Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:4315-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Real Time 15 SP5, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Live Patching 15-SP5, SUSE Real Time Module 15-SP5, SUSE Linux Enterprise Micro 5.5, SUSE openSUSE Leap 15.5, SUSE openSUSE Leap Micro 5.5
Datum: Fr, 13. Dezember 2024, 23:09
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
Applikationen: Linux

Originalnachricht

--===============8809252685416003290==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4315-1
Release Date: 2024-12-13T15:23:51Z
Rating: important
References:

* bsc#1082555
* bsc#1194869
* bsc#1218644
* bsc#1220382
* bsc#1221309
* bsc#1221333
* bsc#1222364
* bsc#1222590
* bsc#1223202
* bsc#1223656
* bsc#1223848
* bsc#1223919
* bsc#1223942
* bsc#1224518
* bsc#1224526
* bsc#1224574
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225812
* bsc#1226560
* bsc#1226592
* bsc#1226631
* bsc#1226748
* bsc#1226872
* bsc#1227853
* bsc#1228410
* bsc#1228430
* bsc#1228486
* bsc#1228650
* bsc#1228857
* bsc#1229312
* bsc#1229429
* bsc#1229585
* bsc#1229752
* bsc#1229808
* bsc#1230055
* bsc#1230220
* bsc#1230231
* bsc#1230270
* bsc#1230558
* bsc#1230827
* bsc#1230918
* bsc#1231083
* bsc#1231089
* bsc#1231098
* bsc#1231101
* bsc#1231108
* bsc#1231111
* bsc#1231132
* bsc#1231135
* bsc#1231138
* bsc#1231169
* bsc#1231178
* bsc#1231180
* bsc#1231181
* bsc#1231187
* bsc#1231202
* bsc#1231434
* bsc#1231441
* bsc#1231452
* bsc#1231465
* bsc#1231474
* bsc#1231481
* bsc#1231537
* bsc#1231541
* bsc#1231646
* bsc#1231849
* bsc#1231856
* bsc#1231858
* bsc#1231859
* bsc#1231864
* bsc#1231904
* bsc#1231916
* bsc#1231920
* bsc#1231923
* bsc#1231930
* bsc#1231931
* bsc#1231947
* bsc#1231952
* bsc#1231953
* bsc#1231959
* bsc#1231978
* bsc#1232013
* bsc#1232015
* bsc#1232016
* bsc#1232017
* bsc#1232027
* bsc#1232028
* bsc#1232047
* bsc#1232048
* bsc#1232050
* bsc#1232056
* bsc#1232076
* bsc#1232080
* bsc#1232094
* bsc#1232096
* bsc#1232098
* bsc#1232111
* bsc#1232126
* bsc#1232134
* bsc#1232135
* bsc#1232141
* bsc#1232142
* bsc#1232147
* bsc#1232152
* bsc#1232159
* bsc#1232162
* bsc#1232165
* bsc#1232180
* bsc#1232185
* bsc#1232187
* bsc#1232189
* bsc#1232195
* bsc#1232198
* bsc#1232201
* bsc#1232218
* bsc#1232224
* bsc#1232232
* bsc#1232254
* bsc#1232255
* bsc#1232264
* bsc#1232272
* bsc#1232279
* bsc#1232287
* bsc#1232293
* bsc#1232312
* bsc#1232317
* bsc#1232318
* bsc#1232333
* bsc#1232334
* bsc#1232335
* bsc#1232339
* bsc#1232349
* bsc#1232357
* bsc#1232359
* bsc#1232362
* bsc#1232364
* bsc#1232370
* bsc#1232371
* bsc#1232378
* bsc#1232385
* bsc#1232387
* bsc#1232394
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232483
* bsc#1232500
* bsc#1232503
* bsc#1232504
* bsc#1232507
* bsc#1232520
* bsc#1232552
* bsc#1232757
* bsc#1232819
* bsc#1232860
* bsc#1232870
* bsc#1232873
* bsc#1232877
* bsc#1232878
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232919
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233035
* bsc#1233049
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233117
* bsc#1233123
* bsc#1233125
* bsc#1233129
* bsc#1233130
* bsc#1233134
* bsc#1233135
* bsc#1233150
* bsc#1233189
* bsc#1233191
* bsc#1233197
* bsc#1233205
* bsc#1233206
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233214
* bsc#1233216
* bsc#1233238
* bsc#1233241
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233350
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233528
* bsc#1233548
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233570
* bsc#1233577
* bsc#1233580
* bsc#1233977
* bsc#1234012
* bsc#1234025
* bsc#1234085
* bsc#1234093
* bsc#1234098
* bsc#1234108


Cross-References:

* CVE-2021-47594
* CVE-2022-48674
* CVE-2022-48979
* CVE-2022-48982
* CVE-2022-48983
* CVE-2022-48989
* CVE-2022-48990
* CVE-2023-52915
* CVE-2023-52917
* CVE-2023-52918
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26782
* CVE-2024-26906
* CVE-2024-26953
* CVE-2024-35888
* CVE-2024-35937
* CVE-2024-35980
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36953
* CVE-2024-36954
* CVE-2024-38577
* CVE-2024-38589
* CVE-2024-38615
* CVE-2024-40997
* CVE-2024-41016
* CVE-2024-41023
* CVE-2024-41049
* CVE-2024-42131
* CVE-2024-43817
* CVE-2024-43897
* CVE-2024-44932
* CVE-2024-44964
* CVE-2024-44995
* CVE-2024-46681
* CVE-2024-46800
* CVE-2024-46802
* CVE-2024-46804
* CVE-2024-46805
* CVE-2024-46807
* CVE-2024-46810
* CVE-2024-46812
* CVE-2024-46819
* CVE-2024-46821
* CVE-2024-46835
* CVE-2024-46842
* CVE-2024-46853
* CVE-2024-46859
* CVE-2024-46864
* CVE-2024-46871
* CVE-2024-47663
* CVE-2024-47665
* CVE-2024-47667
* CVE-2024-47669
* CVE-2024-47670
* CVE-2024-47671
* CVE-2024-47679
* CVE-2024-47682
* CVE-2024-47693
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47701
* CVE-2024-47709
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47718
* CVE-2024-47723
* CVE-2024-47728
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47742
* CVE-2024-47745
* CVE-2024-47749
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49852
* CVE-2024-49855
* CVE-2024-49861
* CVE-2024-49863
* CVE-2024-49868
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49875
* CVE-2024-49877
* CVE-2024-49879
* CVE-2024-49884
* CVE-2024-49891
* CVE-2024-49900
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49905
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49921
* CVE-2024-49924
* CVE-2024-49925
* CVE-2024-49934
* CVE-2024-49935
* CVE-2024-49938
* CVE-2024-49945
* CVE-2024-49947
* CVE-2024-49950
* CVE-2024-49957
* CVE-2024-49963
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49968
* CVE-2024-49981
* CVE-2024-49983
* CVE-2024-49985
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50009
* CVE-2024-50013
* CVE-2024-50017
* CVE-2024-50025
* CVE-2024-50026
* CVE-2024-50031
* CVE-2024-50044
* CVE-2024-50062
* CVE-2024-50067
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50077
* CVE-2024-50078
* CVE-2024-50082
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50138
* CVE-2024-50141
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50160
* CVE-2024-50167
* CVE-2024-50171
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50215
* CVE-2024-50218
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50249
* CVE-2024-50255
* CVE-2024-50259
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53052
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53079
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53104
* CVE-2024-53110


CVSS scores:

* CVE-2021-47594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48674 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48979 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48990 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48990 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52917 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46804 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46805 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46871 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47667 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47669 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47693 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47695 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49861 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49870 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49875 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49902 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49903 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49924 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50008 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50259 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5



An update that solves 230 vulnerabilities and has 33 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
(bsc#1226560).
* CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
(bsc#1231959).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26906: Fixed invalid vsyscall page read for
copy_from_kernel_nofault() (bsc#1223202).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in
skb->head
(bsc#1224518).
* CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
(bsc#1224526).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
* CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
(bsc#1227853).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
* CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
reset (bsc#1230220).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init()
(bsc#1230558).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and
find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47745: mm: call the security_mmap_file() LSM hook in
remap_file_pages() (bsc#1232135).
* CVE-2024-47757: nilfs2: fix potential oob read in
nilfs_btree_check_delete()
(bsc#1232187).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start
a
new trasacntion (bsc#1232272).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be
mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's
return
value (bsc#1232318).
* CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
(bsc#1232520).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during
module unload (bsc#1232877).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too
(bsc#1232884).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy
(bsc#1232905).
* CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
vbva_mouse_pointer_shape (bsc#1232890).
* CVE-2024-50135: nvme-pci: fix race condition between reset and
nvme_dev_disable() (bsc#1232888).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure
(bsc#1233056).
* CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in
reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create
fails
(bsc#1233110).
* CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling
fiber
(bsc#1233107).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50195: posix-clock: Fix missing timespec64 check in
pc_clock_settime() (bsc#1233103).
* CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts
(bsc#1233113).
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
(bsc#1233117).
* CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks
(bsc#1233205).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
nsim_nexthop_bucket_activity_write() (bsc#1233214).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug
printk
(bsc#1233456).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for
dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start
write (bsc#1233548).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for
non-paged
SKB data (bsc#1233552).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).
* CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
scmi_bus_notifier() (bsc#1233561).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53088: i40e: fix race condition by adding filter's
intermediate
sync state (bsc#1233580).
* CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).

The following non-security bugs were fixed:

* Drop OCFS2 patch causing a regression (bsc#1233255)
* Fix regression on AMDGPU driver (bsc#1233134)
* Removed the duplicated check of static_assert(sizeof(struct work_struct)
>=
sizeof(struct rcu_head)).
* Removed unnecessary white-space change in kernel/bpf/syscall.c
* Revert "cgroup: Fix memory leak caused by missing
cgroup_bpf_offline"
(bsc#1234108).
* Revert "ixgbe: Manual AN-37 for troublesome link partners for X550
SFI"
(git-fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
(git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic"
(git-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* acpi: CPPC: Fix _CPC register setting issue (git-fixes).
* acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
* acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
detection issue (stable-fixes).
* acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed
with "suse_" to make it more obvious its a downstream thing.
* add bugreference to a hv_netvsc patch (bsc#1232413).
* add commit message for the kABI patch
* alsa: 6fire: Release resources at card release (git-fixes).
* alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
* alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
fixes).
* alsa: hda/realtek: Limit internal Mic boost on Dell platform
(stable-fixes).
* alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
* alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10
(stable-
fixes).
* alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
* alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
* alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
* arm64: Force position-independent veneers (git-fixes).
* arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
* asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).
* asoc: cs42l51: Fix some error handling paths in cs42l51_probe()
(git-fixes).
* asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit
(stable-fixes).
* asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
fixes).
* asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
* block: Avoid leaking hctx->nr_active counter on batched completion
(bsc#1231923).
* bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs
(git-fixes).
* bnxt_en: Fix the PCI-AER routines (git-fixes).
* bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
* bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
(git-fixes).
* bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
* bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
* bnxt_en: Wait for FLR to complete during probe (git-fixes).
* bnxt_en: refactor reset close code (git-fixes).
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* chtls: fix tp->rcv_tstamp initialization (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxgb4: Properly lock TX queue for the selftest (git-fixes).
* cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
* cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
fixes).
* drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-
fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
(stable-
fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with
real
VLA (stable-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* e1000e: Fix S0ix residency on corporate systems (git-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match'
(git-fixes).
* gve: Fix XDP TX completion handling when counters overflow (git-fixes).
* gve: Fix an edge case for TSO skb validity check (git-fixes).
* gve: Fix skb truesize underestimation (git-fixes).
* gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
fixes).
* hid: core: zero-initialize the report buffer (git-fixes).
* hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* hid: multitouch: Add support for B2402FVA track point (stable-fixes).
* hid: wacom: Defer calculation of resolution until resolution_code is known
(git-fixes).
* hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* hid: wacom: fix when get product name maybe null pointer (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
(git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()
(git-
fixes).
* i40e: Fix XDP program unloading while removing the driver (git-fixes).
* i40e: Fix filter input checks to prevent config with invalid values (git-
fixes).
* i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
* i40e: Report MFS in decimal base instead of hex (git-fixes).
* i40e: Restore VF MSI-X state during PCI reset (git-fixes).
* i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
* i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
fixes).
* i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
* i40e: take into account XDP Tx queues when stopping rings (git-fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
* iavf: Fix promiscuous mode configuration flow messages (git-fixes).
* iavf: Introduce new state machines for flow director (git-fixes).
* iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-
fixes).
* iavf: fix FDIR rule fields masks validation (git-fixes).
* iavf: in iavf_down, disable queues when removing the driver (git-fixes).
* iavf: initialize waitqueues before starting watchdog_task (git-fixes).
* iavf: send VLAN offloading caps once after VFR (git-fixes).
* iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-
fixes).
* ibmvnic: Do partial reset on login failure (bsc#1233150).
* ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
* ibmvnic: Ensure login failure recovery is safe from other resets
(bsc#1233150).
* ibmvnic: Handle DMA unmapping of login buffs in release functions
(bsc#1233150).
* ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
* ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
* ice: Fix NULL pointer deref during VF reset (git-fixes).
* ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
* ice: Fix link_down_on_close message (git-fixes).
* ice: Fix netif_is_ice() in Safe Mode (git-fixes).
* ice: Interpret .set_channels() input differently (git-fixes).
* ice: Shut down VSI with "link-down-on-close" enabled (git-fixes).
* ice: avoid executing commands on other ports when driving sync (git-fixes).
* ice: change q_index variable type to s16 to store -1 value (git-fixes).
* ice: fix ICE_LAST_OFFSET formula (git-fixes).
* ice: fix VLAN replay after reset (git-fixes).
* ice: fix accounting for filters shared by multiple VSIs (git-fixes).
* ice: fix accounting if a VLAN already exists (git-fixes).
* ice: fix over-shifted variable (git-fixes).
* ice: fix receive buffer size miscalculation (git-fixes).
* ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-
fixes).
* ice: reset first in crash dump kernels (git-fixes).
* ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
* ice: tc: allow zero flags in parsing tc flower (git-fixes).
* ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
fixes).
* idpf: Interpret .set_channels() input differently (git-fixes).
* idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-
fixes).
* idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
* idpf: disable local BH when scheduling napi for marker packets (git-fixes).
* idpf: distinguish vports by the dev_port attribute (git-fixes).
* idpf: do not enable NAPI and interrupts prior to allocating Rx buffers
(git-
fixes).
* idpf: fix UAFs when destroying the queues (git-fixes).
* idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
* idpf: fix memleak in vport interrupt configuration (git-fixes).
* idpf: fix memory leaks and crashes while performing a soft reset (git-
fixes).
* igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
* igb: Fix missing time sync events (git-fixes).
* igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
* igb: extend PTP timestamp adjustments to i211 (git-fixes).
* igc: Check VLAN EtherType mask (git-fixes).
* igc: Check VLAN TCI mask (git-fixes).
* igc: Fix hicredit calculation (git-fixes).
* igc: Fix missing time sync events (git-fixes).
* igc: Remove temporary workaround (git-fixes).
* igc: Report VLAN EtherType matching back to user (git-fixes).
* igc: Unlock on error in igc_io_resume() (git-fixes).
* iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* iio: light: veml6030: fix microlux value calculation (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
* input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
* input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
(git-fixes).
* input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-
fixes).
* input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
(git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
fixes).
* ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
* ixgbe: fix crash with empty VF macvlan list (git-fixes).
* ixgbe: fix timestamp configuration code (git-fixes).
* ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
* kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
* kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
* mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer
(stable-fixes).
* media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* mei: use kvmalloc for read buffer (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm/memory: add non-anonymous page check in the copy_present_page()
(bsc#1231646).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
fixes).
* net/mlx5: Added cond_resched() to crdump collection (git-fixes).
* net/mlx5: Allow 0 for total host VFs (git-fixes).
* net/mlx5: Correctly compare pkt reformat ids (git-fixes).
* net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
* net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
* net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
(git-fixes).
* net/mlx5: Drain health before unregistering devlink (git-fixes).
* net/mlx5: E-switch, register event handler before arming the event (git-
fixes).
* net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
* net/mlx5: Fix fw tracer first block check (git-fixes).
* net/mlx5: Handle fw tracer change ownership event based on MTRC
(git-fixes).
* net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
* net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
* net/mlx5: Lag, do not use the hardcoded value of the first port
(git-fixes).
* net/mlx5: Lag, restore buckets number to default after hash LAG
deactivation
(git-fixes).
* net/mlx5: Skip clock update work when device is in error state (git-fixes).
* net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
* net/mlx5: Update the list of the PCI supported devices (git-fixes).
* net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
* net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO
(git-fixes).
* net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
* net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
* net/mlx5: fs, lock FTE when checking if active (git-fixes).
* net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
(git-fixes).
* net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
* net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
fixes).
* net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
* net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
* net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
* net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer
(git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer for
representors (git-fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-
fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer used
by representors (git-fixes).
* net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
* net/mlx5e: Do not offload internal port if filter device is out device
(git-
fixes).
* net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
* net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
* net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set
(git-fixes).
* net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).
* net/mlx5e: Fix pedit endianness (git-fixes).
* net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
* net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-
fixes).
* net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
* net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
(git-fixes).
* net/mlx5e: Reduce the size of icosq_str (git-fixes).
* net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
* net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
exhaustion (git-fixes).
* net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
* net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-
fixes).
* net/mlx5e: fix double free of encap_header (git-fixes).
* net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-
fixes).
* net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
* net: ena: Fix potential sign extension issue (git-fixes).
* net: ena: Remove ena_select_queue (git-fixes).
* net: ena: Wrong missing IO completions check order (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flow_spec
(git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: usb: usbnet: fix race in probe failure (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* pci: Add T_PVPERL macro (git-fixes).
* pci: Fix reset_method_store() memory leak (git-fixes).
* pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* pci: keystone: Set mode as Root Complex for "ti,keystone-pcie"
compatible
(git-fixes).
* pci: rockchip-ep: Fix address translation unit programming (git-fixes).
* phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement
(git-
fixes).
* platform/surface: aggregator: Fix warning when controller is destroyed in
probe (git-fixes).
* platform/x86: dell-sysman: add support for alienware products (stable-
fixes).
* platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
* qed: avoid truncating work queue length (git-fixes).
* rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* rdma/hns: Add clear_hem return value to log (git-fixes)
* rdma/hns: Add mutex_destroy() (git-fixes)
* rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* rdma/hns: Fix out-of-order issue of requester when setting FENCE
(git-fixes)
* rdma/hns: Remove unnecessary QP type checks (git-fixes)
* rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* rdma/hns: Use macro instead of magic number (git-fixes)
* rdma/mlx5: Move events notifier registration to be after device
registration
(git-fixes)
* rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
fixes).
* rdma/rxe: Fix the qp flush warnings in req (git-fixes)
* rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* sfc: Check firmware supports Ethernet PTP filter (git-fixes).
* sfc: do not unregister flow_indr if it was never registered (git-fixes).
* sfc: fix a double-free bug in efx_probe_filters (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).
* thermal: core: Initialize thermal zones before registering them
(git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
* tun: prevent negative ifindex (git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* usb: chaoskey: fail open after removal (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
* usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* usb: serial: option: add Quectel RG650V (stable-fixes).
* usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* usb: typec: fix potential out of bounds in
ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* usbip: tools: Fix detach_port() invalid port error path (git-fixes).
* vdpa/mlx5: preserve CVQ vringh index (git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: Fix memory leak in management tx (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
(git-fixes).
* wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-
fixes).
* wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
(git-fixes).
* wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* x86/kvm: fix is_stale_page_fault() (bsc#1221333).
* xhci: Fix Link TRB DMA in command ring stopped completion event
(git-fixes).
* xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
* xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-4315=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4315=1 openSUSE-SLE-15.5-2024-4315=1

* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4315=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4315=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4315=1

## Package List:

* SUSE Real Time Module 15-SP5 (x86_64)
* kernel-rt_debug-vdso-5.14.21-150500.13.79.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-syms-rt-5.14.21-150500.13.79.1
* gfs2-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-5.14.21-150500.13.79.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.79.1
* kernel-source-rt-5.14.21-150500.13.79.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.79.1
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.79.1
* kernel-source-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-extra-5.14.21-150500.13.79.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-livepatch-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-5.14.21-150500.13.79.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
* kernel-rt-optional-5.14.21-150500.13.79.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.79.1
* reiserfs-kmp-rt-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
* gfs2-kmp-rt-5.14.21-150500.13.79.1
* kernel-syms-rt-5.14.21-150500.13.79.1
* kselftests-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.79.1
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
* kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47594.html
* https://www.suse.com/security/cve/CVE-2022-48674.html
* https://www.suse.com/security/cve/CVE-2022-48979.html
* https://www.suse.com/security/cve/CVE-2022-48982.html
* https://www.suse.com/security/cve/CVE-2022-48983.html
* https://www.suse.com/security/cve/CVE-2022-48989.html
* https://www.suse.com/security/cve/CVE-2022-48990.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-35937.html
* https://www.suse.com/security/cve/CVE-2024-35980.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36953.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-38577.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-38615.html
* https://www.suse.com/security/cve/CVE-2024-40997.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-41049.html
* https://www.suse.com/security/cve/CVE-2024-42131.html
* https://www.suse.com/security/cve/CVE-2024-43817.html
* https://www.suse.com/security/cve/CVE-2024-43897.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46804.html
* https://www.suse.com/security/cve/CVE-2024-46805.html
* https://www.suse.com/security/cve/CVE-2024-46807.html
* https://www.suse.com/security/cve/CVE-2024-46810.html
* https://www.suse.com/security/cve/CVE-2024-46812.html
* https://www.suse.com/security/cve/CVE-2024-46819.html
* https://www.suse.com/security/cve/CVE-2024-46821.html
* https://www.suse.com/security/cve/CVE-2024-46835.html
* https://www.suse.com/security/cve/CVE-2024-46842.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://www.suse.com/security/cve/CVE-2024-46864.html
* https://www.suse.com/security/cve/CVE-2024-46871.html
* https://www.suse.com/security/cve/CVE-2024-47663.html
* https://www.suse.com/security/cve/CVE-2024-47665.html
* https://www.suse.com/security/cve/CVE-2024-47667.html
* https://www.suse.com/security/cve/CVE-2024-47669.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50259.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1221333
* https://bugzilla.suse.com/show_bug.cgi?id=1222364
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1223919
* https://bugzilla.suse.com/show_bug.cgi?id=1223942
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224526
* https://bugzilla.suse.com/show_bug.cgi?id=1224574
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225812
* https://bugzilla.suse.com/show_bug.cgi?id=1226560
* https://bugzilla.suse.com/show_bug.cgi?id=1226592
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227853
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228486
* https://bugzilla.suse.com/show_bug.cgi?id=1228650
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229752
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231098
* https://bugzilla.suse.com/show_bug.cgi?id=1231101
* https://bugzilla.suse.com/show_bug.cgi?id=1231108
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231132
* https://bugzilla.suse.com/show_bug.cgi?id=1231135
* https://bugzilla.suse.com/show_bug.cgi?id=1231138
* https://bugzilla.suse.com/show_bug.cgi?id=1231169
* https://bugzilla.suse.com/show_bug.cgi?id=1231178
* https://bugzilla.suse.com/show_bug.cgi?id=1231180
* https://bugzilla.suse.com/show_bug.cgi?id=1231181
* https://bugzilla.suse.com/show_bug.cgi?id=1231187
* https://bugzilla.suse.com/show_bug.cgi?id=1231202
* https://bugzilla.suse.com/show_bug.cgi?id=1231434
* https://bugzilla.suse.com/show_bug.cgi?id=1231441
* https://bugzilla.suse.com/show_bug.cgi?id=1231452
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231474
* https://bugzilla.suse.com/show_bug.cgi?id=1231481
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231541
* https://bugzilla.suse.com/show_bug.cgi?id=1231646
* https://bugzilla.suse.com/show_bug.cgi?id=1231849
* https://bugzilla.suse.com/show_bug.cgi?id=1231856
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231904
* https://bugzilla.suse.com/show_bug.cgi?id=1231916
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231923
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231931
* https://bugzilla.suse.com/show_bug.cgi?id=1231947
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1231953
* https://bugzilla.suse.com/show_bug.cgi?id=1231959
* https://bugzilla.suse.com/show_bug.cgi?id=1231978
* https://bugzilla.suse.com/show_bug.cgi?id=1232013
* https://bugzilla.suse.com/show_bug.cgi?id=1232015
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232017
* https://bugzilla.suse.com/show_bug.cgi?id=1232027
* https://bugzilla.suse.com/show_bug.cgi?id=1232028
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232050
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232076
* https://bugzilla.suse.com/show_bug.cgi?id=1232080
* https://bugzilla.suse.com/show_bug.cgi?id=1232094
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232098
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232162
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232185
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232189
* https://bugzilla.suse.com/show_bug.cgi?id=1232195
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232232
* https://bugzilla.suse.com/show_bug.cgi?id=1232254
* https://bugzilla.suse.com/show_bug.cgi?id=1232255
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232279
* https://bugzilla.suse.com/show_bug.cgi?id=1232287
* https://bugzilla.suse.com/show_bug.cgi?id=1232293
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232317
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232333
* https://bugzilla.suse.com/show_bug.cgi?id=1232334
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232349
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232359
* https://bugzilla.suse.com/show_bug.cgi?id=1232362
* https://bugzilla.suse.com/show_bug.cgi?id=1232364
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232378
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232503
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232507
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232552
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233134
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233150
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233214
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233528
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108


