/show_bug.cgi?id=1228456</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228457">https://bugzilla.suse.com/show_bug.cgi?id=1228457</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228458">https://bugzilla.suse.com/show_bug.cgi?id=1228458</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228459">https://bugzilla.suse.com/show_bug.cgi?id=1228459</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228460">https://bugzilla.suse.com/show_bug.cgi?id=1228460</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228462">https://bugzilla.suse.com/show_bug.cgi?id=1228462</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228463">https://bugzilla.suse.com/show_bug.cgi?id=1228463</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228466">https://bugzilla.suse.com/show_bug.cgi?id=1228466</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228467">https://bugzilla.suse.com/show_bug.cgi?id=1228467</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228468">https://bugzilla.suse.com/show_bug.cgi?id=1228468</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228469">https://bugzilla.suse.com/show_bug.cgi?id=1228469</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228470">https://bugzilla.suse.com/show_bug.cgi?id=1228470</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228472">https://bugzilla.suse.com/show_bug.cgi?id=1228472</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228479">https://bugzilla.suse.com/show_bug.cgi?id=1228479</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228480">https://bugzilla.suse.com/show_bug.cgi?id=1228480</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228481">https://bugzilla.suse.com/show_bug.cgi?id=1228481</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228482">https://bugzilla.suse.com/show_bug.cgi?id=1228482</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228483">https://bugzilla.suse.com/show_bug.cgi?id=1228483</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228484">https://bugzilla.suse.com/show_bug.cgi?id=1228484</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228485">https://bugzilla.suse.com/show_bug.cgi?id=1228485</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">https://bugzilla.suse.com/show_bug.cgi?id=1228486</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228487">https://bugzilla.suse.com/show_bug.cgi?id=1228487</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228489">https://bugzilla.suse.com/show_bug.cgi?id=1228489</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228491">https://bugzilla.suse.com/show_bug.cgi?id=1228491</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228492">https://bugzilla.suse.com/show_bug.cgi?id=1228492</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228493">https://bugzilla.suse.com/show_bug.cgi?id=1228493</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228494">https://bugzilla.suse.com/show_bug.cgi?id=1228494</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228495">https://bugzilla.suse.com/show_bug.cgi?id=1228495</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228496">https://bugzilla.suse.com/show_bug.cgi?id=1228496</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228499">https://bugzilla.suse.com/show_bug.cgi?id=1228499</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228500">https://bugzilla.suse.com/show_bug.cgi?id=1228500</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228501">https://bugzilla.suse.com/show_bug.cgi?id=1228501</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228502">https://bugzilla.suse.com/show_bug.cgi?id=1228502</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228503">https://bugzilla.suse.com/show_bug.cgi?id=1228503</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228505">https://bugzilla.suse.com/show_bug.cgi?id=1228505</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228508">https://bugzilla.suse.com/show_bug.cgi?id=1228508</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228509">https://bugzilla.suse.com/show_bug.cgi?id=1228509</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228510">https://bugzilla.suse.com/show_bug.cgi?id=1228510</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228511">https://bugzilla.suse.com/show_bug.cgi?id=1228511</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228513">https://bugzilla.suse.com/show_bug.cgi?id=1228513</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228515">https://bugzilla.suse.com/show_bug.cgi?id=1228515</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228516">https://bugzilla.suse.com/show_bug.cgi?id=1228516</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228518">https://bugzilla.suse.com/show_bug.cgi?id=1228518</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228520">https://bugzilla.suse.com/show_bug.cgi?id=1228520</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228525">https://bugzilla.suse.com/show_bug.cgi?id=1228525</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228527">https://bugzilla.suse.com/show_bug.cgi?id=1228527</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228530">https://bugzilla.suse.com/show_bug.cgi?id=1228530</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228531">https://bugzilla.suse.com/show_bug.cgi?id=1228531</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228539">https://bugzilla.suse.com/show_bug.cgi?id=1228539</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228561">https://bugzilla.suse.com/show_bug.cgi?id=1228561</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228563">https://bugzilla.suse.com/show_bug.cgi?id=1228563</