--===============8809252685416003290==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:4315-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2024-12-13T15:23:51Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">bsc#1082555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218644">bsc#1218644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220382">bsc#1220382</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221309">bsc#1221309</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221333">bsc#1221333</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">bsc#1222364</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222590">bsc#1222590</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">bsc#1223202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223656">bsc#1223656</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223848">bsc#1223848</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223919">bsc#1223919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223942">bsc#1223942</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224518">bsc#1224518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224526">bsc#1224526</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224574">bsc#1224574</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225725">bsc#1225725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225730">bsc#1225730</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225764">bsc#1225764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225812">bsc#1225812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226560">bsc#1226560</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226592">bsc#1226592</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226631">bsc#1226631</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226748">bsc#1226748</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226872">bsc#1226872</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">bsc#1227853</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228430">bsc#1228430</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">bsc#1228486</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">bsc#1228650</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">bsc#1228857</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">bsc#1229312</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229429">bsc#1229429</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229585">bsc#1229585</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">bsc#1229752</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229808">bsc#1229808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230055">bsc#1230055</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230220">bsc#1230220</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230231">bsc#1230231</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230270">bsc#1230270</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230558">bsc#1230558</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230827">bsc#1230827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230918">bsc#1230918</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231083">bsc#1231083</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231089">bsc#1231089</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231098">bsc#1231098</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231101">bsc#1231101</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231108">bsc#1231108</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231111">bsc#1231111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231132">bsc#1231132</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231135">bsc#1231135</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231138">bsc#1231138</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231169">bsc#1231169</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231178">bsc#1231178</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231180">bsc#1231180</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231181">bsc#1231181</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231187">bsc#1231187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231202">bsc#1231202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231434">bsc#1231434</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231441">bsc#1231441</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231452">bsc#1231452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231465">bsc#1231465</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231474">bsc#1231474</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231481">bsc#1231481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231537">bsc#1231537</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231541">bsc#1231541</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231646">bsc#1231646</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231849">bsc#1231849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231856">bsc#1231856</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231858">bsc#1231858</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231859">bsc#1231859</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231864">bsc#1231864</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231904">bsc#1231904</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231916">bsc#1231916</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">bsc#1231920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231923">bsc#1231923</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231930">bsc#1231930</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231931">bsc#1231931</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231947">bsc#1231947</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231952">bsc#1231952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231953">bsc#1231953</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231959">bsc#1231959</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231978">bsc#1231978</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232013">bsc#1232013</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232015">bsc#1232015</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232016">bsc#1232016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232017">bsc#1232017</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232027">bsc#1232027</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232028">bsc#1232028</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232047">bsc#1232047</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232048">bsc#1232048</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232050">bsc#1232050</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232056">bsc#1232056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232076">bsc#1232076</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232080">bsc#1232080</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232094">bsc#1232094</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232096">bsc#1232096</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232098">bsc#1232098</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232111">bsc#1232111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232126">bsc#1232126</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232134">bsc#1232134</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232135">bsc#1232135</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232141">bsc#1232141</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232142">bsc#1232142</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232147">bsc#1232147</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232152">bsc#1232152</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">bsc#1232159</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232162">bsc#1232162</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232165">bsc#1232165</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232180">bsc#1232180</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232185">bsc#1232185</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232187">bsc#1232187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232189">bsc#1232189</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232195">bsc#1232195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">bsc#1232198</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">bsc#1232201</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232218">bsc#1232218</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232224">bsc#1232224</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232232">bsc#1232232</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232254">bsc#1232254</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232255">bsc#1232255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232264">bsc#1232264</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232272">bsc#1232272</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232279">bsc#1232279</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232287">bsc#1232287</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232293">bsc#1232293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232312">bsc#1232312</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232317">bsc#1232317</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232318">bsc#1232318</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232333">bsc#1232333</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232334">bsc#1232334</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232335">bsc#1232335</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232339">bsc#1232339</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232349">bsc#1232349</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232357">bsc#1232357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232359">bsc#1232359</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232362">bsc#1232362</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232364">bsc#1232364</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232370">bsc#1232370</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232371">bsc#1232371</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232378">bsc#1232378</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232385">bsc#1232385</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232387">bsc#1232387</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232394">bsc#1232394</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232413">bsc#1232413</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232416">bsc#1232416</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232436">bsc#1232436</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232483">bsc#1232483</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232500">bsc#1232500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232503">bsc#1232503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232504">bsc#1232504</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232507">bsc#1232507</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">bsc#1232520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232552">bsc#1232552</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232757">bsc#1232757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232819">bsc#1232819</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232860">bsc#1232860</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232870">bsc#1232870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232873">bsc#1232873</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232877">bsc#1232877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232878">bsc#1232878</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232881">bsc#1232881</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232884">bsc#1232884</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232885">bsc#1232885</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232887">bsc#1232887</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232888">bsc#1232888</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232890">bsc#1232890</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232892">bsc#1232892</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232896">bsc#1232896</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232897">bsc#1232897</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232905">bsc#1232905</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232907">bsc#1232907</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">bsc#1232919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232926">bsc#1232926</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232928">bsc#1232928</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232935">bsc#1232935</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233035">bsc#1233035</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233049">bsc#1233049</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233051">bsc#1233051</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233056">bsc#1233056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233057">bsc#1233057</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233061">bsc#1233061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233063">bsc#1233063</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233065">bsc#1233065</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233067">bsc#1233067</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233070">bsc#1233070</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233073">bsc#1233073</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233074">bsc#1233074</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233100">bsc#1233100</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233103">bsc#1233103</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233104">bsc#1233104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233105">bsc#1233105</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233106">bsc#1233106</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233107">bsc#1233107</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233108">bsc#1233108</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233110">bsc#1233110</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233111">bsc#1233111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233113">bsc#1233113</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233114">bsc#1233114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233117">bsc#1233117</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233123">bsc#1233123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233125">bsc#1233125</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233129">bsc#1233129</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233130">bsc#1233130</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233134">bsc#1233134</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233135">bsc#1233135</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233150">bsc#1233150</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233189">bsc#1233189</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233191">bsc#1233191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233197">bsc#1233197</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233205">bsc#1233205</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233206">bsc#1233206</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233209">bsc#1233209</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233210">bsc#1233210</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233211">bsc#1233211</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233212">bsc#1233212</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233214">bsc#1233214</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233216">bsc#1233216</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233238">bsc#1233238</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233241">bsc#1233241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233253">bsc#1233253</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233255">bsc#1233255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233293">bsc#1233293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233350">bsc#1233350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233452">bsc#1233452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233453">bsc#1233453</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233454">bsc#1233454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233456">bsc#1233456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233457">bsc#1233457</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233458">bsc#1233458</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233460">bsc#1233460</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233462">bsc#1233462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233463">bsc#1233463</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233468">bsc#1233468</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233471">bsc#1233471</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233476">bsc#1233476</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233478">bsc#1233478</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">bsc#1233479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233481">bsc#1233481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233484">bsc#1233484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233487">bsc#1233487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233490">bsc#1233490</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233491">bsc#1233491</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233528">bsc#1233528</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233548">bsc#1233548</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233552">bsc#1233552</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233553">bsc#1233553</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233554">bsc#1233554</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233555">bsc#1233555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">bsc#1233557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233560">bsc#1233560</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233561">bsc#1233561</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233570">bsc#1233570</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233577">bsc#1233577</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233580">bsc#1233580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233977">bsc#1233977</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234012">bsc#1234012</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234025">bsc#1234025</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234085">bsc#1234085</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234093">bsc#1234093</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234098">bsc#1234098</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234108">bsc#1234108</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47594.html">CVE-2021-47594</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48674.html">CVE-2022-48674</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48979.html">CVE-2022-48979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48982.html">CVE-2022-48982</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48983.html">CVE-2022-48983</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48989.html">CVE-2022-48989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48990.html">CVE-2022-48990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52915.html">CVE-2023-52915</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52917.html">CVE-2023-52917</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52918.html">CVE-2023-52918</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52921.html">CVE-2023-52921</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52922.html">CVE-2023-52922</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26782.html">CVE-2024-26782</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26906.html">CVE-2024-26906</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26953.html">CVE-2024-26953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35888.html">CVE-2024-35888</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35937.html">CVE-2024-35937</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35980.html">CVE-2024-35980</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36484.html">CVE-2024-36484</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36883.html">CVE-2024-36883</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36886.html">CVE-2024-36886</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36905.html">CVE-2024-36905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36953.html">CVE-2024-36953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36954.html">CVE-2024-36954</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38577.html">CVE-2024-38577</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38589.html">CVE-2024-38589</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38615.html">CVE-2024-38615</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40997.html">CVE-2024-40997</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41023.html">CVE-2024-41023</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41049.html">CVE-2024-41049</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42131.html">CVE-2024-42131</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43817.html">CVE-2024-43817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43897.html">CVE-2024-43897</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44932.html">CVE-2024-44932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44964.html">CVE-2024-44964</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44995.html">CVE-2024-44995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46681.html">CVE-2024-46681</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46800.html">CVE-2024-46800</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46802.html">CVE-2024-46802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46804.html">CVE-2024-46804</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46805.html">CVE-2024-46805</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46807.html">CVE-2024-46807</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46810.html">CVE-2024-46810</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46812.html">CVE-2024-46812</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46819.html">CVE-2024-46819</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46821.html">CVE-2024-46821</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46835.html">CVE-2024-46835</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46842.html">CVE-2024-46842</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46853.html">CVE-2024-46853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46859.html">CVE-2024-46859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46864.html">CVE-2024-46864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46871.html">CVE-2024-46871</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47663.html">CVE-2024-47663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47665.html">CVE-2024-47665</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47667.html">CVE-2024-47667</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47669.html">CVE-2024-47669</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47670.html">CVE-2024-47670</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47671.html">CVE-2024-47671</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47679.html">CVE-2024-47679</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47682.html">CVE-2024-47682</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47693.html">CVE-2024-47693</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47695.html">CVE-2024-47695</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47696.html">CVE-2024-47696</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47697.html">CVE-2024-47697</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47698.html">CVE-2024-47698</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47699.html">CVE-2024-47699</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">CVE-2024-47701</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47709.html">CVE-2024-47709</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47712.html">CVE-2024-47712</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47713.html">CVE-2024-47713</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47718.html">CVE-2024-47718</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47723.html">CVE-2024-47723</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47728.html">CVE-2024-47728</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47735.html">CVE-2024-47735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47737.html">CVE-2024-47737</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47742.html">CVE-2024-47742</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47745.html">CVE-2024-47745</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47749.html">CVE-2024-47749</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47756.html">CVE-2024-47756</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47757.html">CVE-2024-47757</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49850.html">CVE-2024-49850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49851.html">CVE-2024-49851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49852.html">CVE-2024-49852</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49855.html">CVE-2024-49855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49861.html">CVE-2024-49861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49863.html">CVE-2024-49863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49868.html">CVE-2024-49868</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49870.html">CVE-2024-49870</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49871.html">CVE-2024-49871</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49875.html">CVE-2024-49875</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49877.html">CVE-2024-49877</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49879.html">CVE-2024-49879</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">CVE-2024-49884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49891.html">CVE-2024-49891</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49900.html">CVE-2024-49900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49902.html">CVE-2024-49902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49903.html">CVE-2024-49903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49905.html">CVE-2024-49905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49907.html">CVE-2024-49907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49908.html">CVE-2024-49908</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49921.html">CVE-2024-49921</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49924.html">CVE-2024-49924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49925.html">CVE-2024-49925</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49934.html">CVE-2024-49934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49935.html">CVE-2024-49935</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49938.html">CVE-2024-49938</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49945.html">CVE-2024-49945</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49947.html">CVE-2024-49947</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49950.html">CVE-2024-49950</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49957.html">CVE-2024-49957</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49963.html">CVE-2024-49963</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49965.html">CVE-2024-49965</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49966.html">CVE-2024-49966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49968.html">CVE-2024-49968</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49981.html">CVE-2024-49981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49983.html">CVE-2024-49983</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49985.html">CVE-2024-49985</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49989.html">CVE-2024-49989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50003.html">CVE-2024-50003</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50007.html">CVE-2024-50007</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50008.html">CVE-2024-50008</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50009.html">CVE-2024-50009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50013.html">CVE-2024-50013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50017.html">CVE-2024-50017</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50025.html">CVE-2024-50025</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50026.html">CVE-2024-50026</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50031.html">CVE-2024-50031</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50044.html">CVE-2024-50044</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50062.html">CVE-2024-50062</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50067.html">CVE-2024-50067</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50073.html">CVE-2024-50073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50074.html">CVE-2024-50074</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50077.html">CVE-2024-50077</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50078.html">CVE-2024-50078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50082.html">CVE-2024-50082</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50089.html">CVE-2024-50089</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50093.html">CVE-2024-50093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50095.html">CVE-2024-50095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50096.html">CVE-2024-50096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50098.html">CVE-2024-50098</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50099.html">CVE-2024-50099</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50103.html">CVE-2024-50103</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50108.html">CVE-2024-50108</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50110.html">CVE-2024-50110</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">CVE-2024-50115</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50116.html">CVE-2024-50116</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50117.html">CVE-2024-50117</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50124.html">CVE-2024-50124</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50125.html">CVE-2024-50125</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50127.html">CVE-2024-50127</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50128.html">CVE-2024-50128</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50131.html">CVE-2024-50131</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50134.html">CVE-2024-50134</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50135.html">CVE-2024-50135</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50138.html">CVE-2024-50138</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50141.html">CVE-2024-50141</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50146.html">CVE-2024-50146</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50147.html">CVE-2024-50147</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50148.html">CVE-2024-50148</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50150.html">CVE-2024-50150</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50153.html">CVE-2024-50153</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50154.html">CVE-2024-50154</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50155.html">CVE-2024-50155</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50156.html">CVE-2024-50156</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50160.html">CVE-2024-50160</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50167.html">CVE-2024-50167</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50171.html">CVE-2024-50171</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50179.html">CVE-2024-50179</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50180.html">CVE-2024-50180</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50182.html">CVE-2024-50182</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50183.html">CVE-2024-50183</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50184.html">CVE-2024-50184</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50186.html">CVE-2024-50186</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50187.html">CVE-2024-50187</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50188.html">CVE-2024-50188</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50189.html">CVE-2024-50189</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50192.html">CVE-2024-50192</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50194.html">CVE-2024-50194</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50195.html">CVE-2024-50195</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50196.html">CVE-2024-50196</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50198.html">CVE-2024-50198</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50201.html">CVE-2024-50201</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50205.html">CVE-2024-50205</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50208.html">CVE-2024-50208</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50209.html">CVE-2024-50209</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50215.html">CVE-2024-50215</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50218.html">CVE-2024-50218</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50229.html">CVE-2024-50229</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50230.html">CVE-2024-50230</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50232.html">CVE-2024-50232</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50233.html">CVE-2024-50233</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50234.html">CVE-2024-50234</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50236.html">CVE-2024-50236</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50237.html">CVE-2024-50237</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50249.html">CVE-2024-50249</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50255.html">CVE-2024-50255</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50259.html">CVE-2024-50259</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50261.html">CVE-2024-50261</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50264.html">CVE-2024-50264</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50265.html">CVE-2024-50265</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50267.html">CVE-2024-50267</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50268.html">CVE-2024-50268</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50269.html">CVE-2024-50269</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50271.html">CVE-2024-50271</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50273.html">CVE-2024-50273</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50274.html">CVE-2024-50274</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50279.html">CVE-2024-50279</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50282.html">CVE-2024-50282</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50287.html">CVE-2024-50287</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50289.html">CVE-2024-50289</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">CVE-2024-50290</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50292.html">CVE-2024-50292</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50295.html">CVE-2024-50295</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50298.html">CVE-2024-50298</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50301.html">CVE-2024-50301</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50302.html">CVE-2024-50302</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53052.html">CVE-2024-53052</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53058.html">CVE-2024-53058</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53059.html">CVE-2024-53059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53060.html">CVE-2024-53060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53061.html">CVE-2024-53061</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">CVE-2024-53063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53066.html">CVE-2024-53066</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53068.html">CVE-2024-53068</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53079.html">CVE-2024-53079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53085.html">CVE-2024-53085</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53088.html">CVE-2024-53088</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53104.html">CVE-2024-53104</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53110.html">CVE-2024-53110</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47594</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47594</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48674</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48674</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48674</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48979</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48982</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48983</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48983</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48989</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48990</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52915</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52915</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52917</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52917</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52917</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52918</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52918</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52918</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26782</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35888</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35888</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35937</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36484</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36886</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36886</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36953</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36954</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38577</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38577</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38589</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38615</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40997</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40997</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41023</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41023</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41049</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41049</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42131</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43817</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43897</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44932</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44964</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44995</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46802</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46804</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46805</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46807</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46807</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46807</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46810</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46812</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46819</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46821</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46821</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46835</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46835</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46842</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46842</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46853</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46859</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46864</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46871</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47663</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47665</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47667</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47669</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47670</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47671</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47671</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47682</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47682</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47682</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47693</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47695</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47695</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47695</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47696</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47696</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47696</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47697</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47697</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47697</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47698</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47698</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47698</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47699</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47709</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47709</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47709</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47712</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47712</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47713</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47713</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47718</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47718</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47723</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47723</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47723</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47728</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47728</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47735</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47737</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47737</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47737</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47742</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47742</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47742</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47745</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47745</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47745</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47749</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47756</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47756</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47756</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47757</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47757</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47757</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49851</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49852</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49861</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49863</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49870</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49870</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49870</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49871</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49875</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49875</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49875</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49877</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49877</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49877</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49879</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49879</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49879</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49891</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49891</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49891</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49900</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49907</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49935</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49938</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49945</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49945</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49947</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49947</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49950</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49950</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49957</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49957</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49963</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49963</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49965</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49965</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49966</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49966</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49981</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49983</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49983</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49985</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49985</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50007</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50007</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50007</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50008</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50008</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50008</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50013</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50017</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50025</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50025</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50026</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50026</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50031</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50031</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50044</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50062</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50062</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50074</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50074</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50077</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50077</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50078</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50082</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50082</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50093</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50095</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50096</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50098</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50098</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50099</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50099</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50103</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50103</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50108</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50108</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50110</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50131</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50155</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50155</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50167</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50167</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50186</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50186</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50187</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50187</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50188</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50188</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50189</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50189</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50192</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50192</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50194</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50194</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50195</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50195</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50196</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50196</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50198</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50198</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50201</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50201</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50215</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50215</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50218</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50249</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50249</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50259</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50259</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50259</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50265</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50265</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50268</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50268</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50269</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50269</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50271</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50271</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50273</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50273</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50274</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50274</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50279</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50279</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50282</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50282</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50287</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50287</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50289</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50292</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50295</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50298</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50298</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50301</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50301</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50302</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50302</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53052</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53052</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53058</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53059</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53060</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53061</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53061</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53066</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53068</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53068</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53079</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53085</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53085</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53088</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53088</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53104</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53104</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">openSUSE Leap
Micro 5.5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 15-SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.5</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