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228564">https://bugzilla.suse.com/show_bug.cgi?id=1228564</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228565">https://bugzilla.suse.com/show_bug.cgi?id=1228565</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228567">https://bugzilla.suse.com/show_bug.cgi?id=1228567</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228568">https://bugzilla.suse.com/show_bug.cgi?id=1228568</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228572">https://bugzilla.suse.com/show_bug.cgi?id=1228572</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228576">https://bugzilla.suse.com/show_bug.cgi?id=1228576</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228579">https://bugzilla.suse.com/show_bug.cgi?id=1228579</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228580">https://bugzilla.suse.com/show_bug.cgi?id=1228580</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228581">https://bugzilla.suse.com/show_bug.cgi?id=1228581</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228582">https://bugzilla.suse.com/show_bug.cgi?id=1228582</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228584">https://bugzilla.suse.com/show_bug.cgi?id=1228584</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228586">https://bugzilla.suse.com/show_bug.cgi?id=1228586</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228588">https://bugzilla.suse.com/show_bug.cgi?id=1228588</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228590">https://bugzilla.suse.com/show_bug.cgi?id=1228590</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228591">https://bugzilla.suse.com/show_bug.cgi?id=1228591</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228599">https://bugzilla.suse.com/show_bug.cgi?id=1228599</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228615">https://bugzilla.suse.com/show_bug.cgi?id=1228615</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228616">https://bugzilla.suse.com/show_bug.cgi?id=1228616</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228617">https://bugzilla.suse.com/show_bug.cgi?id=1228617</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228625">https://bugzilla.suse.com/show_bug.cgi?id=1228625</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228626">https://bugzilla.suse.com/show_bug.cgi?id=1228626</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228633">https://bugzilla.suse.com/show_bug.cgi?id=1228633</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228635">https://bugzilla.suse.com/show_bug.cgi?id=1228635</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228636">https://bugzilla.suse.com/show_bug.cgi?id=1228636</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228640">https://bugzilla.suse.com/show_bug.cgi?id=1228640</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228643">https://bugzilla.suse.com/show_bug.cgi?id=1228643</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228644">https://bugzilla.suse.com/show_bug.cgi?id=1228644</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228646">https://bugzilla.suse.com/show_bug.cgi?id=1228646</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228649">https://bugzilla.suse.com/show_bug.cgi?id=1228649</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">https://bugzilla.suse.com/show_bug.cgi?id=1228650</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228654">https://bugzilla.suse.com/show_bug.cgi?id=1228654</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228655">https://bugzilla.suse.com/show_bug.cgi?id=1228655</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228656">https://bugzilla.suse.com/show_bug.cgi?id=1228656</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228658">https://bugzilla.suse.com/show_bug.cgi?id=1228658</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228660">https://bugzilla.suse.com/show_bug.cgi?id=1228660</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228662">https://bugzilla.suse.com/show_bug.cgi?id=1228662</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228665">https://bugzilla.suse.com/show_bug.cgi?id=1228665</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228666">https://bugzilla.suse.com/show_bug.cgi?id=1228666</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228667">https://bugzilla.suse.com/show_bug.cgi?id=1228667</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228672">https://bugzilla.suse.com/show_bug.cgi?id=1228672</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228673">https://bugzilla.suse.com/show_bug.cgi?id=1228673</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228674">https://bugzilla.suse.com/show_bug.cgi?id=1228674</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228677">https://bugzilla.suse.com/show_bug.cgi?id=1228677</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228680">https://bugzilla.suse.com/show_bug.cgi?id=1228680</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228687">https://bugzilla.suse.com/show_bug.cgi?id=1228687</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228705">https://bugzilla.suse.com/show_bug.cgi?id=1228705</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228706">https://bugzilla.suse.com/show_bug.cgi?id=1228706</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228707">https://bugzilla.suse.com/show_bug.cgi?id=1228707</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228708">https://bugzilla.suse.com/show_bug.cgi?id=1228708</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228709">https://bugzilla.suse.com/show_bug.cgi?id=1228709</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228710">https://bugzilla.suse.com/show_bug.cgi?id=1228710</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228718">https://bugzilla.suse.com/show_bug.cgi?id=1228718</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228720">https://bugzilla.suse.com/show_bug.cgi?id=1228720</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228721">https://bugzilla.suse.com/show_bug.cgi?id=1228721</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228722">https://bugzilla.suse.com/show_bug.cgi?id=1228722</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228723">https://bugzilla.suse.com/show_bug.cgi?id=1228723</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228724">https://bugzilla.suse.com/show_bug.cgi?id=1228724</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228726">https://bugzilla.suse.com/show_bug.cgi?id=1228726</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228727">https://bugzilla.suse.com/show_bug.cgi?id=1228727</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228733">https://bugzilla.suse.com/show_bug.cgi?id=1228733</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228737">https://bugzilla.suse.com/show_bug.cgi?id=1228737</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228743">https://bugzilla.suse.com/show_bug.cgi?id=1228743</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228748">https://bugzilla.suse.com/show_bug.cgi?id=1228748</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228754">https://bugzilla.suse.com/show_bug.cgi?id=1228754</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228756">https://bugzilla.suse.com/show_bug.cgi?id=1228756</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228757">https://bugzilla.suse.com/show_bug.cgi?id=1228757</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228758">https://bugzilla.suse.com/show_bug.cgi?id=1228758</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228764">https://bugzilla.suse.com/show_bug.cgi?id=1228764</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228766">https://bugzilla.suse.com/show_bug.cgi?id=1228766</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228779">https://bugzilla.suse.com/show_bug.cgi?id=1228779</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228801">https://bugzilla.suse.com/show_bug.cgi?id=1228801</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228849">https://bugzilla.suse.com/show_bug.cgi?id=1228849</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">https://bugzilla.suse.com/show_bug.cgi?id=1228850</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">https://bugzilla.suse.com/show_bug.cgi?id=1228857</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228959">https://bugzilla.suse.com/show_bug.cgi?id=1228959</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228964">https://bugzilla.suse.com/show_bug.cgi?id=1228964</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228966">https://bugzilla.suse.com/show_bug.cgi?id=1228966</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228967">https://bugzilla.suse.com/show_bug.cgi?id=1228967</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228973">https://bugzilla.suse.com/show_bug.cgi?id=1228973</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228977">https://bugzilla.suse.com/show_bug.cgi?id=1228977</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228978">https://bugzilla.suse.com/show_bug.cgi?id=1228978</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228979">https://bugzilla.suse.com/show_bug.cgi?id=1228979</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228986">https://bugzilla.suse.com/show_bug.cgi?id=1228986</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228988">https://bugzilla.suse.com/show_bug.cgi?id=1228988</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228989">https://bugzilla.suse.com/show_bug.cgi?id=1228989</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228991">https://bugzilla.suse.com/show_bug.cgi?id=1228991</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228992">https://bugzilla.suse.com/show_bug.cgi?id=1228992</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229005">https://bugzilla.suse.com/show_bug.cgi?id=1229005</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229024">https://bugzilla.suse.com/show_bug.cgi?id=1229024</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229042">https://bugzilla.suse.com/show_bug.cgi?id=1229042</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229045">https://bugzilla.suse.com/show_bug.cgi?id=1229045</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229046">https://bugzilla.suse.com/show_bug.cgi?id=1229046</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229054">https://bugzilla.suse.com/show_bug.cgi?id=1229054</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229056">https://bugzilla.suse.com/show_bug.cgi?id=1229056</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229086">https://bugzilla.suse.com/show_bug.cgi?id=1229086</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229134">https://bugzilla.suse.com/show_bug.cgi?id=1229134</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229136">https://bugzilla.suse.com/show_bug.cgi?id=1229136</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229154">https://bugzilla.suse.com/show_bug.cgi?id=1229154</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229156">https://bugzilla.suse.com/show_bug.cgi?id=1229156</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229160">https://bugzilla.suse.com/show_bug.cgi?id=1229160</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229167">https://bugzilla.suse.com/show_bug.cgi?id=1229167</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229168">https://bugzilla.suse.com/show_bug.cgi?id=1229168</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229169">https://bugzilla.suse.com/show_bug.cgi?id=1229169</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229170">https://bugzilla.suse.com/show_bug.cgi?id=1229170</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229171">https://bugzilla.suse.com/show_bug.cgi?id=1229171</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229172">https://bugzilla.suse.com/show_bug.cgi?id=1229172</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229173">https://bugzilla.suse.com/show_bug.cgi?id=1229173</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229174">https://bugzilla.suse.com/show_bug.cgi?id=1229174</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229239">https://bugzilla.suse.com/show_bug.cgi?id=1229239</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229240">https://bugzilla.suse.com/show_bug.cgi?id=1229240</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229241">https://bugzilla.suse.com/show_bug.cgi?id=1229241</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229243">https://bugzilla.suse.com/show_bug.cgi?id=1229243</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229244">https://bugzilla.suse.com/show_bug.cgi?id=1229244</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229245">https://bugzilla.suse.com/show_bug.cgi?id=1229245</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229246">https://bugzilla.suse.com/show_bug.cgi?id=1229246</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229247">https://bugzilla.suse.com/show_bug.cgi?id=1229247</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229248">https://bugzilla.suse.com/show_bug.cgi?id=1229248</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229249">https://bugzilla.suse.com/show_bug.cgi?id=1229249</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229250">https://bugzilla.suse.com/show_bug.cgi?id=1229250</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229251">https://bugzilla.suse.com/show_bug.cgi?id=1229251</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229252">https://bugzilla.suse.com/show_bug.cgi?id=1229252</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229253">https://bugzilla.suse.com/show_bug.cgi?id=1229253</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229254">https://bugzilla.suse.com/show_bug.cgi?id=1229254</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229255">https://bugzilla.suse.com/show_bug.cgi?id=1229255</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229256">https://bugzilla.suse.com/show_bug.cgi?id=1229256</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229287">https://bugzilla.suse.com/show_bug.cgi?id=1229287</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229290">https://bugzilla.suse.com/show_bug.cgi?id=1229290</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229291">https://bugzilla.suse.com/show_bug.cgi?id=1229291</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229292">https://bugzilla.suse.com/show_bug.cgi?id=1229292</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229294">https://bugzilla.suse.com/show_bug.cgi?id=1229294</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229296">https://bugzilla.suse.com/show_bug.cgi?id=1229296</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229297">https://bugzilla.suse.com/show_bug.cgi?id=1229297</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229298">https://bugzilla.suse.com/show_bug.cgi?id=1229298</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229299">https://bugzilla.suse.com/show_bug.cgi?id=1229299</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229301">https://bugzilla.suse.com/show_bug.cgi?id=1229301</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229303">https://bugzilla.suse.com/show_bug.cgi?id=1229303</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229304">https://bugzilla.suse.com/show_bug.cgi?id=1229304</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229305">https://bugzilla.suse.com/show_bug.cgi?id=1229305</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229307">https://bugzilla.suse.com/show_bug.cgi?id=1229307</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229309">https://bugzilla.suse.com/show_bug.cgi?id=1229309</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">https://bugzilla.suse.com/show_bug.cgi?id=1229312</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229313">https://bugzilla.suse.com/show_bug.cgi?id=1229313</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229314">https://bugzilla.suse.com/show_bug.cgi?id=1229314</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229315">https://bugzilla.suse.com/show_bug.cgi?id=1229315</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229316">https://bugzilla.suse.com/show_bug.cgi?id=1229316</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229317">https://bugzilla.suse.com/show_bug.cgi?id=1229317</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229318">https://bugzilla.suse.com/show_bug.cgi?id=1229318</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229319">https://bugzilla.suse.com/show_bug.cgi?id=1229319</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229320">https://bugzilla.suse.com/show_bug.cgi?id=1229320</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229327">https://bugzilla.suse.com/show_bug.cgi?id=1229327</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229341">https://bugzilla.suse.com/show_bug.cgi?id=1229341</