<li class="list-group-item">SUSE Real
Time Module 15-SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 230 vulnerabilities and has 33 security
fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
(bsc#1226560).</li>
<li>CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
(bsc#1231959).</li>
<li>CVE-2024-26782: mptcp: fix double-free on socket dismantle
(bsc#1222590).</li>
<li>CVE-2024-26906: Fixed invalid vsyscall page read for
copy_from_kernel_nofault() (bsc#1223202).</li>
<li>CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).</li>
<li>CVE-2024-35888: erspan: make sure erspan_base_hdr is present in
skb-&gt;head (bsc#1224518).</li>
<li>CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
(bsc#1224526).</li>
<li>CVE-2024-36883: net: fix out-of-bounds access in ops_init
(bsc#1225725).</li>
<li>CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).</li>
<li>CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV
sockets (bsc#1225742).</li>
<li>CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).</li>
<li>CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).</li>
<li>CVE-2024-38615: cpufreq: exit() callback is optional
(bsc#1226592).</li>
<li>CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
(bsc#1227853).</li>
<li>CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).</li>
<li>CVE-2024-44932: idpf: fix UAFs when destroying the queues
(bsc#1229808).</li>
<li>CVE-2024-44964: idpf: fix memory leaks and crashes while performing a
soft reset (bsc#1230220).</li>
<li>CVE-2024-44995: net: hns3: fix a deadlock problem when config TC
during resetting (bsc#1230231).</li>
<li>CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init()
(bsc#1230558).</li>
<li>CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).</li>
<li>CVE-2024-47679: vfs: fix race between evice_inodes() and
find_inode()&amp;iput() (bsc#1231930).</li>
<li>CVE-2024-47701: ext4: avoid OOB when system.data xattr changes
underneath the filesystem (bsc#1231920).</li>
<li>CVE-2024-47745: mm: call the security_mmap_file() LSM hook in
remap_file_pages() (bsc#1232135).</li>
<li>CVE-2024-47757: nilfs2: fix potential oob read in
nilfs_btree_check_delete() (bsc#1232187).</li>
<li>CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to
start a new trasacntion (bsc#1232272).</li>
<li>CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).</li>
<li>CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver
core (bsc#1232224)</li>
<li>CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).</li>
<li>CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).</li>
<li>CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect
(bsc#1232159).</li>
<li>CVE-2024-49968: ext4: filesystems without casefold feature cannot be
mounted with siphash (bsc#1232264).</li>
<li>CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to
avoid double-free (bsc#1232096).</li>
<li>CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu
module unload (bsc#1232483).</li>
<li>CVE-2024-50009: cpufreq: amd-pstate: add check for
cpufreq_cpu_get&#x27;s return value (bsc#1232318).</li>
<li>CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
(bsc#1232520).</li>
<li>CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).</li>
<li>CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).</li>
<li>CVE-2024-50093: thermal: intel: int340x: processor: Fix warning
during module unload (bsc#1232877).</li>
<li>CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut
down (bsc#1232881).</li>
<li>CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON
too (bsc#1232884).</li>
<li>CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).</li>
<li>CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from
memory (bsc#1232919).</li>
<li>CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout
(bsc#1232928).</li>
<li>CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).</li>
<li>CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy
(bsc#1232905).</li>
<li>CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
vbva_mouse_pointer_shape (bsc#1232890).</li>
<li>CVE-2024-50135: nvme-pci: fix race condition between reset and
nvme_dev_disable() (bsc#1232888).</li>
<li>CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf
(bsc#1232935).</li>
<li>CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback
failure (bsc#1233056).</li>
<li>CVE-2024-50147: net/mlx5: Fix command bitmask initialization
(bsc#1233067).</li>
<li>CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).</li>
<li>CVE-2024-50154: tcp/dccp: Do not use timer_pending() in
reqsk_queue_unlink() (bsc#1233070).</li>
<li>CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).</li>
<li>CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).</li>
<li>CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set
direct map (bsc#1233129).</li>
<li>CVE-2024-50184: virtio_pmem: Check device status before requesting
flush (bsc#1233135).</li>
<li>CVE-2024-50186: net: explicitly clear the sk pointer, when
pf-&gt;create fails (bsc#1233110).</li>
<li>CVE-2024-50188: net: phy: dp83869: fix memory corruption when
enabling fiber (bsc#1233107).</li>
<li>CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).</li>
<li>CVE-2024-50195: posix-clock: Fix missing timespec64 check in
pc_clock_settime() (bsc#1233103).</li>
<li>CVE-2024-50196: pinctrl: ocelot: fix system hang on level based
interrupts (bsc#1233113).</li>
<li>CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).</li>
<li>CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL
pages (bsc#1233117).</li>
<li>CVE-2024-50229: nilfs2: fix potential deadlock with newly created
symlinks (bsc#1233205).</li>
<li>CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of
checked flag (bsc#1233206).</li>
<li>CVE-2024-50259: netdevsim: Add trailing zero to terminate the string
in nsim_nexthop_bucket_activity_write() (bsc#1233214).</li>
<li>CVE-2024-50261: macsec: Fix use-after-free while sending the
offloading packet (bsc#1233253).</li>
<li>CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk-&gt;trans (bsc#1233453).</li>
<li>CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug
printk (bsc#1233456).</li>
<li>CVE-2024-50271: signal: restore the override_rlimit logic
(bsc#1233460).</li>
<li>CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting
it from the list (bsc#1233462).</li>
<li>CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).</li>
<li>CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty
bitset when resizing (bsc#1233468).</li>
<li>CVE-2024-50289: media: av7110: fix a spectre vulnerability
(bsc#1233478).</li>
<li>CVE-2024-50295: net: arc: fix the device for
dma_map_single/dma_unmap_single (bsc#1233484).</li>
<li>CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).</li>
<li>CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT
start write (bsc#1233548).</li>
<li>CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for
non-paged SKB data (bsc#1233552).</li>
<li>CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows
(bsc#1233555).</li>
<li>CVE-2024-53063: media: dvbdev: prevent the risk of out of memory
access (bsc#1233557).</li>
<li>CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
scmi_bus_notifier() (bsc#1233561).</li>
<li>CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).</li>
<li>CVE-2024-53088: i40e: fix race condition by adding filter&#x27;s
intermediate sync state (bsc#1233580).</li>
<li>CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).</li>
<li>CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Drop OCFS2 patch causing a regression (bsc#1233255)</li>
<li>Fix regression on AMDGPU driver (bsc#1233134)</li>
<li>Removed the duplicated check of static_assert(sizeof(struct
work_struct) &gt;= sizeof(struct rcu_head)).</li>
<li>Removed unnecessary white-space change in
kernel/bpf/syscall.c</li>
<li>Revert &quot;cgroup: Fix memory leak caused by missing
cgroup_bpf_offline&quot; (bsc#1234108).</li>
<li>Revert &quot;ixgbe: Manual AN-37 for troublesome link partners
for X550 SFI&quot; (git-fixes).</li>
<li>Revert &quot;mmc: dw_mmc: Fix IDMAC operation with pages bigger
than 4K&quot; (git-fixes).</li>
<li>Revert &quot;usb: gadget: composite: fix OS descriptors w_value
logic&quot; (git-fixes).</li>
<li>Update config files (bsc#1218644).</li>
<li>Update config files. Enabled IDPF for ARM64 (bsc#1221309)</li>
<li>acpi: CPPC: Fix _CPC register setting issue (git-fixes).</li>
<li>acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).</li>
<li>acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial
lid detection issue (stable-fixes).</li>
<li>acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[]
(stable-fixes).</li>
<li>ad7780: fix division by zero in ad7780_write_raw()
(git-fixes).</li>
<li>adapt same struct naming as similar kABI workaround in SLE15-SP6
(prefixed with &quot;suse_&quot; to make it more obvious its a downstream thing.</li>
<li>add bugreference to a hv_netvsc patch (bsc#1232413).</li>
<li>add commit message for the kABI patch</li>
<li>alsa: 6fire: Release resources at card release
(git-fixes).</li>
<li>alsa: ac97: bus: Fix the mistake in the comment
(git-fixes).</li>
<li>alsa: caiaq: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>alsa: firewire-lib: fix return value on fail in amdtp_tscm_init()
(git-fixes).</li>
<li>alsa: hda/realtek - Fixed Clevo platform headset Mic issue
(stable-fixes).</li>
<li>alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593
(stable-fixes).</li>
<li>alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3
(stable-fixes).</li>
<li>alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1
(stable-fixes).</li>
<li>alsa: hda/realtek: Limit internal Mic boost on Dell platform
(stable-fixes).</li>
<li>alsa: hda/realtek: Update ALC225 depop procedure
(git-fixes).</li>
<li>alsa: hda/realtek: Update ALC256 depop procedure
(git-fixes).</li>
<li>alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10
(stable-fixes).</li>
<li>alsa: us122l: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>alsa: usb-audio: Add quirk for HP 320 FHD Webcam
(stable-fixes).</li>
<li>alsa: usb-audio: Add quirks for Dell WD19 dock
(stable-fixes).</li>
<li>alsa: usx2y: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>amd-pstate: Set min_perf to nominal_perf for active mode performance
gov (git-fixes).</li>
<li>arm64/sve: Discard stale CPU state when handling SVE traps
(git-fixes)</li>
<li>arm64: Force position-independent veneers (git-fixes).</li>
<li>arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).</li>
<li>arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG
(git-fixes)</li>
<li>arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint
(git-fixes)</li>
<li>arm64: smccc: replace custom COUNT_ARGS() &amp; CONCATENATE()
(git-fixes)</li>
<li>arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled
(git-fixes)</li>
<li>arm64:uprobe fix the uprobe SWBP_INSN in big-endian
(git-fixes)</li>
<li>asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry
(git-fixes).</li>
<li>asoc: codecs: Fix atomicity violation in
snd_soc_component_get_drvdata() (git-fixes).</li>
<li>asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).</li>
<li>asoc: cs42l51: Fix some error handling paths in cs42l51_probe()
(git-fixes).</li>
<li>asoc: fsl_sai: Enable &#x27;FIFO continue on error&#x27;
FCONT bit (stable-fixes).</li>
<li>asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string
(stable-fixes).</li>
<li>asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
(git-fixes).</li>
<li>blk-throttle: Fix io statistics for cgroup v1
(bsc#1233528).</li>
<li>block: Avoid leaking hctx-&gt;nr_active counter on batched
completion (bsc#1231923).</li>
<li>bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
(git-fixes).</li>
<li>bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs
(git-fixes).</li>
<li>bnxt_en: Fix the PCI-AER routines (git-fixes).</li>
<li>bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters()
(git-fixes).</li>
<li>bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is
down (git-fixes).</li>
<li>bnxt_en: Reset PTP tx_avail after possible firmware reset
(git-fixes).</li>
<li>bnxt_en: Restore PTP tx_avail count in case of skb_pad() error
(git-fixes).</li>
<li>bnxt_en: Wait for FLR to complete during probe
(git-fixes).</li>
<li>bnxt_en: refactor reset close code (git-fixes).</li>
<li>can: c_can: c_can_handle_bus_err(): update statistics if skb
allocation fails (git-fixes).</li>
<li>can: c_can: fix {rx,tx}_errors statistics (git-fixes).</li>
<li>can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors
statistics (git-fixes).</li>
<li>can: j1939: j1939_session_new(): fix skb reference counting
(git-fixes).</li>
<li>can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf
is NULL (git-fixes).</li>
<li>can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>cgroup/bpf: only cgroup v2 can be attached by bpf programs
(bsc#1234108).</li>
<li>chtls: fix tp-&gt;rcv_tstamp initialization
(git-fixes).</li>
<li>comedi: Flush partial mappings in error case (git-fixes).</li>
<li>crypto: bcm - add error check in the ahash_hmac_init function
(git-fixes).</li>
<li>crypto: caam - Fix the pointer passed to caam_qi_shutdown()
(git-fixes).</li>
<li>crypto: caam - add error check to caam_rsa_set_priv_key_form
(git-fixes).</li>
<li>crypto: cavium - Fix an error handling path in cpt_ucode_load_fw()
(git-fixes).</li>
<li>crypto: cavium - Fix the if condition to exit loop after timeout
(git-fixes).</li>
<li>crypto: inside-secure - Fix the return value of
safexcel_xcbcmac_cra_init() (git-fixes).</li>
<li>crypto: x86/aegis128 - access 32-bit arguments as 32-bit
(git-fixes).</li>
<li>cxgb4: Properly lock TX queue for the selftest
(git-fixes).</li>
<li>cxgb4: add forgotten u64 ivlan cast before shift
(git-fixes).</li>
<li>cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function
(git-fixes).</li>
<li>drivers: net: prevent tun_build_skb() to exceed the packet size limit
(git-fixes).</li>
<li>drm/amd: Fix initialization mistake for NBIO 7.7.0
(stable-fixes).</li>
<li>drm/amdgpu: Adjust debugfs eviction and IB access permissions
(stable-fixes).</li>
<li>drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
(stable-fixes).</li>
<li>drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
(git-fixes).</li>
<li>drm/bridge: anx7625: Drop EDID cache on bridge power off
(git-fixes).</li>
<li>drm/bridge: tc358767: Fix link properties discovery
(git-fixes).</li>
<li>drm/bridge: tc358768: Fix DSI command tx (git-fixes).</li>
<li>drm/etnaviv: Request pages from DMA32 zone on addressing_limited
(git-fixes).</li>
<li>drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused
(git-fixes).</li>
<li>drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>drm/msm/dpu: cast crtc_clk calculation to u64 in
_dpu_core_perf_calc_clk() (git-fixes).</li>
<li>drm/omap: Fix locking in omap_gem_new_dmabuf()
(git-fixes).</li>
<li>drm/omap: Fix possible NULL dereference (git-fixes).</li>
<li>drm/panfrost: Remove unused id_mask from struct panfrost_model
(git-fixes).</li>
<li>drm/rockchip: vop: Fix a dereferenced before check warning
(git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers
(git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).</li>
<li>drm/v3d: Address race-condition in MMU flush (git-fixes).</li>
<li>drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape
with real VLA (stable-fixes).</li>
<li>drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).</li>
<li>drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer
(git-fixes).</li>
<li>drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function
(git-fixes).</li>
<li>drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).</li>
<li>e1000e: Fix S0ix residency on corporate systems
(git-fixes).</li>
<li>efi/memattr: Ignore table if the size is clearly bogus
(bsc#1231465).</li>
<li>eth: bnxt: fix counting packets discarded due to OOM and netpoll
(git-fixes).</li>
<li>firmware: google: Unregister driver_info on failure
(git-fixes).</li>
<li>genirq/msi: Fix off-by-one error in msi_domain_alloc()
(git-fixes).</li>
<li>goldfish: Fix unused const variable
&#x27;goldfish_pipe_acpi_match&#x27; (git-fixes).</li>
<li>gve: Fix XDP TX completion handling when counters overflow
(git-fixes).</li>
<li>gve: Fix an edge case for TSO skb validity check
(git-fixes).</li>
<li>gve: Fix skb truesize underestimation (git-fixes).</li>
<li>gve: ignore nonrelevant GSO type bits when processing TSO headers
(git-fixes).</li>
<li>hid: core: zero-initialize the report buffer (git-fixes).</li>
<li>hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard
(stable-fixes).</li>
<li>hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad
(stable-fixes).</li>
<li>hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa
touchpad (stable-fixes).</li>
<li>hid: multitouch: Add support for B2402FVA track point
(stable-fixes).</li>
<li>hid: wacom: Defer calculation of resolution until resolution_code is
known (git-fixes).</li>
<li>hid: wacom: Interpret tilt data from Intuos Pro BT as signed values
(git-fixes).</li>
<li>hid: wacom: fix when get product name maybe null pointer
(git-fixes).</li>
<li>hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling
pointer (git-fixes).</li>
<li>hwmon: (tps23861) Fix reporting of negative temperatures
(git-fixes).</li>
<li>i3c: master: Fix miss free init_dyn_addr at
i3c_master_put_i3c_addrs() (git-fixes).</li>
<li>i40e: Fix XDP program unloading while removing the driver
(git-fixes).</li>
<li>i40e: Fix filter input checks to prevent config with invalid values
(git-fixes).</li>
<li>i40e: Fix waiting for queues of all VSIs to be disabled
(git-fixes).</li>
<li>i40e: Report MFS in decimal base instead of hex
(git-fixes).</li>
<li>i40e: Restore VF MSI-X state during PCI reset (git-fixes).</li>
<li>i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).</li>
<li>i40e: disable NAPI right after disabling irqs when handling xsk_pool
(git-fixes).</li>
<li>i40e: fix use-after-free in i40e_aqc_add_filters()
(git-fixes).</li>
<li>i40e: take into account XDP Tx queues when stopping rings
(git-fixes).</li>
<li>iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call
(git-fixes).</li>
<li>iavf: Fix TC config comparison with existing adapter TC config
(git-fixes).</li>
<li>iavf: Fix promiscuous mode configuration flow messages
(git-fixes).</li>
<li>iavf: Introduce new state machines for flow director
(git-fixes).</li>
<li>iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set
(git-fixes).</li>
<li>iavf: fix FDIR rule fields masks validation (git-fixes).</li>
<li>iavf: in iavf_down, disable queues when removing the driver
(git-fixes).</li>
<li>iavf: initialize waitqueues before starting watchdog_task
(git-fixes).</li>
<li>iavf: send VLAN offloading caps once after VFR
(git-fixes).</li>
<li>iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero
(git-fixes).</li>
<li>ibmvnic: Do partial reset on login failure (bsc#1233150).</li>
<li>ibmvnic: Enforce stronger sanity checks on login response
(bsc#1233150).</li>
<li>ibmvnic: Ensure login failure recovery is safe from other resets
(bsc#1233150).</li>
<li>ibmvnic: Handle DMA unmapping of login buffs in release functions
(bsc#1233150).</li>
<li>ibmvnic: Unmap DMA login rsp buffer on send login fail
(bsc#1233150).</li>
<li>ice: Block switchdev mode when ADQ is active and vice versa
(git-fixes).</li>
<li>ice: Fix NULL pointer deref during VF reset (git-fixes).</li>
<li>ice: Fix VSI list rule with ICE_SW_LKUP_LAST type
(git-fixes).</li>
<li>ice: Fix link_down_on_close message (git-fixes).</li>
<li>ice: Fix netif_is_ice() in Safe Mode (git-fixes).</li>
<li>ice: Interpret .set_channels() input differently
(git-fixes).</li>
<li>ice: Shut down VSI with &quot;link-down-on-close&quot;
enabled (git-fixes).</li>
<li>ice: avoid executing commands on other ports when driving sync
(git-fixes).</li>
<li>ice: change q_index variable type to s16 to store -1 value