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229342">https://bugzilla.suse.com/show_bug.cgi?id=1229342</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229344">https://bugzilla.suse.com/show_bug.cgi?id=1229344</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229345">https://bugzilla.suse.com/show_bug.cgi?id=1229345</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229346">https://bugzilla.suse.com/show_bug.cgi?id=1229346</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229347">https://bugzilla.suse.com/show_bug.cgi?id=1229347</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229349">https://bugzilla.suse.com/show_bug.cgi?id=1229349</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229350">https://bugzilla.suse.com/show_bug.cgi?id=1229350</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229351">https://bugzilla.suse.com/show_bug.cgi?id=1229351</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229353">https://bugzilla.suse.com/show_bug.cgi?id=1229353</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229354">https://bugzilla.suse.com/show_bug.cgi?id=1229354</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229355">https://bugzilla.suse.com/show_bug.cgi?id=1229355</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229356">https://bugzilla.suse.com/show_bug.cgi?id=1229356</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229357">https://bugzilla.suse.com/show_bug.cgi?id=1229357</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229358">https://bugzilla.suse.com/show_bug.cgi?id=1229358</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229359">https://bugzilla.suse.com/show_bug.cgi?id=1229359</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229360">https://bugzilla.suse.com/show_bug.cgi?id=1229360</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229365">https://bugzilla.suse.com/show_bug.cgi?id=1229365</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229366">https://bugzilla.suse.com/show_bug.cgi?id=1229366</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229369">https://bugzilla.suse.com/show_bug.cgi?id=1229369</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229370">https://bugzilla.suse.com/show_bug.cgi?id=1229370</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229373">https://bugzilla.suse.com/show_bug.cgi?id=1229373</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229374">https://bugzilla.suse.com/show_bug.cgi?id=1229374</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229379">https://bugzilla.suse.com/show_bug.cgi?id=1229379</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229381">https://bugzilla.suse.com/show_bug.cgi?id=1229381</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229382">https://bugzilla.suse.com/show_bug.cgi?id=1229382</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229383">https://bugzilla.suse.com/show_bug.cgi?id=1229383</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229386">https://bugzilla.suse.com/show_bug.cgi?id=1229386</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229388">https://bugzilla.suse.com/show_bug.cgi?id=1229388</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229390">https://bugzilla.suse.com/show_bug.cgi?id=1229390</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229391">https://bugzilla.suse.com/show_bug.cgi?id=1229391</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229392">https://bugzilla.suse.com/show_bug.cgi?id=1229392</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229395">https://bugzilla.suse.com/show_bug.cgi?id=1229395</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229398">https://bugzilla.suse.com/show_bug.cgi?id=1229398</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229399">https://bugzilla.suse.com/show_bug.cgi?id=1229399</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229400">https://bugzilla.suse.com/show_bug.cgi?id=1229400</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229402">https://bugzilla.suse.com/show_bug.cgi?id=1229402</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229403">https://bugzilla.suse.com/show_bug.cgi?id=1229403</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229404">https://bugzilla.suse.com/show_bug.cgi?id=1229404</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229407">https://bugzilla.suse.com/show_bug.cgi?id=1229407</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229409">https://bugzilla.suse.com/show_bug.cgi?id=1229409</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229410">https://bugzilla.suse.com/show_bug.cgi?id=1229410</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229411">https://bugzilla.suse.com/show_bug.cgi?id=1229411</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229413">https://bugzilla.suse.com/show_bug.cgi?id=1229413</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229414">https://bugzilla.suse.com/show_bug.cgi?id=1229414</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229417">https://bugzilla.suse.com/show_bug.cgi?id=1229417</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229444">https://bugzilla.suse.com/show_bug.cgi?id=1229444</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229451">https://bugzilla.suse.com/show_bug.cgi?id=1229451</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229452">https://bugzilla.suse.com/show_bug.cgi?id=1229452</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229455">https://bugzilla.suse.com/show_bug.cgi?id=1229455</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229456">https://bugzilla.suse.com/show_bug.cgi?id=1229456</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229480">https://bugzilla.suse.com/show_bug.cgi?id=1229480</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229481">https://bugzilla.suse.com/show_bug.cgi?id=1229481</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229482">https://bugzilla.suse.com/show_bug.cgi?id=1229482</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229484">https://bugzilla.suse.com/show_bug.cgi?id=1229484</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229485">https://bugzilla.suse.com/show_bug.cgi?id=1229485</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229486">https://bugzilla.suse.com/show_bug.cgi?id=1229486</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229487">https://bugzilla.suse.com/show_bug.cgi?id=1229487</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229488">https://bugzilla.suse.com/show_bug.cgi?id=1229488</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229489">https://bugzilla.suse.com/show_bug.cgi?id=1229489</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229490">https://bugzilla.suse.com/show_bug.cgi?id=1229490</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229493">https://bugzilla.suse.com/show_bug.cgi?id=1229493</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229495">https://bugzilla.suse.com/show_bug.cgi?id=1229495</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229496">https://bugzilla.suse.com/show_bug.cgi?id=1229496</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229497">https://bugzilla.suse.com/show_bug.cgi?id=1229497</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229500">https://bugzilla.suse.com/show_bug.cgi?id=1229500</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229503">https://bugzilla.suse.com/show_bug.cgi?id=1229503</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229707">https://bugzilla.suse.com/show_bug.cgi?id=1229707</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229739">https://bugzilla.suse.com/show_bug.cgi?id=1229739</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229743">https://bugzilla.suse.com/show_bug.cgi?id=1229743</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229746">https://bugzilla.suse.com/show_bug.cgi?id=1229746</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229747">https://bugzilla.suse.com/show_bug.cgi?id=1229747</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">https://bugzilla.suse.com/show_bug.cgi?id=1229752</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229754">https://bugzilla.suse.com/show_bug.cgi?id=1229754</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229755">https://bugzilla.suse.com/show_bug.cgi?id=1229755</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229756">https://bugzilla.suse.com/show_bug.cgi?id=1229756</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229759">https://bugzilla.suse.com/show_bug.cgi?id=1229759</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229761">https://bugzilla.suse.com/show_bug.cgi?id=1229761</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229767">https://bugzilla.suse.com/show_bug.cgi?id=1229767</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229781">https://bugzilla.suse.com/show_bug.cgi?id=1229781</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229784">https://bugzilla.suse.com/show_bug.cgi?id=1229784</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229785">https://bugzilla.suse.com/show_bug.cgi?id=1229785</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229787">https://bugzilla.suse.com/show_bug.cgi?id=1229787</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229788">https://bugzilla.suse.com/show_bug.cgi?id=1229788</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229789">https://bugzilla.suse.com/show_bug.cgi?id=1229789</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229792">https://bugzilla.suse.com/show_bug.cgi?id=1229792</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229820">https://bugzilla.suse.com/show_bug.cgi?id=1229820</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229827">https://bugzilla.suse.com/show_bug.cgi?id=1229827</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229830">https://bugzilla.suse.com/show_bug.cgi?id=1229830</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229837">https://bugzilla.suse.com/show_bug.cgi?id=1229837</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229940">https://bugzilla.suse.com/show_bug.cgi?id=1229940</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230056">https://bugzilla.suse.com/show_bug.cgi?id=1230056</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230350">https://bugzilla.suse.com/show_bug.cgi?id=1230350</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1230413">https://bugzilla.suse.com/show_bug.cgi?id=1230413</a> </li> <li> <a href="https://jira.suse.com/browse/PED-10029">https://jira.suse.com/browse/PED-10029</a> </li> <li> <a href="https://jira.suse.com/browse/PED-10045">https://jira.suse.com/browse/PED-10045</a> </li> <li> <a href="https://jira.suse.com/browse/PED-10055">https://jira.suse.com/browse/PED-10055</a> </li> <li> <a href="https://jira.suse.com/browse/PED-10105">https://jira.suse.com/browse/PED-10105</a> </li> <li> <a href="https://jira.suse.com/browse/PED-10108">https://jira.suse.com/browse/PED-10108</a> </li> <li> <a href="https://jira.suse.com/browse/PED-8491">https://jira.suse.com/browse/PED-8491</a> </li> <li> <a href="https://jira.suse.com/browse/PED-8779">https://jira.suse.com/browse/PED-8779</a> </li> <li> <a href="https://jira.suse.com/browse/PED-8954">https://jira.suse.com/browse/PED-8954</a> </li> </ul> </div>
--===============0241071922796769080==--
|