(git-fixes).</li>
<li>ice: fix ICE_LAST_OFFSET formula (git-fixes).</li>
<li>ice: fix VLAN replay after reset (git-fixes).</li>
<li>ice: fix accounting for filters shared by multiple VSIs
(git-fixes).</li>
<li>ice: fix accounting if a VLAN already exists (git-fixes).</li>
<li>ice: fix over-shifted variable (git-fixes).</li>
<li>ice: fix receive buffer size miscalculation (git-fixes).</li>
<li>ice: ice_aq_check_events: fix off-by-one check when filling buffer
(git-fixes).</li>
<li>ice: reset first in crash dump kernels (git-fixes).</li>
<li>ice: respect netif readiness in AF_XDP ZC related ndo&#x27;s
(git-fixes).</li>
<li>ice: tc: allow zero flags in parsing tc flower
(git-fixes).</li>
<li>ice: virtchnl: stop pretending to support RSS over AQ or registers
(git-fixes).</li>
<li>idpf: Interpret .set_channels() input differently
(git-fixes).</li>
<li>idpf: avoid compiler introduced padding in virtchnl2_rss_key struct
(git-fixes).</li>
<li>idpf: avoid compiler padding in virtchnl2_ptype struct
(git-fixes).</li>
<li>idpf: disable local BH when scheduling napi for marker packets
(git-fixes).</li>
<li>idpf: distinguish vports by the dev_port attribute
(git-fixes).</li>
<li>idpf: do not enable NAPI and interrupts prior to allocating Rx
buffers (git-fixes).</li>
<li>idpf: fix UAFs when destroying the queues (git-fixes).</li>
<li>idpf: fix corrupted frames and skb leaks in singleq mode
(git-fixes).</li>
<li>idpf: fix memleak in vport interrupt configuration
(git-fixes).</li>
<li>idpf: fix memory leaks and crashes while performing a soft reset
(git-fixes).</li>
<li>igb: Always call igb_xdp_ring_update_tail() under Tx lock
(git-fixes).</li>
<li>igb: Fix missing time sync events (git-fixes).</li>
<li>igb: Fix not clearing TimeSync interrupts for 82580
(git-fixes).</li>
<li>igb: extend PTP timestamp adjustments to i211 (git-fixes).</li>
<li>igc: Check VLAN EtherType mask (git-fixes).</li>
<li>igc: Check VLAN TCI mask (git-fixes).</li>
<li>igc: Fix hicredit calculation (git-fixes).</li>
<li>igc: Fix missing time sync events (git-fixes).</li>
<li>igc: Remove temporary workaround (git-fixes).</li>
<li>igc: Report VLAN EtherType matching back to user
(git-fixes).</li>
<li>igc: Unlock on error in igc_io_resume() (git-fixes).</li>
<li>iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()
(git-fixes).</li>
<li>iio: adc: ad7606: Fix typo in the driver name (git-fixes).</li>
<li>iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer
(git-fixes).</li>
<li>iio: light: al3010: Fix an error handling path in al3010_probe()
(git-fixes).</li>
<li>iio: light: veml6030: fix microlux value calculation
(git-fixes).</li>
<li>initramfs: avoid filename buffer overrun (bsc#1232436).</li>
<li>input: i8042 - add Ayaneo Kun to i8042 quirk table
(git-fixes).</li>
<li>input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table
(git-fixes).</li>
<li>input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk
table (git-fixes).</li>
<li>input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table
(git-fixes).</li>
<li>input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD
line (git-fixes).</li>
<li>irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack
(git-fixes).</li>
<li>irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1
(git-fixes).</li>
<li>ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa()
(git-fixes).</li>
<li>ixgbe: fix crash with empty VF macvlan list (git-fixes).</li>
<li>ixgbe: fix timestamp configuration code (git-fixes).</li>
<li>ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able
(git-fixes).</li>
<li>kABI: Restore exported __arm_smccc_sve_check (git-fixes)</li>
<li>kernel-binary: Enable livepatch package only when livepatch is
enabled Otherwise the filelist may be empty failing the build (bsc#1218644).</li>
<li>kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h
(git-fixes)</li>
<li>kexec: fix a memory leak in crash_shrink_memory()
(git-fixes).</li>
<li>kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).</li>
<li>mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING
(git-fixes).</li>
<li>media: adv7604: prevent underflow condition when reporting colorspace
(git-fixes).</li>
<li>media: cx24116: prevent overflows on SNR calculus
(git-fixes).</li>
<li>media: dvb-usb-v2: af9035: Fix null-ptr-deref in
af9035_i2c_master_xfer (stable-fixes).</li>
<li>media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).</li>
<li>media: dvb_frontend: do not play tricks with underflow values
(git-fixes).</li>
<li>media: dvbdev: prevent the risk of out of memory access
(git-fixes).</li>
<li>media: pci: cx23885: check cx23885_vdev_init() return
(stable-fixes).</li>
<li>media: pulse8-cec: fix data timestamp at pulse8_setup()
(git-fixes).</li>
<li>media: stb0899_algo: initialize cfr before using it
(git-fixes).</li>
<li>media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl()
(git-fixes).</li>
<li>media: v4l2-tpg: prevent the risk of a division by zero
(git-fixes).</li>
<li>mei: use kvmalloc for read buffer (git-fixes).</li>
<li>misc: apds990x: Fix missing pm_runtime_disable()
(git-fixes).</li>
<li>mm/hugetlb: fix nodes huge page allocation when there are surplus
pages (bsc#1234012).</li>
<li>mm/memory: add non-anonymous page check in the copy_present_page()
(bsc#1231646).</li>
<li>modpost: remove incorrect code in do_eisa_entry()
(git-fixes).</li>
<li>net/mlx5: Add missing masks and QoS bit masks for scheduling elements
(git-fixes).</li>
<li>net/mlx5: Added cond_resched() to crdump collection
(git-fixes).</li>
<li>net/mlx5: Allow 0 for total host VFs (git-fixes).</li>
<li>net/mlx5: Correctly compare pkt reformat ids (git-fixes).</li>
<li>net/mlx5: DR, Can&#x27;t go to uplink vport on RX rule
(git-fixes).</li>
<li>net/mlx5: DR, Use the right GVMI number for drop action
(git-fixes).</li>
<li>net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
(git-fixes).</li>
<li>net/mlx5: Drain health before unregistering devlink
(git-fixes).</li>
<li>net/mlx5: E-switch, register event handler before arming the event
(git-fixes).</li>
<li>net/mlx5: Explicitly set scheduling element and TSAR type
(git-fixes).</li>
<li>net/mlx5: Fix fw tracer first block check (git-fixes).</li>
<li>net/mlx5: Handle fw tracer change ownership event based on MTRC
(git-fixes).</li>
<li>net/mlx5: LAG, Check correct bucket when modifying LAG
(git-fixes).</li>
<li>net/mlx5: Lag, do bond only if slaves agree on roce state
(git-fixes).</li>
<li>net/mlx5: Lag, do not use the hardcoded value of the first port
(git-fixes).</li>
<li>net/mlx5: Lag, restore buckets number to default after hash LAG
deactivation (git-fixes).</li>
<li>net/mlx5: Skip clock update work when device is in error state
(git-fixes).</li>
<li>net/mlx5: Unregister notifier on eswitch init failure
(git-fixes).</li>
<li>net/mlx5: Update the list of the PCI supported devices
(git-fixes).</li>
<li>net/mlx5: Use RMW accessors for changing LNKCTL
(git-fixes).</li>
<li>net/mlx5: Use mlx5 device constant for selecting CQ period mode for
ASO (git-fixes).</li>
<li>net/mlx5: Use recovery timeout on sync reset flow
(git-fixes).</li>
<li>net/mlx5: fix potential memory leak in mlx5e_init_rep_rx
(git-fixes).</li>
<li>net/mlx5: fs, lock FTE when checking if active
(git-fixes).</li>
<li>net/mlx5e: Add a check for the return value from
mlx5_port_set_eth_ptys (git-fixes).</li>
<li>net/mlx5e: Add missing link modes to ptys2ethtool_map
(git-fixes).</li>
<li>net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup()
(git-fixes).</li>
<li>net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp
(git-fixes).</li>
<li>net/mlx5e: Allow software parsing when IPsec crypto is enabled
(git-fixes).</li>
<li>net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
(git-fixes).</li>
<li>net/mlx5e: Change the warning when ignore_flow_level is not supported
(git-fixes).</li>
<li>net/mlx5e: Check return value of snprintf writing to fw_version
buffer (git-fixes).</li>
<li>net/mlx5e: Check return value of snprintf writing to fw_version
buffer for representors (git-fixes).</li>
<li>net/mlx5e: Correct snprintf truncation handling for fw_version buffer
(git-fixes).</li>
<li>net/mlx5e: Correct snprintf truncation handling for fw_version buffer
used by representors (git-fixes).</li>
<li>net/mlx5e: Correctly report errors for ethtool rx flows
(git-fixes).</li>
<li>net/mlx5e: Do not offload internal port if filter device is out
device (git-fixes).</li>
<li>net/mlx5e: Fix IPsec tunnel mode offload feature check
(git-fixes).</li>
<li>net/mlx5e: Fix UDP GSO for encapsulated packets
(git-fixes).</li>
<li>net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is
set (git-fixes).</li>
<li>net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).</li>
<li>net/mlx5e: Fix pedit endianness (git-fixes).</li>
<li>net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work
(git-fixes).</li>
<li>net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list()
(git-fixes).</li>
<li>net/mlx5e: HTB, Fix inconsistencies with QoS SQs number
(git-fixes).</li>
<li>net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
(git-fixes).</li>
<li>net/mlx5e: Reduce the size of icosq_str (git-fixes).</li>
<li>net/mlx5e: Take state lock during tx timeout reporter
(git-fixes).</li>
<li>net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting
buffer exhaustion (git-fixes).</li>
<li>net/mlx5e: fix a potential double-free in fs_udp_create_groups
(git-fixes).</li>
<li>net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups
(git-fixes).</li>
<li>net/mlx5e: fix double free of encap_header (git-fixes).</li>
<li>net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer()
(git-fixes).</li>
<li>net/mlx5e: kTLS, Fix incorrect page refcounting
(git-fixes).</li>
<li>net: ena: Fix potential sign extension issue (git-fixes).</li>
<li>net: ena: Remove ena_select_queue (git-fixes).</li>
<li>net: ena: Wrong missing IO completions check order
(git-fixes).</li>
<li>net: qede: use return from qede_parse_flow_attr() for flow_spec
(git-fixes).</li>
<li>net: relax socket state check at accept time (git-fixes).</li>
<li>net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY
device (git-fixes).</li>
<li>net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).</li>
<li>net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition
(stable-fixes).</li>
<li>net: usb: usbnet: fix race in probe failure (git-fixes).</li>
<li>nfs: Fix KMSAN warning in decode_getfattr_attrs()
(git-fixes).</li>
<li>nvme-fabrics: fix kernel crash while shutting down controller
(git-fixes).</li>
<li>nvme-pci: fix freeing of the HMB descriptor table
(git-fixes).</li>
<li>nvme-pci: reverse request order in nvme_queue_rqs
(git-fixes).</li>
<li>ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).</li>
<li>pci: Add T_PVPERL macro (git-fixes).</li>
<li>pci: Fix reset_method_store() memory leak (git-fixes).</li>
<li>pci: endpoint: Clear secondary (not primary) EPC in
pci_epc_remove_epf() (git-fixes).</li>
<li>pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS
milliseconds (git-fixes).</li>
<li>pci: keystone: Add link up check to ks_pcie_other_map_bus()
(git-fixes).</li>
<li>pci: keystone: Set mode as Root Complex for
&quot;ti,keystone-pcie&quot; compatible (git-fixes).</li>
<li>pci: rockchip-ep: Fix address translation unit programming
(git-fixes).</li>
<li>phy: tegra: xusb: Add error pointer check in xusb.c
(git-fixes).</li>
<li>platform/chrome: cros_ec_typec: fix missing fwnode reference
decrement (git-fixes).</li>
<li>platform/surface: aggregator: Fix warning when controller is
destroyed in probe (git-fixes).</li>
<li>platform/x86: dell-sysman: add support for alienware products
(stable-fixes).</li>
<li>platform/x86: dell-wmi: Ignore suspend notifications
(stable-fixes).</li>
<li>posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone
(bsc#1234098). </li>
<li>power: supply: bq27xxx: Fix registers of bq27426
(git-fixes).</li>
<li>power: supply: core: Remove might_sleep() from power_supply_put()
(git-fixes).</li>
<li>powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal
(bsc#1194869).</li>
<li>powerpc/atomic: Use YZ constraints for DS-form instructions
(bsc#1194869).</li>
<li>powerpc/kexec: Fix return of uninitialized variable
(bsc#1194869).</li>
<li>powerpc/mm/fault: Fix kfence page fault reporting
(bsc#1194869).</li>
<li>powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).</li>
<li>powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).</li>
<li>powerpc/powernv: Free name on error in opal_event_init()
(bsc#1194869).</li>
<li>powerpc/pseries: Fix KVM guest detection for disabling hardlockup
detector (bsc#1194869).</li>
<li>powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore
(bsc#1194869).</li>
<li>powerpc: remove GCC version check for UPD_CONSTR
(bsc#1194869).</li>
<li>qed: avoid truncating work queue length (git-fixes).</li>
<li>rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey
(git-fixes)</li>
<li>rdma/hns: Add clear_hem return value to log (git-fixes)</li>
<li>rdma/hns: Add mutex_destroy() (git-fixes)</li>
<li>rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()
(git-fixes)</li>
<li>rdma/hns: Fix an AEQE overflow error caused by untimely update of
eq_db_ci (git-fixes)</li>
<li>rdma/hns: Fix cpu stuck caused by printings during reset
(git-fixes)</li>
<li>rdma/hns: Fix different dgids mapping to the same dip_idx
(git-fixes)</li>
<li>rdma/hns: Fix flush cqe error when racing with destroy qp
(git-fixes)</li>
<li>rdma/hns: Fix out-of-order issue of requester when setting FENCE
(git-fixes)</li>
<li>rdma/hns: Remove unnecessary QP type checks (git-fixes)</li>
<li>rdma/hns: Use dev_<em> printings in hem code instead of
ibdev_</em> (git-fixes)</li>
<li>rdma/hns: Use macro instead of magic number (git-fixes)</li>
<li>rdma/mlx5: Move events notifier registration to be after device
registration (git-fixes)</li>
<li>rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled
(git-fixes).</li>
<li>rdma/rxe: Fix the qp flush warnings in req (git-fixes)</li>
<li>rdma/rxe: Set queue pair cur_qp_state when being queried
(git-fixes)</li>
<li>rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer
needed by the new klp-convert implementation. (bsc#1218644)</li>
<li>rtc: ab-eoz9: do not fail temperature reads on undervoltage
notification (git-fixes).</li>
<li>rtc: abx80x: Fix WDT bit position of the status register
(git-fixes).</li>
<li>rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
(git-fixes).</li>
<li>rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>scsi: lpfc: Add cleanup of nvmels_wq after HBA reset
(bsc#1233241).</li>
<li>scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241).</li>
<li>scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241).</li>
<li>scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting
follow up FDMI (bsc#1233241).</li>
<li>scsi: lpfc: Check devloss callbk done flag for potential stale NDLP
ptrs (bsc#1233241).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.6 patches
(bsc#1233241).</li>
<li>scsi: lpfc: Modify CGN warning signal calculation based on EDC
response (bsc#1233241).</li>
<li>scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo
callback (bsc#1233241).</li>
<li>scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).</li>
<li>scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE
before BSG flag (bsc#1233241).</li>
<li>scsi: scsi_transport_fc: Allow setting rport state to current state
(git-fixes).</li>
<li>scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer
(git-fixes).</li>
<li>security/keys: fix slab-out-of-bounds in key_task_permission
(git-fixes).</li>
<li>serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).</li>
<li>sfc: Check firmware supports Ethernet PTP filter
(git-fixes).</li>
<li>sfc: do not unregister flow_indr if it was never registered
(git-fixes).</li>
<li>sfc: fix a double-free bug in efx_probe_filters
(git-fixes).</li>
<li>signal: Replace BUG_ON()s (bsc#1234093).</li>
<li>spi: Fix acpi deferred irq probe (git-fixes).</li>
<li>spi: atmel-quadspi: Fix register name in verbose logging function
(git-fixes).</li>
<li>staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).</li>
<li>thermal: core: Initialize thermal zones before registering them
(git-fixes).</li>
<li>thermal: intel: int340x: processor: Fix warning during module unload
(git-fixes).</li>
<li>tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555
git-fixes).</li>
<li>tun: Fix xdp_rxq_info&#x27;s queue_index when detaching
(git-fixes).</li>
<li>tun: prevent negative ifindex (git-fixes).</li>
<li>ucounts: fix counter leak in inc_rlimit_get_ucounts()
(bsc#1233460).</li>
<li>usb: chaoskey: Fix possible deadlock chaoskey_list_lock
(git-fixes).</li>
<li>usb: chaoskey: fail open after removal (git-fixes).</li>
<li>usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO
resizing logic (git-fixes).</li>
<li>usb: dwc3: gadget: Fix checking for number of TRBs left
(git-fixes).</li>
<li>usb: dwc3: gadget: Fix looping of queued SG entries
(git-fixes).</li>
<li>usb: ehci-spear: fix call balance of sehci clk handling routines
(git-fixes).</li>
<li>usb: musb: sunxi: Fix accessing an released usb phy
(git-fixes).</li>
<li>usb: phy: Fix API devm_usb_put_phy() can not release the phy
(git-fixes).</li>
<li>usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info()
(git-fixes).</li>
<li>usb: serial: io_edgeport: fix use after free in debug printk
(git-fixes).</li>
<li>usb: serial: option: add Fibocom FG132 0x0112 composition
(stable-fixes).</li>
<li>usb: serial: option: add Quectel RG650V (stable-fixes).</li>
<li>usb: serial: qcserial: add support for Sierra Wireless EM86xx
(stable-fixes).</li>
<li>usb: typec: fix potential out of bounds in
ucsi_ccg_update_set_new_cam_cmd() (git-fixes).</li>
<li>usb: typec: fix unreleased fwnode_handle in
typec_port_register_altmodes() (git-fixes).</li>
<li>usb: using mutex lock and supporting O_NONBLOCK flag in
iowarrior_read() (git-fixes).</li>
<li>usb: xhci: Fix TD invalidation under pending Set TR Dequeue
(git-fixes).</li>
<li>usb: yurex: make waiting on yurex_write interruptible
(git-fixes).</li>
<li>usbip: tools: Fix detach_port() invalid port error path
(git-fixes).</li>
<li>vdpa/mlx5: preserve CVQ vringh index (git-fixes).</li>
<li>watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).</li>
<li>watchdog: rti: of: honor timeout-sec property (git-fixes).</li>
<li>wifi: ath10k: Fix memory leak in management tx
(git-fixes).</li>
<li>wifi: ath10k: fix invalid VHT parameters in
supported_vht_mcs_rate_nss1 (git-fixes).</li>
<li>wifi: ath10k: fix invalid VHT parameters in
supported_vht_mcs_rate_nss2 (git-fixes).</li>
<li>wifi: ath11k: Fix invalid ring usage in full monitor mode
(git-fixes).</li>
<li>wifi: ath9k: add range check for conn_rsp_epid in
htc_connect_service() (git-fixes).</li>
<li>wifi: brcm80211: BRCM_TRACING should depend on TRACING
(git-fixes).</li>
<li>wifi: iwlegacy: Clear stale interrupts before resuming device
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: Fix response handling in
iwl_mvm_send_recovery_cmd() (git-fixes).</li>
<li>wifi: iwlwifi: mvm: disconnect station vifs if recovery failed
(stable-fixes).</li>
<li>wifi: mac80211: do not pass a stopped vif to the driver in
.get_txpower (git-fixes).</li>
<li>wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys
(git-fixes).</li>
<li>wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).</li>
<li>wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>x86/kvm: fix is_stale_page_fault() (bsc#1221333).</li>
<li>xhci: Fix Link TRB DMA in command ring stopped completion event
(git-fixes).</li>
<li>xhci: Separate PORT and CAPs macros into dedicated file
(stable-fixes).</li>
<li>xhci: Use pm_runtime_get to prevent RPM on unsupported systems
(git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Real Time Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-RT-15-SP5-2024-4315=1</code>



</li>

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch SUSE-2024-4315=1
openSUSE-SLE-15.5-2024-4315=1</code>



</li>

<li class="list-group-item">
openSUSE Leap Micro 5.5


<br/>
<code>zypper in -t patch
openSUSE-Leap-Micro-5.5-2024-4315=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.5


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.5-2024-4315=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Live-Patching-15-SP5-2024-4315=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Real Time Module 15-SP5 (x86_64)
<ul>


<li>kernel-rt_debug-vdso-5.14.21-150500.13.79.1</li>


<li>kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-debugsource-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-debugsource-5.14.21-150500.13.79.1</li>


<li>cluster-md-kmp-rt-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-devel-5.14.21-150500.13.79.1</li>


<li>dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1</li>


<li>ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-vdso-5.14.21-150500.13.79.1</li>


<li>cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-syms-rt-5.14.21-150500.13.79.1</li>


<li>gfs2-kmp-rt-5.14.21-150500.13.79.1</li>


<li>kernel-rt-devel-5.14.21-150500.13.79.1</li>


<li>dlm-kmp-rt-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1</li>


<li>ocfs2-kmp-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>

<li>
SUSE Real Time Module 15-SP5 (noarch)
<ul>


<li>kernel-devel-rt-5.14.21-150500.13.79.1</li>


<li>kernel-source-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>

<li>
SUSE Real Time Module 15-SP5 (nosrc x86_64)
<ul>


<li>kernel-rt_debug-5.14.21-150500.13.79.1</li>


<li>kernel-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>



<li>
openSUSE Leap 15.5 (noarch)
<ul>


<li>kernel-devel-rt-5.14.21-150500.13.79.1</li>


<li>kernel-source-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (x86_64)
<ul>


<li>kernel-rt-extra-5.14.21-150500.13.79.1</li>


<li>reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-livepatch-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-vdso-5.14.21-150500.13.79.1</li>


<li>kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kselftests-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1</li>


<li>kernel-rt-debugsource-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-debugsource-5.14.21-150500.13.79.1</li>


<li>kernel-rt-optional-5.14.21-150500.13.79.1</li>


<li>kernel-rt-extra-debuginfo-5.14.21-150500.13.79.1</li>


<li>reiserfs-kmp-rt-5.14.21-150500.13.79.1</li>


<li>cluster-md-kmp-rt-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-devel-5.14.21-150500.13.79.1</li>


<li>dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1</li>


<li>kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1</li>


<li>gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1</li>


<li>ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-vdso-5.14.21-150500.13.79.1</li>


<li>cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1</li>


<li>gfs2-kmp-rt-5.14.21-150500.13.79.1</li>


<li>kernel-syms-rt-5.14.21-150500.13.79.1</li>


<li>kselftests-kmp-rt-5.14.21-150500.13.79.1</li>


<li>kernel-rt-optional-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-devel-5.14.21-150500.13.79.1</li>


<li>dlm-kmp-rt-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1</li>


<li>kernel-rt-livepatch-devel-5.14.21-150500.13.79.1</li>


<li>ocfs2-kmp-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (nosrc x86_64)
<ul>


<li>kernel-rt_debug-5.14.21-150500.13.79.1</li>


<li>kernel-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>



<li>
openSUSE Leap Micro 5.5 (nosrc x86_64)
<ul>


<li>kernel-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>

<li>
openSUSE Leap Micro 5.5 (x86_64)
<ul>


<li>kernel-rt-debugsource-5.14.21-150500.13.79.1</li>


<li>kernel-rt-debuginfo-5.14.21-150500.13.79.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
<ul>


<li>kernel-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.5 (x86_64)
<ul>


<li>kernel-rt-debugsource-5.14.21-150500.13.79.1</li>


<li>kernel-rt-debuginfo-5.14.21-150500.13.79.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.5 (noarch)
<ul>


<li>kernel-source-rt-5.14.21-150500.13.79.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
<ul>


<li>kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1</li>


<li>kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1</li>


<li>kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47594.html">https://www.suse.com/security/cve/CVE-2021-47594.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48674.html">https://www.suse.com/security/cve/CVE-2022-48674.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48979.html">https://www.suse.com/security/cve/CVE-2022-48979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48982.html">https://www.suse.com/security/cve/CVE-2022-48982.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48983.html">https://www.suse.com/security/cve/CVE-2022-48983.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48989.html">https://www.suse.com/security/cve/CVE-2022-48989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48990.html">https://www.suse.com/security/cve/CVE-2022-48990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52915.html">https://www.suse.com/security/cve/CVE-2023-52915.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52917.html">https://www.suse.com/security/cve/CVE-2023-52917.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52918.html">https://www.suse.com/security/cve/CVE-2023-52918.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52921.html">https://www.suse.com/security/cve/CVE-2023-52921.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52922.html">https://www.suse.com/security/cve/CVE-2023-52922.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26782.html">https://www.suse.com/security/cve/CVE-2024-26782.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26906.html">https://www.suse.com/security/cve/CVE-2024-26906.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26953.html">https://www.suse.com/security/cve/CVE-2024-26953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35888.html">https://www.suse.com/security/cve/CVE-2024-35888.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35937.html">https://www.suse.com/security/cve/CVE-2024-35937.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35980.html">https://www.suse.com/security/cve/CVE-2024-35980.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36484.html">https://www.suse.com/security/cve/CVE-2024-36484.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36883.html">https://www.suse.com/security/cve/CVE-2024-36883.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36886.html">https://www.suse.com/security/cve/CVE-2024-36886.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36905.html">https://www.suse.com/security/cve/CVE-2024-36905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36953.html">https://www.suse.com/security/cve/CVE-2024-36953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36954.html">https://www.suse.com/security/cve/CVE-2024-36954.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38577.html">https://www.suse.com/security/cve/CVE-2024-38577.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38589.html">https://www.suse.com/security/cve/CVE-2024-38589.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38615.html">https://www.suse.com/security/cve/CVE-2024-38615.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40997.html">https://www.suse.com/security/cve/CVE-2024-40997.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41023.html">https://www.suse.com/security/cve/CVE-2024-41023.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41049.html">https://www.suse.com/security/cve/CVE-2024-41049.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42131.html">https://www.suse.com/security/cve/CVE-2024-42131.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43817.html">https://www.suse.com/security/cve/CVE-2024-43817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43897.html">https://www.suse.com/security/cve/CVE-2024-43897.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44932.html">https://www.suse.com/security/cve/CVE-2024-44932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44964.html">https://www.suse.com/security/cve/CVE-2024-44964.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44995.html">https://www.suse.com/security/cve/CVE-2024-44995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46681.html">https://www.suse.com/security/cve/CVE-2024-46681.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46800.html">https://www.suse.com/security/cve/CVE-2024-46800.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46802.html">https://www.suse.com/security/cve/CVE-2024-46802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46804.html">https://www.suse.com/security/cve/CVE-2024-46804.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46805.html">https://www.suse.com/security/cve/CVE-2024-46805.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46807.html">https://www.suse.com/security/cve/CVE-2024-46807.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46810.html">https://www.suse.com/security/cve/CVE-2024-46810.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46812.html">https://www.suse.com/security/cve/CVE-2024-46812.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46819.html">https://www.suse.com/security/cve/CVE-2024-46819.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46821.html">https://www.suse.com/security/cve/CVE-2024-46821.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46835.html">https://www.suse.com/security/cve/CVE-2024-46835.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46842.html">https://www.suse.com/security/cve/CVE-2024-46842.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46853.html">https://www.suse.com/security/cve/CVE-2024-46853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46859.html">https://www.suse.com/security/cve/CVE-2024-46859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46864.html">https://www.suse.com/security/cve/CVE-2024-46864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46871.html">https://www.suse.com/security/cve/CVE-2024-46871.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47663.html">https://www.suse.com/security/cve/CVE-2024-47663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47665.html">https://www.suse.com/security/cve/CVE-2024-47665.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47667.html">https://www.suse.com/security/cve/CVE-2024-47667.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47669.html">https://www.suse.com/security/cve/CVE-2024-47669.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47670.html">https://www.suse.com/security/cve/CVE-2024-47670.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47671.html">https://www.suse.com/security/cve/CVE-2024-47671.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47679.html">https://www.suse.com/security/cve/CVE-2024-47679.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47682.html">https://www.suse.com/security/cve/CVE-2024-47682.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47693.html">https://www.suse.com/security/cve/CVE-2024-47693.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47695.html">https://www.suse.com/security/cve/CVE-2024-47695.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47696.html">https://www.suse.com/security/cve/CVE-2024-47696.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47697.html">https://www.suse.com/security/cve/CVE-2024-47697.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47698.html">https://www.suse.com/security/cve/CVE-2024-47698.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47699.html">https://www.suse.com/security/cve/CVE-2024-47699.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">https://www.suse.com/security/cve/CVE-2024-47701.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47709.html">https://www.suse.com/security/cve/CVE-2024-47709.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47712.html">https://www.suse.com/security/cve/CVE-2024-47712.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47713.html">https://www.suse.com/security/cve/CVE-2024-47713.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47718.html">https://www.suse.com/security/cve/CVE-2024-47718.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47723.html">https://www.suse.com/security/cve/CVE-2024-47723.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47728.html">https://www.suse.com/security/cve/CVE-2024-47728.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47735.html">https://www.suse.com/security/cve/CVE-2024-47735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47737.html">https://www.suse.com/security/cve/CVE-2024-47737.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47742.html">https://www.suse.com/security/cve/CVE-2024-47742.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47745.html">https://www.suse.com/security/cve/CVE-2024-47745.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47749.html">https://www.suse.com/security/cve/CVE-2024-47749.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47756.html">https://www.suse.com/security/cve/CVE-2024-47756.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47757.html">https://www.suse.com/security/cve/CVE-2024-47757.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49850.html">https://www.suse.com/security/cve/CVE-2024-49850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49851.html">https://www.suse.com/security/cve/CVE-2024-49851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49852.html">https://www.suse.com/security/cve/CVE-2024-49852.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49855.html">https://www.suse.com/security/cve/CVE-2024-49855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49861.html">https://www.suse.com/security/cve/CVE-2024-49861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49863.html">https://www.suse.com/security/cve/CVE-2024-49863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49868.html">https://www.suse.com/security/cve/CVE-2024-49868.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49870.html">https://www.suse.com/security/cve/CVE-2024-49870.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49871.html">https://www.suse.com/security/cve/CVE-2024-49871.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49875.html">https://www.suse.com/security/cve/CVE-2024-49875.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49877.html">https://www.suse.com/security/cve/CVE-2024-49877.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49879.html">https://www.suse.com/security/cve/CVE-2024-49879.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">https://www.suse.com/security/cve/CVE-2024-49884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49891.html">https://www.suse.com/security/cve/CVE-2024-49891.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49900.html">https://www.suse.com/security/cve/CVE-2024-49900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49902.html">https://www.suse.com/security/cve/CVE-2024-49902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49903.html">https://www.suse.com/security/cve/CVE-2024-49903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49905.html">https://www.suse.com/security/cve/CVE-2024-49905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49907.html">https://www.suse.com/security/cve/CVE-2024-49907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49908.html">https://www.suse.com/security/cve/CVE-2024-49908.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49921.html">https://www.suse.com/security/cve/CVE-2024-49921.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49924.html">https://www.suse.com/security/cve/CVE-2024-49924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49925.html">https://www.suse.com/security/cve/CVE-2024-49925.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49934.html">https://www.suse.com/security/cve/CVE-2024-49934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49935.html">https://www.suse.com/security/cve/CVE-2024-49935.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49938.html">https://www.suse.com/security/cve/CVE-2024-49938.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49945.html">https://www.suse.com/security/cve/CVE-2024-49945.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49947.html">https://www.suse.com/security/cve/CVE-2024-49947.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49950.html">https://www.suse.com/security/cve/CVE-2024-49950.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49957.html">https://www.suse.com/security/cve/CVE-2024-49957.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49963.html">https://www.suse.com/security/cve/CVE-2024-49963.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49965.html">https://www.suse.com/security/cve/CVE-2024-49965.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49966.html">https://www.suse.com/security/cve/CVE-2024-49966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49968.html">https://www.suse.com/security/cve/CVE-2024-49968.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49981.html">https://www.suse.com/security/cve/CVE-2024-49981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49983.html">https://www.suse.com/security/cve/CVE-2024-49983.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49985.html">https://www.suse.com/security/cve/CVE-2024-49985.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49989.html">https://www.suse.com/security/cve/CVE-2024-49989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50003.html">https://www.suse.com/security/cve/CVE-2024-50003.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50007.html">https://www.suse.com/security/cve/CVE-2024-50007.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50008.html">https://www.suse.com/security/cve/CVE-2024-50008.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50009.html">https://www.suse.com/security/cve/CVE-2024-50009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50013.html">https://www.suse.com/security/cve/CVE-2024-50013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50017.html">https://www.suse.com/security/cve/CVE-2024-50017.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50025.html">https://www.suse.com/security/cve/CVE-2024-50025.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50026.html">https://www.suse.com/security/cve/CVE-2024-50026.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50031.html">https://www.suse.com/security/cve/CVE-2024-50031.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50044.html">https://www.suse.com/security/cve/CVE-2024-50044.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50062.html">https://www.suse.com/security/cve/CVE-2024-50062.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50067.html">https://www.suse.com/security/cve/CVE-2024-50067.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50073.html">https://www.suse.com/security/cve/CVE-2024-50073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50074.html">https://www.suse.com/security/cve/CVE-2024-50074.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50077.html">https://www.suse.com/security/cve/CVE-2024-50077.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50078.html">https://www.suse.com/security/cve/CVE-2024-50078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50082.html">https://www.suse.com/security/cve/CVE-2024-50082.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50089.html">https://www.suse.com/security/cve/CVE-2024-50089.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50093.html">https://www.suse.com/security/cve/CVE-2024-50093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50095.html">https://www.suse.com/security/cve/CVE-2024-50095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50096.html">https://www.suse.com/security/cve/CVE-2024-50096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50098.html">https://www.suse.com/security/cve/CVE-2024-50098.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50099.html">https://www.suse.com/security/cve/CVE-2024-50099.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50103.html">https://www.suse.com/security/cve/CVE-2024-50103.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50108.html">https://www.suse.com/security/cve/CVE-2024-50108.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50110.html">https://www.suse.com/security/cve/CVE-2024-50110.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">https://www.suse.com/security/cve/CVE-2024-50115.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50116.html">https://www.suse.com/security/cve/CVE-2024-50116.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50117.html">https://www.suse.com/security/cve/CVE-2024-50117.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50124.html">https://www.suse.com/security/cve/CVE-2024-50124.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50125.html">https://www.suse.com/security/cve/CVE-2024-50125.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50127.html">https://www.suse.com/security/cve/CVE-2024-50127.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50128.html">https://www.suse.com/security/cve/CVE-2024-50128.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50131.html">https://www.suse.com/security/cve/CVE-2024-50131.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50134.html">https://www.suse.com/security/cve/CVE-2024-50134.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50135.html">https://www.suse.com/security/cve/CVE-2024-50135.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50138.html">https://www.suse.com/security/cve/CVE-2024-50138.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50141.html">https://www.suse.com/security/cve/CVE-2024-50141.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50146.html">https://www.suse.com/security/cve/CVE-2024-50146.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50147.html">https://www.suse.com/security/cve/CVE-2024-50147.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50148.html">https://www.suse.com/security/cve/CVE-2024-50148.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50150.html">https://www.suse.com/security/cve/CVE-2024-50150.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50153.html">https://www.suse.com/security/cve/CVE-2024-50153.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50154.html">https://www.suse.com/security/cve/CVE-2024-50154.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50155.html">https://www.suse.com/security/cve/CVE-2024-50155.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50156.html">https://www.suse.com/security/cve/CVE-2024-50156.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50160.html">https://www.suse.com/security/cve/CVE-2024-50160.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50167.html">https://www.suse.com/security/cve/CVE-2024-50167.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50171.html">https://www.suse.com/security/cve/CVE-2024-50171.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50179.html">https://www.suse.com/security/cve/CVE-2024-50179.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50180.html">https://www.suse.com/security/cve/CVE-2024-50180.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50182.html">https://www.suse.com/security/cve/CVE-2024-50182.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50183.html">https://www.suse.com/security/cve/CVE-2024-50183.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50184.html">https://www.suse.com/security/cve/CVE-2024-50184.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50186.html">https://www.suse.com/security/cve/CVE-2024-50186.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50187.html">https://www.suse.com/security/cve/CVE-2024-50187.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50188.html">https://www.suse.com/security/cve/CVE-2024-50188.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50189.html">https://www.suse.com/security/cve/CVE-2024-50189.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50192.html">https://www.suse.com/security/cve/CVE-2024-50192.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50194.html">https://www.suse.com/security/cve/CVE-2024-50194.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50195.html">https://www.suse.com/security/cve/CVE-2024-50195.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50196.html">https://www.suse.com/security/cve/CVE-2024-50196.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50198.html">https://www.suse.com/security/cve/CVE-2024-50198.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50201.html">https://www.suse.com/security/cve/CVE-2024-50201.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50205.html">https://www.suse.com/security/cve/CVE-2024-50205.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50208.html">https://www.suse.com/security/cve/CVE-2024-50208.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50209.html">https://www.suse.com/security/cve/CVE-2024-50209.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50215.html">https://www.suse.com/security/cve/CVE-2024-50215.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50218.html">https://www.suse.com/security/cve/CVE-2024-50218.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50229.html">https://www.suse.com/security/cve/CVE-2024-50229.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50230.html">https://www.suse.com/security/cve/CVE-2024-50230.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50232.html">https://www.suse.com/security/cve/CVE-2024-50232.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50233.html">https://www.suse.com/security/cve/CVE-2024-50233.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50234.html">https://www.suse.com/security/cve/CVE-2024-50234.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50236.html">https://www.suse.com/security/cve/CVE-2024-50236.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50237.html">https://www.suse.com/security/cve/CVE-2024-50237.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50249.html">https://www.suse.com/security/cve/CVE-2024-50249.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50255.html">https://www.suse.com/security/cve/CVE-2024-50255.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50259.html">https://www.suse.com/security/cve/CVE-2024-50259.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50261.html">https://www.suse.com/security/cve/CVE-2024-50261.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50264.html">https://www.suse.com/security/cve/CVE-2024-50264.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50265.html">https://www.suse.com/security/cve/CVE-2024-50265.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50267.html">https://www.suse.com/security/cve/CVE-2024-50267.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50268.html">https://www.suse.com/security/cve/CVE-2024-50268.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50269.html">https://www.suse.com/security/cve/CVE-2024-50269.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50271.html">https://www.suse.com/security/cve/CVE-2024-50271.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50273.html">https://www.suse.com/security/cve/CVE-2024-50273.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50274.html">https://www.suse.com/security/cve/CVE-2024-50274.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50279.html">https://www.suse.com/security/cve/CVE-2024-50279.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50282.html">https://www.suse.com/security/cve/CVE-2024-50282.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50287.html">https://www.suse.com/security/cve/CVE-2024-50287.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50289.html">https://www.suse.com/security/cve/CVE-2024-50289.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">https://www.suse.com/security/cve/CVE-2024-50290.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50292.html">https://www.suse.com/security/cve/CVE-2024-50292.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50295.html">https://www.suse.com/security/cve/CVE-2024-50295.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50298.html">https://www.suse.com/security/cve/CVE-2024-50298.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50301.html">https://www.suse.com/security/cve/CVE-2024-50301.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50302.html">https://www.suse.com/security/cve/CVE-2024-50302.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53052.html">https://www.suse.com/security/cve/CVE-2024-53052.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53058.html">https://www.suse.com/security/cve/CVE-2024-53058.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53059.html">https://www.suse.com/security/cve/CVE-2024-53059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53060.html">https://www.suse.com/security/cve/CVE-2024-53060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53061.html">https://www.suse.com/security/cve/CVE-2024-53061.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">https://www.suse.com/security/cve/CVE-2024-53063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53066.html">https://www.suse.com/security/cve/CVE-2024-53066.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53068.html">https://www.suse.com/security/cve/CVE-2024-53068.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53079.html">https://www.suse.com/security/cve/CVE-2024-53079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53085.html">https://www.suse.com/security/cve/CVE-2024-53085.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53088.html">https://www.suse.com/security/cve/CVE-2024-53088.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53104.html">https://www.suse.com/security/cve/CVE-2024-53104.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53110.html">https://www.suse.com/security/cve/CVE-2024-53110.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">https://bugzilla.suse.com/show_bug.cgi?id=1082555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218644">https://bugzilla.suse.com/show_bug.cgi?id=1218644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220382">https://bugzilla.suse.com/show_bug.cgi?id=1220382</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221309">https://bugzilla.suse.com/show_bug.cgi?id=1221309</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221333">https://bugzilla.suse.com/show_bug.cgi?id=1221333</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">https://bugzilla.suse.com/show_bug.cgi?id=1222364</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222590">https://bugzilla.suse.com/show_bug.cgi?id=1222590</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">https://bugzilla.suse.com/show_bug.cgi?id=1223202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223656">https://bugzilla.suse.com/show_bug.cgi?id=1223656</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223848">https://bugzilla.suse.com/show_bug.cgi?id=1223848</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223919">https://bugzilla.suse.com/show_bug.cgi?id=1223919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223942">https://bugzilla.suse.com/show_bug.cgi?id=1223942</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224518">https://bugzilla.suse.com/show_bug.cgi?id=1224518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224526">https://bugzilla.suse.com/show_bug.cgi?id=1224526</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224574">https://bugzilla.suse.com/show_bug.cgi?id=1224574</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225725">https://bugzilla.suse.com/show_bug.cgi?id=1225725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225730">https://bugzilla.suse.com/show_bug.cgi?id=1225730</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225764">https://bugzilla.suse.com/show_bug.cgi?id=1225764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225812">https://bugzilla.suse.com/show_bug.cgi?id=1225812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226560">https://bugzilla.suse.com/show_bug.cgi?id=1226560</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226592">https://bugzilla.suse.com/show_bug.cgi?id=1226592</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226631">https://bugzilla.suse.com/show_bug.cgi?id=1226631</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226748">https://bugzilla.suse.com/show_bug.cgi?id=1226748</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226872">https://bugzilla.suse.com/show_bug.cgi?id=1226872</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">https://bugzilla.suse.com/show_bug.cgi?id=1227853</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228430">https://bugzilla.suse.com/show_bug.cgi?id=1228430</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">https://bugzilla.suse.com/show_bug.cgi?id=1228486</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">https://bugzilla.suse.com/show_bug.cgi?id=1228650</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">https://bugzilla.suse.com/show_bug.cgi?id=1228857</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">https://bugzilla.suse.com/show_bug.cgi?id=1229312</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229429">https://bugzilla.suse.com/show_bug.cgi?id=1229429</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229585">https://bugzilla.suse.com/show_bug.cgi?id=1229585</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">https://bugzilla.suse.com/show_bug.cgi?id=1229752</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229808">https://bugzilla.suse.com/show_bug.cgi?id=1229808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230055">https://bugzilla.suse.com/show_bug.cgi?id=1230055</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230220">https://bugzilla.suse.com/show_bug.cgi?id=1230220</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230231">https://bugzilla.suse.com/show_bug.cgi?id=1230231</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230270">https://bugzilla.suse.com/show_bug.cgi?id=1230270</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230558">https://bugzilla.suse.com/show_bug.cgi?id=1230558</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230827">https://bugzilla.suse.com/show_bug.cgi?id=1230827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230918">https://bugzilla.suse.com/show_bug.cgi?id=1230918</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231083">https://bugzilla.suse.com/show_bug.cgi?id=1231083</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231089">https://bugzilla.suse.com/show_bug.cgi?id=1231089</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231098">https://bugzilla.suse.com/show_bug.cgi?id=1231098</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231101">https://bugzilla.suse.com/show_bug.cgi?id=1231101</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231108">https://bugzilla.suse.com/show_bug.cgi?id=1231108</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231111">https://bugzilla.suse.com/show_bug.cgi?id=1231111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231132">https://bugzilla.suse.com/show_bug.cgi?id=1231132</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231135">https://bugzilla.suse.com/show_bug.cgi?id=1231135</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231138">https://bugzilla.suse.com/show_bug.cgi?id=1231138</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231169">https://bugzilla.suse.com/show_bug.cgi?id=1231169</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231178">https://bugzilla.suse.com/show_bug.cgi?id=1231178</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231180">https://bugzilla.suse.com/show_bug.cgi?id=1231180</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231181">https://bugzilla.suse.com/show_bug.cgi?id=1231181</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231187">https://bugzilla.suse.com/show_bug.cgi?id=1231187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231202">https://bugzilla.suse.com/show_bug.cgi?id=1231202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231434">https://bugzilla.suse.com/show_bug.cgi?id=1231434</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231441">https://bugzilla.suse.com/show_bug.cgi?id=1231441</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231452">https://bugzilla.suse.com/show_bug.cgi?id=1231452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231465">https://bugzilla.suse.com/show_bug.cgi?id=1231465</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231474">https://bugzilla.suse.com/show_bug.cgi?id=1231474</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231481">https://bugzilla.suse.com/show_bug.cgi?id=1231481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231537">https://bugzilla.suse.com/show_bug.cgi?id=1231537</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231541">https://bugzilla.suse.com/show_bug.cgi?id=1231541</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231646">https://bugzilla.suse.com/show_bug.cgi?id=1231646</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231849">https://bugzilla.suse.com/show_bug.cgi?id=1231849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231856">https://bugzilla.suse.com/show_bug.cgi?id=1231856</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231858">https://bugzilla.suse.com/show_bug.cgi?id=1231858</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231859">https://bugzilla.suse.com/show_bug.cgi?id=1231859</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231864">https://bugzilla.suse.com/show_bug.cgi?id=1231864</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231904">https://bugzilla.suse.com/show_bug.cgi?id=1231904</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231916">https://bugzilla.suse.com/show_bug.cgi?id=1231916</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">https://bugzilla.suse.com/show_bug.cgi?id=1231920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231923">https://bugzilla.suse.com/show_bug.cgi?id=1231923</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231930">https://bugzilla.suse.com/show_bug.cgi?id=1231930</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231931">https://bugzilla.suse.com/show_bug.cgi?id=1231931</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231947">https://bugzilla.suse.com/show_bug.cgi?id=1231947</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231952">https://bugzilla.suse.com/show_bug.cgi?id=1231952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231953">https://bugzilla.suse.com/show_bug.cgi?id=1231953</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231959">https://bugzilla.suse.com/show_bug.cgi?id=1231959</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231978">https://bugzilla.suse.com/show_bug.cgi?id=1231978</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232013">https://bugzilla.suse.com/show_bug.cgi?id=1232013</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232015">https://bugzilla.suse.com/show_bug.cgi?id=1232015</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232016">https://bugzilla.suse.com/show_bug.cgi?id=1232016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232017">https://bugzilla.suse.com/show_bug.cgi?id=1232017</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232027">https://bugzilla.suse.com/show_bug.cgi?id=1232027</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232028">https://bugzilla.suse.com/show_bug.cgi?id=1232028</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232047">https://bugzilla.suse.com/show_bug.cgi?id=1232047</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232048">https://bugzilla.suse.com/show_bug.cgi?id=1232048</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232050">https://bugzilla.suse.com/show_bug.cgi?id=1232050</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232056">https://bugzilla.suse.com/show_bug.cgi?id=1232056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232076">https://bugzilla.suse.com/show_bug.cgi?id=1232076</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232080">https://bugzilla.suse.com/show_bug.cgi?id=1232080</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232094">https://bugzilla.suse.com/show_bug.cgi?id=1232094</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232096">https://bugzilla.suse.com/show_bug.cgi?id=1232096</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232098">https://bugzilla.suse.com/show_bug.cgi?id=1232098</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232111">https://bugzilla.suse.com/show_bug.cgi?id=1232111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232126">https://bugzilla.suse.com/show_bug.cgi?id=1232126</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232134">https://bugzilla.suse.com/show_bug.cgi?id=1232134</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232135">https://bugzilla.suse.com/show_bug.cgi?id=1232135</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232141">https://bugzilla.suse.com/show_bug.cgi?id=1232141</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232142">https://bugzilla.suse.com/show_bug.cgi?id=1232142</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232147">https://bugzilla.suse.com/show_bug.cgi?id=1232147</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232152">https://bugzilla.suse.com/show_bug.cgi?id=1232152</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">https://bugzilla.suse.com/show_bug.cgi?id=1232159</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232162">https://bugzilla.suse.com/show_bug.cgi?id=1232162</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232165">https://bugzilla.suse.com/show_bug.cgi?id=1232165</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232180">https://bugzilla.suse.com/show_bug.cgi?id=1232180</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232185">https://bugzilla.suse.com/show_bug.cgi?id=1232185</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232187">https://bugzilla.suse.com/show_bug.cgi?id=1232187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232189">https://bugzilla.suse.com/show_bug.cgi?id=1232189</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232195">https://bugzilla.suse.com/show_bug.cgi?id=1232195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">https://bugzilla.suse.com/show_bug.cgi?id=1232198</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">https://bugzilla.suse.com/show_bug.cgi?id=1232201</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232218">https://bugzilla.suse.com/show_bug.cgi?id=1232218</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232224">https://bugzilla.suse.com/show_bug.cgi?id=1232224</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232232">https://bugzilla.suse.com/show_bug.cgi?id=1232232</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232254">https://bugzilla.suse.com/show_bug.cgi?id=1232254</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232255">https://bugzilla.suse.com/show_bug.cgi?id=1232255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232264">https://bugzilla.suse.com/show_bug.cgi?id=1232264</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232272">https://bugzilla.suse.com/show_bug.cgi?id=1232272</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232279">https://bugzilla.suse.com/show_bug.cgi?id=1232279</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232287">https://bugzilla.suse.com/show_bug.cgi?id=1232287</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232293">https://bugzilla.suse.com/show_bug.cgi?id=1232293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232312">https://bugzilla.suse.com/show_bug.cgi?id=1232312</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232317">https://bugzilla.suse.com/show_bug.cgi?id=1232317</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232318">https://bugzilla.suse.com/show_bug.cgi?id=1232318</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232333">https://bugzilla.suse.com/show_bug.cgi?id=1232333</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232334">https://bugzilla.suse.com/show_bug.cgi?id=1232334</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232335">https://bugzilla.suse.com/show_bug.cgi?id=1232335</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232339">https://bugzilla.suse.com/show_bug.cgi?id=1232339</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232349">https://bugzilla.suse.com/show_bug.cgi?id=1232349</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232357">https://bugzilla.suse.com/show_bug.cgi?id=1232357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232359">https://bugzilla.suse.com/show_bug.cgi?id=1232359</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232362">https://bugzilla.suse.com/show_bug.cgi?id=1232362</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232364">https://bugzilla.suse.com/show_bug.cgi?id=1232364</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232370">https://bugzilla.suse.com/show_bug.cgi?id=1232370</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232371">https://bugzilla.suse.com/show_bug.cgi?id=1232371</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232378">https://bugzilla.suse.com/show_bug.cgi?id=1232378</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232385">https://bugzilla.suse.com/show_bug.cgi?id=1232385</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232387">https://bugzilla.suse.com/show_bug.cgi?id=1232387</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232394">https://bugzilla.suse.com/show_bug.cgi?id=1232394</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232413">https://bugzilla.suse.com/show_bug.cgi?id=1232413</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232416">https://bugzilla.suse.com/show_bug.cgi?id=1232416</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232436">https://bugzilla.suse.com/show_bug.cgi?id=1232436</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232483">https://bugzilla.suse.com/show_bug.cgi?id=1232483</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232500">https://bugzilla.suse.com/show_bug.cgi?id=1232500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232503">https://bugzilla.suse.com/show_bug.cgi?id=1232503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232504">https://bugzilla.suse.com/show_bug.cgi?id=1232504</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232507">https://bugzilla.suse.com/show_bug.cgi?id=1232507</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">https://bugzilla.suse.com/show_bug.cgi?id=1232520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232552">https://bugzilla.suse.com/show_bug.cgi?id=1232552</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232757">https://bugzilla.suse.com/show_bug.cgi?id=1232757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232819">https://bugzilla.suse.com/show_bug.cgi?id=1232819</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232860">https://bugzilla.suse.com/show_bug.cgi?id=1232860</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232870">https://bugzilla.suse.com/show_bug.cgi?id=1232870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232873">https://bugzilla.suse.com/show_bug.cgi?id=1232873</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232877">https://bugzilla.suse.com/show_bug.cgi?id=1232877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232878">https://bugzilla.suse.com/show_bug.cgi?id=1232878</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232881">https://bugzilla.suse.com/show_bug.cgi?id=1232881</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232884">https://bugzilla.suse.com/show_bug.cgi?id=1232884</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232885">https://bugzilla.suse.com/show_bug.cgi?id=1232885</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232887">https://bugzilla.suse.com/show_bug.cgi?id=1232887</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232888">https://bugzilla.suse.com/show_bug.cgi?id=1232888</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232890">https://bugzilla.suse.com/show_bug.cgi?id=1232890</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232892">https://bugzilla.suse.com/show_bug.cgi?id=1232892</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232896">https://bugzilla.suse.com/show_bug.cgi?id=1232896</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232897">https://bugzilla.suse.com/show_bug.cgi?id=1232897</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232905">https://bugzilla.suse.com/show_bug.cgi?id=1232905</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232907">https://bugzilla.suse.com/show_bug.cgi?id=1232907</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">https://bugzilla.suse.com/show_bug.cgi?id=1232919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232926">https://bugzilla.suse.com/show_bug.cgi?id=1232926</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232928">https://bugzilla.suse.com/show_bug.cgi?id=1232928</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232935">https://bugzilla.suse.com/show_bug.cgi?id=1232935</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233035">https://bugzilla.suse.com/show_bug.cgi?id=1233035</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233049">https://bugzilla.suse.com/show_bug.cgi?id=1233049</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233051">https://bugzilla.suse.com/show_bug.cgi?id=1233051</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233056">https://bugzilla.suse.com/show_bug.cgi?id=1233056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233057">https://bugzilla.suse.com/show_bug.cgi?id=1233057</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233061">https://bugzilla.suse.com/show_bug.cgi?id=1233061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233063">https://bugzilla.suse.com/show_bug.cgi?id=1233063</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233065">https://bugzilla.suse.com/show_bug.cgi?id=1233065</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233067">https://bugzilla.suse.com/show_bug.cgi?id=1233067</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233070">https://bugzilla.suse.com/show_bug.cgi?id=1233070</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233073">https://bugzilla.suse.com/show_bug.cgi?id=1233073</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233074">https://bugzilla.suse.com/show_bug.cgi?id=1233074</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233100">https://bugzilla.suse.com/show_bug.cgi?id=1233100</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233103">https://bugzilla.suse.com/show_bug.cgi?id=1233103</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233104">https://bugzilla.suse.com/show_bug.cgi?id=1233104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233105">https://bugzilla.suse.com/show_bug.cgi?id=1233105</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233106">https://bugzilla.suse.com/show_bug.cgi?id=1233106</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233107">https://bugzilla.suse.com/show_bug.cgi?id=1233107</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233108">https://bugzilla.suse.com/show_bug.cgi?id=1233108</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233110">https://bugzilla.suse.com/show_bug.cgi?id=1233110</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233111">https://bugzilla.suse.com/show_bug.cgi?id=1233111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233113">https://bugzilla.suse.com/show_bug.cgi?id=1233113</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233114">https://bugzilla.suse.com/show_bug.cgi?id=1233114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233117">https://bugzilla.suse.com/show_bug.cgi?id=1233117</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233123">https://bugzilla.suse.com/show_bug.cgi?id=1233123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233125">https://bugzilla.suse.com/show_bug.cgi?id=1233125</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233129">https://bugzilla.suse.com/show_bug.cgi?id=1233129</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233130">https://bugzilla.suse.com/show_bug.cgi?id=1233130</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233134">https://bugzilla.suse.com/show_bug.cgi?id=1233134</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233135">https://bugzilla.suse.com/show_bug.cgi?id=1233135</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233150">https://bugzilla.suse.com/show_bug.cgi?id=1233150</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233189">https://bugzilla.suse.com/show_bug.cgi?id=1233189</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233191">https://bugzilla.suse.com/show_bug.cgi?id=1233191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233197">https://bugzilla.suse.com/show_bug.cgi?id=1233197</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233205">https://bugzilla.suse.com/show_bug.cgi?id=1233205</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233206">https://bugzilla.suse.com/show_bug.cgi?id=1233206</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233209">https://bugzilla.suse.com/show_bug.cgi?id=1233209</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233210">https://bugzilla.suse.com/show_bug.cgi?id=1233210</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233211">https://bugzilla.suse.com/show_bug.cgi?id=1233211</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233212">https://bugzilla.suse.com/show_bug.cgi?id=1233212</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233214">https://bugzilla.suse.com/show_bug.cgi?id=1233214</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233216">https://bugzilla.suse.com/show_bug.cgi?id=1233216</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233238">https://bugzilla.suse.com/show_bug.cgi?id=1233238</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233241">https://bugzilla.suse.com/show_bug.cgi?id=1233241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233253">https://bugzilla.suse.com/show_bug.cgi?id=1233253</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233255">https://bugzilla.suse.com/show_bug.cgi?id=1233255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233293">https://bugzilla.suse.com/show_bug.cgi?id=1233293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233350">https://bugzilla.suse.com/show_bug.cgi?id=1233350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233452">https://bugzilla.suse.com/show_bug.cgi?id=1233452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233453">https://bugzilla.suse.com/show_bug.cgi?id=1233453</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233454">https://bugzilla.suse.com/show_bug.cgi?id=1233454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233456">https://bugzilla.suse.com/show_bug.cgi?id=1233456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233457">https://bugzilla.suse.com/show_bug.cgi?id=1233457</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233458">https://bugzilla.suse.com/show_bug.cgi?id=1233458</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233460">https://bugzilla.suse.com/show_bug.cgi?id=1233460</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233462">https://bugzilla.suse.com/show_bug.cgi?id=1233462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233463">https://bugzilla.suse.com/show_bug.cgi?id=1233463</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233468">https://bugzilla.suse.com/show_bug.cgi?id=1233468</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233471">https://bugzilla.suse.com/show_bug.cgi?id=1233471</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233476">https://bugzilla.suse.com/show_bug.cgi?id=1233476</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233478">https://bugzilla.suse.com/show_bug.cgi?id=1233478</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">https://bugzilla.suse.com/show_bug.cgi?id=1233479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233481">https://bugzilla.suse.com/show_bug.cgi?id=1233481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233484">https://bugzilla.suse.com/show_bug.cgi?id=1233484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233487">https://bugzilla.suse.com/show_bug.cgi?id=1233487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233490">https://bugzilla.suse.com/show_bug.cgi?id=1233490</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233491">https://bugzilla.suse.com/show_bug.cgi?id=1233491</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233528">https://bugzilla.suse.com/show_bug.cgi?id=1233528</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233548">https://bugzilla.suse.com/show_bug.cgi?id=1233548</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233552">https://bugzilla.suse.com/show_bug.cgi?id=1233552</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233553">https://bugzilla.suse.com/show_bug.cgi?id=1233553</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233554">https://bugzilla.suse.com/show_bug.cgi?id=1233554</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233555">https://bugzilla.suse.com/show_bug.cgi?id=1233555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">https://bugzilla.suse.com/show_bug.cgi?id=1233557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233560">https://bugzilla.suse.com/show_bug.cgi?id=1233560</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233561">https://bugzilla.suse.com/show_bug.cgi?id=1233561</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233570">https://bugzilla.suse.com/show_bug.cgi?id=1233570</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233577">https://bugzilla.suse.com/show_bug.cgi?id=1233577</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233580">https://bugzilla.suse.com/show_bug.cgi?id=1233580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233977">https://bugzilla.suse.com/show_bug.cgi?id=1233977</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234012">https://bugzilla.suse.com/show_bug.cgi?id=1234012</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234025">https://bugzilla.suse.com/show_bug.cgi?id=1234025</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234085">https://bugzilla.suse.com/show_bug.cgi?id=1234085</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234093">https://bugzilla.suse.com/show_bug.cgi?id=1234093</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234098">https://bugzilla.suse.com/show_bug.cgi?id=1234098</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234108">https://bugzilla.suse.com/show_bug.cgi?id=1234108</a>
</li>


</ul>

</div>

--===============8809252685416003290==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung