Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:4316-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE openSUSE Leap 15.6, SUSE Public Cloud Module 15-SP6
Datum: Fr, 13. Dezember 2024, 23:11
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50172
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000
Applikationen: Linux

Originalnachricht

--===============6027699515479577569==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4316-1
Release Date: 2024-12-13T15:24:05Z
Rating: important
References:

* bsc#1012628
* bsc#1082555
* bsc#1194869
* bsc#1215199
* bsc#1218644
* bsc#1220355
* bsc#1221309
* bsc#1222423
* bsc#1222587
* bsc#1222590
* bsc#1223112
* bsc#1223656
* bsc#1223733
* bsc#1224429
* bsc#1224518
* bsc#1224548
* bsc#1224948
* bsc#1225713
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225768
* bsc#1225813
* bsc#1225903
* bsc#1226130
* bsc#1226748
* bsc#1226872
* bsc#1227726
* bsc#1227842
* bsc#1228430
* bsc#1228850
* bsc#1229165
* bsc#1230231
* bsc#1230557
* bsc#1230558
* bsc#1230733
* bsc#1230807
* bsc#1230817
* bsc#1230827
* bsc#1230971
* bsc#1231076
* bsc#1231114
* bsc#1231182
* bsc#1231453
* bsc#1231465
* bsc#1231630
* bsc#1231920
* bsc#1231930
* bsc#1231946
* bsc#1231952
* bsc#1232096
* bsc#1232103
* bsc#1232104
* bsc#1232157
* bsc#1232165
* bsc#1232166
* bsc#1232198
* bsc#1232201
* bsc#1232207
* bsc#1232208
* bsc#1232224
* bsc#1232258
* bsc#1232264
* bsc#1232272
* bsc#1232318
* bsc#1232335
* bsc#1232357
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232371
* bsc#1232374
* bsc#1232385
* bsc#1232386
* bsc#1232387
* bsc#1232396
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232442
* bsc#1232446
* bsc#1232483
* bsc#1232494
* bsc#1232498
* bsc#1232499
* bsc#1232500
* bsc#1232704
* bsc#1232757
* bsc#1232823
* bsc#1232860
* bsc#1232869
* bsc#1232870
* bsc#1232873
* bsc#1232876
* bsc#1232877
* bsc#1232878
* bsc#1232880
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232894
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232914
* bsc#1232919
* bsc#1232925
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233029
* bsc#1233032
* bsc#1233035
* bsc#1233036
* bsc#1233041
* bsc#1233044
* bsc#1233049
* bsc#1233050
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233062
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233088
* bsc#1233091
* bsc#1233092
* bsc#1233097
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233115
* bsc#1233117
* bsc#1233119
* bsc#1233123
* bsc#1233125
* bsc#1233127
* bsc#1233129
* bsc#1233130
* bsc#1233132
* bsc#1233135
* bsc#1233176
* bsc#1233179
* bsc#1233185
* bsc#1233188
* bsc#1233189
* bsc#1233191
* bsc#1233193
* bsc#1233197
* bsc#1233201
* bsc#1233203
* bsc#1233204
* bsc#1233205
* bsc#1233206
* bsc#1233207
* bsc#1233208
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233216
* bsc#1233217
* bsc#1233219
* bsc#1233226
* bsc#1233238
* bsc#1233241
* bsc#1233244
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233298
* bsc#1233305
* bsc#1233320
* bsc#1233350
* bsc#1233443
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233464
* bsc#1233465
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233485
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233523
* bsc#1233524
* bsc#1233540
* bsc#1233547
* bsc#1233548
* bsc#1233550
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233564
* bsc#1233566
* bsc#1233567
* bsc#1233568
* bsc#1233570
* bsc#1233572
* bsc#1233573
* bsc#1233577
* bsc#1233580
* bsc#1233640
* bsc#1233641
* bsc#1233642
* bsc#1233721
* bsc#1233754
* bsc#1233756
* bsc#1233769
* bsc#1233771
* bsc#1233977
* bsc#1234009
* bsc#1234011
* bsc#1234012
* bsc#1234025
* bsc#1234039
* bsc#1234040
* bsc#1234041
* bsc#1234042
* bsc#1234043
* bsc#1234044
* bsc#1234045
* bsc#1234046
* bsc#1234072
* bsc#1234078
* bsc#1234081
* bsc#1234083
* bsc#1234085
* bsc#1234087
* bsc#1234093
* bsc#1234098
* bsc#1234108
* bsc#1234121
* bsc#1234223
* jsc#PED-11316
* jsc#PED-11442
* jsc#PED-11580
* jsc#PED-9943


Cross-References:

* CVE-2023-52778
* CVE-2023-52920
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26596
* CVE-2024-26703
* CVE-2024-26741
* CVE-2024-26782
* CVE-2024-26864
* CVE-2024-26953
* CVE-2024-27017
* CVE-2024-27407
* CVE-2024-35888
* CVE-2024-36000
* CVE-2024-36031
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36920
* CVE-2024-36927
* CVE-2024-36954
* CVE-2024-36968
* CVE-2024-38589
* CVE-2024-40914
* CVE-2024-41023
* CVE-2024-42102
* CVE-2024-44995
* CVE-2024-46680
* CVE-2024-46681
* CVE-2024-46765
* CVE-2024-46788
* CVE-2024-46800
* CVE-2024-46828
* CVE-2024-46845
* CVE-2024-47666
* CVE-2024-47679
* CVE-2024-47701
* CVE-2024-47703
* CVE-2024-49868
* CVE-2024-49884
* CVE-2024-49888
* CVE-2024-49899
* CVE-2024-49905
* CVE-2024-49908
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49925
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49952
* CVE-2024-49968
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49983
* CVE-2024-49987
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50006
* CVE-2024-50009
* CVE-2024-50012
* CVE-2024-50014
* CVE-2024-50026
* CVE-2024-50067
* CVE-2024-50082
* CVE-2024-50084
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50121
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50141
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50169
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50218
* CVE-2024-50221
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50228
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50240
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50252
* CVE-2024-50255
* CVE-2024-50257
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50275
* CVE-2024-50276
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50296
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53042
* CVE-2024-53043
* CVE-2024-53045
* CVE-2024-53048
* CVE-2024-53051
* CVE-2024-53052
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53072
* CVE-2024-53074
* CVE-2024-53076
* CVE-2024-53079
* CVE-2024-53081
* CVE-2024-53082
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53093
* CVE-2024-53094
* CVE-2024-53095
* CVE-2024-53096
* CVE-2024-53100
* CVE-2024-53101
* CVE-2024-53104
* CVE-2024-53106
* CVE-2024-53108
* CVE-2024-53110
* CVE-2024-53112
* CVE-2024-53114
* CVE-2024-53121
* CVE-2024-53138


CVSS scores:

* CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-42102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47703 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49987 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50139 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50169 ( SUSE ): 0.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50231 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50248 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53100 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H


Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6



An update that solves 228 vulnerabilities, contains four features and has 44
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
* CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
precision tracking (bsc#1232823).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on
non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished() (bsc#1222587).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on
netlink
dump (bsc#1223733).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in
skb->head
(bsc#1224518).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in
l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
wb_dirty_limits(), again" (bsc#1233132).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init()
(bsc#1230558).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and
find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start
a
new trasacntion (bsc#1232272).
* CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (bsc#1232367).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be
mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
(bsc#1232258).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
monitor (bsc#1232385).
* CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's
return
value (bsc#1232318).
* CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).
* CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).
* CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
(bsc#1232498).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy
(bsc#1232905).
* CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
* CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in
reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create
fails
(bsc#1233110).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
* CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
* CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
* CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219).
* CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
(bsc#1233464).
* CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
(bsc#1233465).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for
dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for
non-paged
SKB data (bsc#1233552).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).
* CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).

The following non-security bugs were fixed:

* ACPI: CPPC: Fix _CPC register setting issue (git-fixes).
* ALSA: 6fire: Release resources at card release (git-fixes).
* ALSA: ac97: bus: Fix the mistake in the comment (git-fixes).
* ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
(git-fixes).
* ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
* ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8
(stable-
fixes).
* ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).
* ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
(bsc#1233298).
* ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
* ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes).
* ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10
(stable-
fixes).
* ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
* ALSA: hda: Show the codec quirk info at probing (stable-fixes).
* ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put
(stable-fixes).
* ALSA: pcm: Add sanity NULL check for the default mmap fault handler
(stable-
fixes).
* ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
* ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
* ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
* ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* ALSA: usb-audio: Fix out of bounds reads when finding clock sources
(stable-
fixes).
* ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
devices (git-fixes).
* ALSA: usb-audio: Make mic volume workarounds globally applicable (stable-
fixes).
* ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
(stable-fixes).
* ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* ASoC: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).
* ASoC: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).
* ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
* ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
* ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).
* ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).
* ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
* ASoC: SOF: Wire up buffer flags (bsc#1233305).
* ASoC: SOF: add alignment for topology header file struct definition
(bsc#1233305).
* ASoC: SOF: align topology header file with sof topology header
(bsc#1233305).
* ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
(git-fixes).
* ASoC: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
* ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
* ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for
ChainDMA
(bsc#1233305).
* ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).
* ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).
* ASoC: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).
* ASoC: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).
* ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
(bsc#1233305).
* ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
fixes).
* ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
* ASoC: SOF: topology: dynamically allocate and store DAI widget->private
(bsc#1233305).
* ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
* ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
* ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
(stable-fixes).
* ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
* ASoC: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).
* ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* ASoC: fsl_micfil: Add sample rate constraint (stable-fixes).
* ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes).
* ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
* ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue
(stable-
fixes).
* ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
(stable-fixes).
* ASoC: stm: Prevent potential division by zero in
stm32_sai_mclk_round_rate()
(stable-fixes).
* ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
(stable-fixes).
* Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
* Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* Bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
* Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
* Documentation: kgdb: Correct parameter error (git-fixes).
* Drop OCFS2 patch causing a regression (bsc#1233255)
* HID: core: zero-initialize the report buffer (git-fixes).
* HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* HID: multitouch: Add support for B2402FVA track point (stable-fixes).
* HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* HID: wacom: fix when get product name maybe null pointer (git-fixes).
* Input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
* Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
* Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
* Input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
* Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
fixes).
* Input: xpad - add support for MSI Claw A1M (git-fixes).
* Input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
* Input: xpad - fix support for some third-party controllers (git-fixes).
* Input: xpad - sort xpad_device by vendor and product ID (git-fixes).
* Input: xpad - spelling fixes for "Xbox" (git-fixes).
* KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).
* KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
(bsc#1215199).
* KVM: PPC: Book3S HV: remove unused varible (bsc#1194869).
* KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
(bsc#1232207).
* KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
* Move kabi netfilter fix into patches.kabi
* Move upstreamed crypto patches into sorted section
* Move upstreamed patches into sorted section
* NFS: remove revoked delegation from server's delegation list
(git-fixes).
* PCI: Add T_PVPERL macro (git-fixes).
* PCI: Fix reset_method_store() memory leak (git-fixes).
* PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie"
compatible
(git-fixes).
* PCI: rockchip-ep: Fix address translation unit programming (git-fixes).
* RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* RDMA/hns: Add mutex_destroy() (git-fixes)
* RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
fixes)
* RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* RDMA/hns: Fix out-of-order issue of requester when setting FENCE
(git-fixes)
* RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* RDMA/hns: Use macro instead of magic number (git-fixes)
* RDMA/mlx5: Move events notifier registration to be after device
registration
(git-fixes)
* RDMA/rxe: Fix the qp flush warnings in req (git-fixes)
* RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
* Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1"
(bsc#1215199).
* Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan"
(git-fixes)
* Revert "cgroup: Fix memory leak caused by missing
cgroup_bpf_offline"
(bsc#1234108).
* Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check"
(stable-
fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
(git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic"
(git-
fixes).
* SUNRPC: Remove BUG_ON call sites (git-fixes).
* USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* USB: chaoskey: fail open after removal (git-fixes).
* USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
* USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* USB: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* USB: serial: option: add Quectel RG650V (stable-fixes).
* USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
(git-fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* add bugreference to a hv_netvsc patch (bsc#1232413).
* aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* apparmor: fix 'Do simple duplicate message elimination'
(git-fixes).
* apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
* apparmor: use kvfree_sensitive to free data->data (git-fixes).
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards
(git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property
(git-fixes)
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
fixes).
* bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
* btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation
(git-fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
switching CAN modes (git-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
* clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
* clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
* clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
* clk: imx: fracn-gppll: fix pll power up (git-fixes).
* clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
* clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
* clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
* clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
* clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
* clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
* cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
* cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
(git-fixes).
* crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
* crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: pcrypt - Call crypto layer directly when padata_do_parallel()
return
-EBUSY (git-fixes).
* crypto: qat - remove check after debugfs_create_dir() (git-fixes).
* crypto: qat - remove faulty arbiter config reset (git-fixes).
* crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* doc: rcu: update printed dynticks counter bits (git-fixes).
* drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
(git-fixes).
* drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
* drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
dcn20_program_pipe (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
hwss_setup_dpp
(git-fixes).
* drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
* drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
* drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
(stable-
fixes).
* drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
* drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
* drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
* drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
* drm/msm: Fix some typos in comment (git-fixes).
* drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new()
(git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load
(git-fixes).
* drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
* drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
* drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
* drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
* e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
* efi/libstub: Free correct pointer on failure (git-fixes).
* efi/libstub: fix efi_parse_options() ignoring the default command line
(git-
fixes).
* efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* ext4: fix unttached inode after power cut with orphan file feature enabled
(bsc#1234009).
* f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).
* fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
fixes).
* firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
fixes).
* fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)
* fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match'
(git-fixes).
* gpio: exar: set value when external pull-up or pull-down is present (git-
fixes).
* gpio: zevio: Add missed label initialisation (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
(git-
fixes).
* hwmon: (nct6775-core) Fix overflows seen when writing limit attributes
(git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
(git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()
(git-
fixes).
* i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* i40e: fix race condition by adding filter's intermediate sync state
(git-
fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* igb: Disable threaded IRQ for igb_msix_other (git-fixes).
* iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
* iio: accel: kx022a: Fix raw read format (git-fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
* iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* intel_idle: add Granite Rapids Xeon support (bsc#1231630).
* intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
* io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
* io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
* jbd2: avoid infinite transaction commit loop (bsc#1234039).
* jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
* jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).
* jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).
* jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
* jbd2: fix potential data lost in recovering journal raced with
synchronizing
fs bdev (bsc#1234044).
* jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
* jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
* jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
* kABI workaround for ASoC SOF (bsc#1233305).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
fixes kabi).
* kasan: move checks to do_strncpy_from_user (git-fixes).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
(git-fixes).
* leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
* lib: string_helpers: silence snprintf() output truncation warning (git-
fixes).
* mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
* maple_tree: fix alloc node fail issue (git-fixes).
* maple_tree: refine mas_store_root() on storing NULL (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-
fixes).
* media: amphion: Set video drvdata before register video device (git-fixes).
* media: ar0521: do not overflow when checking PLL values (git-fixes).
* media: atomisp: Add check for rgby_data memory allocation failure (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
fixes).
* media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* media: i2c: tc358743: Fix crash in the probe error path when using polling
(git-fixes).
* media: imx-jpeg: Ensure power suppliers be suspended before detach them
(git-fixes).
* media: imx-jpeg: Set video drvdata before register video device
(git-fixes).
* media: mantis: remove orphan mantis_core.h (git-fixes).
* media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
* media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).
* media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: s5p-jpeg: prevent buffer overflows (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
* media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
* media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).
* media: uvcvideo: Stop stream during unregister (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* media: vb2: Fix comment (git-fixes).
* media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
* mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
* mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
fixes).
* minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
fixes).
* mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
* mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
* mm: refactor map_deny_write_exec() (git-fixes).
* mm: resolve faulty mmap_region() error path behaviour (git-fixes).
* mm: unconditionally close VMAs on error (git-fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mmc_spi: drop buggy snprintf() (git-fixes).
* mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
* mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
* net: mdio-ipq4019: add missing error check (git-fixes).
* net: phy: dp83822: Fix reset pin definitions (git-fixes).
* net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
(git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
* net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
fixes).
* net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
* nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
* nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
* nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
* nouveau: fw: sync dma after setup is called (git-fixes).
* nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
* ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-loop: flush off pending I/O while shutting down loop controller (git-
fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
* ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* ocfs2: uncache inode which has failed entering the group (git-fixes).
* of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)
* pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
* pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
* pinctrl: zynqmp: drop excess struct member description (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement
(git-
fixes).
* platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
* platform/x86: panasonic-laptop: Return errno correctly in show callback
(git-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
fixes).
* power: supply: rt9471: Use IC status regfield to report real charger status
(git-fixes).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: bbnsm: add remove hook (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
fixes).
* scsi: Remove scsi device no_start_on_resume flag (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
* scsi: core: Disable CDL by default (git-fixes).
* scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
* scsi: mpi3mr: Avoid possible run-time warning with long manufacturer
strings
(git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpi3mr: Validate SAS port assignments (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
* scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress
(git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting()
(git-
fixes).
* soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
fixes).
* soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
* tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
* thermal: core: Initialize thermal zones before registering them
(git-fixes).
* thermal: int3400: Fix reading of current_uuid for active policy
(git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* thunderbolt: Honor TMU requirements in the domain when setting TMU mode
(stable-fixes).
* tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
* tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
* tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tpm: fix signed/unsigned bug when checking event logs (git-fixes).
* tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
* u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one
file
(git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* unicode: Fix utf8_load() error path (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
fixes).
* usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler
(stable-fixes).
* usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
fixes).
* usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: typec: fix potential out of bounds in
ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* vsock: Update msg_count on read_skb() (git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
fixes).
* wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
* wifi: ath12k: fix crash when unbinding (git-fixes).
* wifi: ath12k: fix warning when unbinding (git-fixes).
* wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcmfmac: release 'root' node in all execution paths
(git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
* x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
* x86/microcode/intel: Remove unnecessary cache writeback and invalidation
(git-fixes).
* x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
* x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Enable CPU topology enumeration (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/traps: move kmsan check after instrumentation_begin (git-fixes).
* x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
* x86: fix off-by-one in access_ok() (git-fixes).
* xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
* xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4316=1 openSUSE-SLE-15.6-2024-4316=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4316=1

## Package List:

* openSUSE Leap 15.6 (aarch64 x86_64)
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* gfs2-kmp-azure-6.4.0-150600.8.20.1
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-extra-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-debuginfo-6.4.0-150600.8.20.1
* kselftests-kmp-azure-6.4.0-150600.8.20.1
* kernel-syms-azure-6.4.0-150600.8.20.1
* kernel-azure-optional-6.4.0-150600.8.20.1
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* ocfs2-kmp-azure-6.4.0-150600.8.20.1
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-6.4.0-150600.8.20.1
* kernel-azure-optional-debuginfo-6.4.0-150600.8.20.1
* reiserfs-kmp-azure-6.4.0-150600.8.20.1
* cluster-md-kmp-azure-6.4.0-150600.8.20.1
* kernel-azure-debugsource-6.4.0-150600.8.20.1
* dlm-kmp-azure-6.4.0-150600.8.20.1
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-extra-6.4.0-150600.8.20.1
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-6.4.0-150600.8.20.1
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.20.1
* kernel-source-azure-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-syms-azure-6.4.0-150600.8.20.1
* kernel-azure-devel-6.4.0-150600.8.20.1
* kernel-azure-debugsource-6.4.0-150600.8.20.1
* kernel-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.20.1
* kernel-source-azure-6.4.0-150600.8.20.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52778.html
* https://www.suse.com/security/cve/CVE-2023-52920.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26703.html
* https://www.suse.com/security/cve/CVE-2024-26741.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26864.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27407.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36031.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36920.html
* https://www.suse.com/security/cve/CVE-2024-36927.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-40914.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-42102.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46788.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46845.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49888.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50169.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50276.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53042.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53045.html
* https://www.suse.com/security/cve/CVE-2024-53048.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53072.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53076.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53081.html
* https://www.suse.com/security/cve/CVE-2024-53082.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-53094.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53096.html
* https://www.suse.com/security/cve/CVE-2024-53100.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53106.html
* https://www.suse.com/security/cve/CVE-2024-53108.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53114.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222423
* https://bugzilla.suse.com/show_bug.cgi?id=1222587
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223112
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223733
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224948
* https://bugzilla.suse.com/show_bug.cgi?id=1225713
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225768
* https://bugzilla.suse.com/show_bug.cgi?id=1225813
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227842
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1229165
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230817
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230971
* https://bugzilla.suse.com/show_bug.cgi?id=1231076
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231630
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231946
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232103
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232207
* https://bugzilla.suse.com/show_bug.cgi?id=1232208
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232258
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232386
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232396
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232494
* https://bugzilla.suse.com/show_bug.cgi?id=1232498
* https://bugzilla.suse.com/show_bug.cgi?id=1232499
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232704
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232823
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232869
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232876
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232880
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232894
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232925
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233029
* https://bugzilla.suse.com/show_bug.cgi?id=1233032
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233036
* https://bugzilla.suse.com/show_bug.cgi?id=1233041
* https://bugzilla.suse.com/show_bug.cgi?id=1233044
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233062
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233088
* https://bugzilla.suse.com/show_bug.cgi?id=1233091
* https://bugzilla.suse.com/show_bug.cgi?id=1233092
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233115
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233119
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233127
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233132
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233176
* https://bugzilla.suse.com/show_bug.cgi?id=1233179
* https://bugzilla.suse.com/show_bug.cgi?id=1233185
* https://bugzilla.suse.com/show_bug.cgi?id=1233188
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233193
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233203
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233207
* https://bugzilla.suse.com/show_bug.cgi?id=1233208
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233217
* https://bugzilla.suse.com/show_bug.cgi?id=1233219
* https://bugzilla.suse.com/show_bug.cgi?id=1233226
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233244
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233298
* https://bugzilla.suse.com/show_bug.cgi?id=1233305
* https://bugzilla.suse.com/show_bug.cgi?id=1233320
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233443
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233465
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233524
* https://bugzilla.suse.com/show_bug.cgi?id=1233540
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233564
* https://bugzilla.suse.com/show_bug.cgi?id=1233566
* https://bugzilla.suse.com/show_bug.cgi?id=1233567
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233572
* https://bugzilla.suse.com/show_bug.cgi?id=1233573
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1233641
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233721
* https://bugzilla.suse.com/show_bug.cgi?id=1233754
* https://bugzilla.suse.com/show_bug.cgi?id=1233756
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233771
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234009
* https://bugzilla.suse.com/show_bug.cgi?id=1234011
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234039
* https://bugzilla.suse.com/show_bug.cgi?id=1234040
* https://bugzilla.suse.com/show_bug.cgi?id=1234041
* https://bugzilla.suse.com/show_bug.cgi?id=1234042
* https://bugzilla.suse.com/show_bug.cgi?id=1234043
* https://bugzilla.suse.com/show_bug.cgi?id=1234044
* https://bugzilla.suse.com/show_bug.cgi?id=1234045
* https://bugzilla.suse.com/show_bug.cgi?id=1234046
* https://bugzilla.suse.com/show_bug.cgi?id=1234072
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234081
* https://bugzilla.suse.com/show_bug.cgi?id=1234083
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://bugzilla.suse.com/show_bug.cgi?id=1234121
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://jira.suse.com/browse/PED-11316
* https://jira.suse.com/browse/PED-11442
* https://jira.suse.com/browse/PED-11580
* https://jira.suse.com/browse/PED-9943


--===============6027699515479577569==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:4316-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2024-12-13T15:24:05Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">bsc#1082555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218644">bsc#1218644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220355">bsc#1220355</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221309">bsc#1221309</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222423">bsc#1222423</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222587">bsc#1222587</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222590">bsc#1222590</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223112">bsc#1223112</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223656">bsc#1223656</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223733">bsc#1223733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224429">bsc#1224429</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224518">bsc#1224518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224548">bsc#1224548</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224948">bsc#1224948</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225713">bsc#1225713</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225725">bsc#1225725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225730">bsc#1225730</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225764">bsc#1225764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225768">bsc#1225768</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225813">bsc#1225813</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">bsc#1225903</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226130">bsc#1226130</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226748">bsc#1226748</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226872">bsc#1226872</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227726">bsc#1227726</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227842">bsc#1227842</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228430">bsc#1228430</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">bsc#1228850</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229165">bsc#1229165</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230231">bsc#1230231</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230557">bsc#1230557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230558">bsc#1230558</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230733">bsc#1230733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230807">bsc#1230807</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230817">bsc#1230817</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230827">bsc#1230827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230971">bsc#1230971</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231076">bsc#1231076</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231114">bsc#1231114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231182">bsc#1231182</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231453">bsc#1231453</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231465">bsc#1231465</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231630">bsc#1231630</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">bsc#1231920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231930">bsc#1231930</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231946">bsc#1231946</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231952">bsc#1231952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232096">bsc#1232096</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232103">bsc#1232103</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232104">bsc#1232104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232157">bsc#1232157</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232165">bsc#1232165</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232166">bsc#1232166</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">bsc#1232198</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">bsc#1232201</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232207">bsc#1232207</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232208">bsc#1232208</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232224">bsc#1232224</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232258">bsc#1232258</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232264">bsc#1232264</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232272">bsc#1232272</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232318">bsc#1232318</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232335">bsc#1232335</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232357">bsc#1232357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232358">bsc#1232358</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232361">bsc#1232361</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232366">bsc#1232366</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232367">bsc#1232367</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232368">bsc#1232368</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232371">bsc#1232371</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232374">bsc#1232374</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232385">bsc#1232385</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232386">bsc#1232386</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232387">bsc#1232387</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232396">bsc#1232396</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232413">bsc#1232413</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232416">bsc#1232416</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232436">bsc#1232436</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232442">bsc#1232442</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232446">bsc#1232446</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232483">bsc#1232483</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232494">bsc#1232494</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232498">bsc#1232498</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232499">bsc#1232499</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232500">bsc#1232500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232704">bsc#1232704</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232757">bsc#1232757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232823">bsc#1232823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232860">bsc#1232860</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232869">bsc#1232869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232870">bsc#1232870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232873">bsc#1232873</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232876">bsc#1232876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232877">bsc#1232877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232878">bsc#1232878</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232880">bsc#1232880</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232881">bsc#1232881</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232884">bsc#1232884</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232885">bsc#1232885</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232887">bsc#1232887</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232888">bsc#1232888</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232890">bsc#1232890</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232892">bsc#1232892</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232894">bsc#1232894</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232896">bsc#1232896</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232897">bsc#1232897</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232905">bsc#1232905</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232907">bsc#1232907</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232914">bsc#1232914</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">bsc#1232919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232925">bsc#1232925</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232926">bsc#1232926</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232928">bsc#1232928</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232935">bsc#1232935</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233029">bsc#1233029</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233032">bsc#1233032</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233035">bsc#1233035</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233036">bsc#1233036</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233041">bsc#1233041</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233044">bsc#1233044</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233049">bsc#1233049</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233050">bsc#1233050</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233051">bsc#1233051</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233056">bsc#1233056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233057">bsc#1233057</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233061">bsc#1233061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233062">bsc#1233062</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233063">bsc#1233063</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233065">bsc#1233065</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233067">bsc#1233067</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233070">bsc#1233070</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233073">bsc#1233073</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233074">bsc#1233074</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233088">bsc#1233088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233091">bsc#1233091</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233092">bsc#1233092</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233097">bsc#1233097</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233100">bsc#1233100</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233103">bsc#1233103</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233104">bsc#1233104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233105">bsc#1233105</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233106">bsc#1233106</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233107">bsc#1233107</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233108">bsc#1233108</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233110">bsc#1233110</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233111">bsc#1233111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233113">bsc#1233113</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233114">bsc#1233114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233115">bsc#1233115</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233117">bsc#1233117</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233119">bsc#1233119</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233123">bsc#1233123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233125">bsc#1233125</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233127">bsc#1233127</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233129">bsc#1233129</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233130">bsc#1233130</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233132">bsc#1233132</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233135">bsc#1233135</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233176">bsc#1233176</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233179">bsc#1233179</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233185">bsc#1233185</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233188">bsc#1233188</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233189">bsc#1233189</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233191">bsc#1233191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233193">bsc#1233193</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233197">bsc#1233197</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233201">bsc#1233201</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233203">bsc#1233203</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233204">bsc#1233204</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233205">bsc#1233205</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233206">bsc#1233206</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233207">bsc#1233207</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233208">bsc#1233208</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233209">bsc#1233209</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233210">bsc#1233210</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233211">bsc#1233211</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233212">bsc#1233212</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233216">bsc#1233216</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233217">bsc#1233217</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233219">bsc#1233219</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233226">bsc#1233226</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233238">bsc#1233238</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233241">bsc#1233241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233244">bsc#1233244</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233253">bsc#1233253</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233255">bsc#1233255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233293">bsc#1233293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233298">bsc#1233298</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233305">bsc#1233305</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233320">bsc#1233320</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233350">bsc#1233350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233443">bsc#1233443</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233452">bsc#1233452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233453">bsc#1233453</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233454">bsc#1233454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233456">bsc#1233456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233457">bsc#1233457</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233458">bsc#1233458</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233460">bsc#1233460</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233462">bsc#1233462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233463">bsc#1233463</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233464">bsc#1233464</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233465">bsc#1233465</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233468">bsc#1233468</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233471">bsc#1233471</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233476">bsc#1233476</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233478">bsc#1233478</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">bsc#1233479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233481">bsc#1233481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233484">bsc#1233484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233485">bsc#1233485</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233487">bsc#1233487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233490">bsc#1233490</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233491">bsc#1233491</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233523">bsc#1233523</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233524">bsc#1233524</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233540">bsc#1233540</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233547">bsc#1233547</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233548">bsc#1233548</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233550">bsc#1233550</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233552">bsc#1233552</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233553">bsc#1233553</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233554">bsc#1233554</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233555">bsc#1233555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">bsc#1233557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233560">bsc#1233560</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233561">bsc#1233561</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233564">bsc#1233564</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233566">bsc#1233566</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233567">bsc#1233567</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233568">bsc#1233568</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233570">bsc#1233570</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233572">bsc#1233572</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233573">bsc#1233573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233577">bsc#1233577</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233580">bsc#1233580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233640">bsc#1233640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233641">bsc#1233641</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233642">bsc#1233642</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233721">bsc#1233721</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233754">bsc#1233754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233756">bsc#1233756</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233769">bsc#1233769</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233771">bsc#1233771</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233977">bsc#1233977</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234009">bsc#1234009</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234011">bsc#1234011</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234012">bsc#1234012</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234025">bsc#1234025</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234039">bsc#1234039</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234040">bsc#1234040</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234041">bsc#1234041</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234042">bsc#1234042</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234043">bsc#1234043</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234044">bsc#1234044</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234045">bsc#1234045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234046">bsc#1234046</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234072">bsc#1234072</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234078">bsc#1234078</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234081">bsc#1234081</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234083">bsc#1234083</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234085">bsc#1234085</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234087">bsc#1234087</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234093">bsc#1234093</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234098">bsc#1234098</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234108">bsc#1234108</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234121">bsc#1234121</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234223">bsc#1234223</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-11316">jsc#PED-11316</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-11442">jsc#PED-11442</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-11580">jsc#PED-11580</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-9943">jsc#PED-9943</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52778.html">CVE-2023-52778</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52920.html">CVE-2023-52920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52921.html">CVE-2023-52921</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52922.html">CVE-2023-52922</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26596.html">CVE-2024-26596</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26703.html">CVE-2024-26703</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26741.html">CVE-2024-26741</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26782.html">CVE-2024-26782</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26864.html">CVE-2024-26864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26953.html">CVE-2024-26953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27017.html">CVE-2024-27017</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27407.html">CVE-2024-27407</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35888.html">CVE-2024-35888</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36000.html">CVE-2024-36000</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36031.html">CVE-2024-36031</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36484.html">CVE-2024-36484</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36883.html">CVE-2024-36883</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36886.html">CVE-2024-36886</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36905.html">CVE-2024-36905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36920.html">CVE-2024-36920</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36927.html">CVE-2024-36927</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36954.html">CVE-2024-36954</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36968.html">CVE-2024-36968</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38589.html">CVE-2024-38589</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40914.html">CVE-2024-40914</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41023.html">CVE-2024-41023</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42102.html">CVE-2024-42102</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44995.html">CVE-2024-44995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46680.html">CVE-2024-46680</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46681.html">CVE-2024-46681</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46765.html">CVE-2024-46765</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46788.html">CVE-2024-46788</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46800.html">CVE-2024-46800</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46828.html">CVE-2024-46828</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46845.html">CVE-2024-46845</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47666.html">CVE-2024-47666</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47679.html">CVE-2024-47679</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">CVE-2024-47701</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47703.html">CVE-2024-47703</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49868.html">CVE-2024-49868</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">CVE-2024-49884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49888.html">CVE-2024-49888</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49899.html">CVE-2024-49899</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49905.html">CVE-2024-49905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49908.html">CVE-2024-49908</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49911.html">CVE-2024-49911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49912.html">CVE-2024-49912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49921.html">CVE-2024-49921</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49922.html">CVE-2024-49922</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49923.html">CVE-2024-49923</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49925.html">CVE-2024-49925</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49933.html">CVE-2024-49933</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49934.html">CVE-2024-49934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49944.html">CVE-2024-49944</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49945.html">CVE-2024-49945</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49952.html">CVE-2024-49952</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49968.html">CVE-2024-49968</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49975.html">CVE-2024-49975</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49976.html">CVE-2024-49976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49983.html">CVE-2024-49983</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49987.html">CVE-2024-49987</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49989.html">CVE-2024-49989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50003.html">CVE-2024-50003</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50004.html">CVE-2024-50004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50006.html">CVE-2024-50006</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50009.html">CVE-2024-50009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50012.html">CVE-2024-50012</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50014.html">CVE-2024-50014</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50026.html">CVE-2024-50026</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50067.html">CVE-2024-50067</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50082.html">CVE-2024-50082</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50084.html">CVE-2024-50084</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50087.html">CVE-2024-50087</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50088.html">CVE-2024-50088</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50089.html">CVE-2024-50089</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50093.html">CVE-2024-50093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50095.html">CVE-2024-50095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50096.html">CVE-2024-50096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50098.html">CVE-2024-50098</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50099.html">CVE-2024-50099</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50100.html">CVE-2024-50100</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50101.html">CVE-2024-50101</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50102.html">CVE-2024-50102</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50103.html">CVE-2024-50103</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50108.html">CVE-2024-50108</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50110.html">CVE-2024-50110</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">CVE-2024-50115</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50116.html">CVE-2024-50116</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50117.html">CVE-2024-50117</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50121.html">CVE-2024-50121</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50124.html">CVE-2024-50124</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50125.html">CVE-2024-50125</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50127.html">CVE-2024-50127</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50128.html">CVE-2024-50128</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50130.html">CVE-2024-50130</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50131.html">CVE-2024-50131</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50134.html">CVE-2024-50134</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50135.html">CVE-2024-50135</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50136.html">CVE-2024-50136</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50138.html">CVE-2024-50138</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50139.html">CVE-2024-50139</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50141.html">CVE-2024-50141</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50145.html">CVE-2024-50145</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50146.html">CVE-2024-50146</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50147.html">CVE-2024-50147</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50148.html">CVE-2024-50148</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50150.html">CVE-2024-50150</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50153.html">CVE-2024-50153</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50154.html">CVE-2024-50154</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50155.html">CVE-2024-50155</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50156.html">CVE-2024-50156</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50157.html">CVE-2024-50157</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50158.html">CVE-2024-50158</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50159.html">CVE-2024-50159</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50160.html">CVE-2024-50160</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50166.html">CVE-2024-50166</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50167.html">CVE-2024-50167</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50169.html">CVE-2024-50169</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50171.html">CVE-2024-50171</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50172.html">CVE-2024-50172</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50175.html">CVE-2024-50175</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50176.html">CVE-2024-50176</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50177.html">CVE-2024-50177</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50179.html">CVE-2024-50179</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50180.html">CVE-2024-50180</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50181.html">CVE-2024-50181</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50182.html">CVE-2024-50182</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50183.html">CVE-2024-50183</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50184.html">CVE-2024-50184</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50186.html">CVE-2024-50186</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50187.html">CVE-2024-50187</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50188.html">CVE-2024-50188</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50189.html">CVE-2024-50189</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50192.html">CVE-2024-50192</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50194.html">CVE-2024-50194</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50195.html">CVE-2024-50195</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50196.html">CVE-2024-50196</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50198.html">CVE-2024-50198</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50200.html">CVE-2024-50200</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50201.html">CVE-2024-50201</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50205.html">CVE-2024-50205</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50208.html">CVE-2024-50208</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50209.html">CVE-2024-50209</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50210.html">CVE-2024-50210</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50215.html">CVE-2024-50215</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50216.html">CVE-2024-50216</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50218.html">CVE-2024-50218</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50221.html">CVE-2024-50221</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50224.html">CVE-2024-50224</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50225.html">CVE-2024-50225</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50228.html">CVE-2024-50228</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50229.html">CVE-2024-50229</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50230.html">CVE-2024-50230</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50231.html">CVE-2024-50231</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50232.html">CVE-2024-50232</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50233.html">CVE-2024-50233</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50234.html">CVE-2024-50234</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50235.html">CVE-2024-50235</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50236.html">CVE-2024-50236</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50237.html">CVE-2024-50237</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50240.html">CVE-2024-50240</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50245.html">CVE-2024-50245</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50246.html">CVE-2024-50246</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50248.html">CVE-2024-50248</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50249.html">CVE-2024-50249</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50250.html">CVE-2024-50250</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50252.html">CVE-2024-50252</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50255.html">CVE-2024-50255</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50257.html">CVE-2024-50257</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50261.html">CVE-2024-50261</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50264.html">CVE-2024-50264</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50265.html">CVE-2024-50265</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50267.html">CVE-2024-50267</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50268.html">CVE-2024-50268</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50269.html">CVE-2024-50269</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50271.html">CVE-2024-50271</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50273.html">CVE-2024-50273</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50274.html">CVE-2024-50274</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50275.html">CVE-2024-50275</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50276.html">CVE-2024-50276</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50279.html">CVE-2024-50279</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50282.html">CVE-2024-50282</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50287.html">CVE-2024-50287</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50289.html">CVE-2024-50289</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">CVE-2024-50290</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50292.html">CVE-2024-50292</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50295.html">CVE-2024-50295</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50296.html">CVE-2024-50296</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50298.html">CVE-2024-50298</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50301.html">CVE-2024-50301</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50302.html">CVE-2024-50302</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53042.html">CVE-2024-53042</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53043.html">CVE-2024-53043</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53045.html">CVE-2024-53045</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53048.html">CVE-2024-53048</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53051.html">CVE-2024-53051</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53052.html">CVE-2024-53052</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53055.html">CVE-2024-53055</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53056.html">CVE-2024-53056</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53058.html">CVE-2024-53058</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53059.html">CVE-2024-53059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53060.html">CVE-2024-53060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53061.html">CVE-2024-53061</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">CVE-2024-53063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53066.html">CVE-2024-53066</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53068.html">CVE-2024-53068</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53072.html">CVE-2024-53072</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53074.html">CVE-2024-53074</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53076.html">CVE-2024-53076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53079.html">CVE-2024-53079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53081.html">CVE-2024-53081</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53082.html">CVE-2024-53082</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53085.html">CVE-2024-53085</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53088.html">CVE-2024-53088</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53093.html">CVE-2024-53093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53094.html">CVE-2024-53094</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53095.html">CVE-2024-53095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53096.html">CVE-2024-53096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53100.html">CVE-2024-53100</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53101.html">CVE-2024-53101</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53104.html">CVE-2024-53104</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53106.html">CVE-2024-53106</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53108.html">CVE-2024-53108</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53110.html">CVE-2024-53110</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53112.html">CVE-2024-53112</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53114.html">CVE-2024-53114</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53121.html">CVE-2024-53121</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53138.html">CVE-2024-53138</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52778</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52920</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26596</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26596</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26703</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26741</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26782</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27017</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27407</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35888</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35888</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36000</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36031</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36484</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36886</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36886</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36920</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36954</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36968</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36968</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38589</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40914</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41023</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41023</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42102</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42102</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42102</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44995</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46680</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46680</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46680</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46765</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46765</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46765</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46788</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46788</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46788</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46828</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46845</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46845</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47666</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47666</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47666</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47703</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47703</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47703</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49888</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49888</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49888</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49899</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49911</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49912</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49922</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49923</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49933</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49933</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49933</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49944</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49944</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49945</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49945</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49952</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49952</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49975</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49975</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49976</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49983</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49983</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49987</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49987</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49987</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50004</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50006</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50006</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50006</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50012</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50014</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50026</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50026</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50082</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50082</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50084</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50084</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50084</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50087</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50087</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50088</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50088</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50093</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50095</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50096</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50098</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50098</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50099</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50099</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50100</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50100</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50101</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50101</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50102</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50102</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50103</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50103</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50108</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50108</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50110</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50121</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50121</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50121</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50121</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50130</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50130</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50131</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50136</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50136</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50136</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50139</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50139</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50139</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50145</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50145</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50155</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50155</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50157</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50157</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50158</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50158</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50159</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50159</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50166</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50166</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50167</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50167</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50169</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50169</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50169</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50172</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50172</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50175</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50175</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50176</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50176</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50177</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50177</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50177</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50181</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50181</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50181</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50186</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50186</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50187</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50187</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50188</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50188</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50189</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50189</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50192</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50192</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50194</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50194</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50195</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50195</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50196</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50196</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50198</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50198</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50200</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50201</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50201</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50210</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50210</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50210</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50215</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50215</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50216</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50218</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50221</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50221</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50221</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50224</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50224</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50225</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50225</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50228</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50228</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50228</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50231</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50231</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50231</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50235</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50235</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50240</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50240</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50240</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50245</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50245</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50245</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50246</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50246</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50246</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50248</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50248</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50248</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50249</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50249</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50250</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50250</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50250</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50252</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50252</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50252</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50257</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50257</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50257</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50257</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50265</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50265</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50268</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50268</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50269</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50269</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50271</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50271</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50273</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50273</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50274</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50274</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50275</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50275</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50276</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50276</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50279</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50279</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50282</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50282</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50287</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50287</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50289</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50292</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50295</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50296</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50296</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50298</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50298</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50301</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50301</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50302</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50302</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53042</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53042</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53043</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53043</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53045</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53045</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53048</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53048</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53051</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53051</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53052</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53052</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53055</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53055</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53056</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53056</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53058</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53059</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53060</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53061</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53061</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53066</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53068</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53068</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53072</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53072</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53074</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53074</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53076</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53079</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53081</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53081</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53082</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53082</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53085</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53085</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53088</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53088</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53094</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53095</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53100</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53100</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53101</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53101</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53104</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53104</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53106</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53108</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53108</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53112</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53112</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53112</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53114</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53114</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53121</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53121</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.6</li>

<li class="list-group-item">Public Cloud
Module 15-SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP6</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 228 vulnerabilities, contains four features
and has 44 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to
receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-52778: mptcp: deal with large GSO size
(bsc#1224948).</li>
<li>CVE-2023-52920: bpf: support non-r10 register spill/fill to/from
stack in precision tracking (bsc#1232823).</li>
<li>CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check
on non-DSA netdevice events (bsc#1220355).</li>
<li>CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure
after check_estalblished() (bsc#1222587).</li>
<li>CVE-2024-26782: mptcp: fix double-free on socket dismantle
(bsc#1222590).</li>
<li>CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).</li>
<li>CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on
netlink dump (bsc#1223733).</li>
<li>CVE-2024-35888: erspan: make sure erspan_base_hdr is present in
skb-&gt;head (bsc#1224518).</li>
<li>CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv
uncharge (bsc#1224548).</li>
<li>CVE-2024-36883: net: fix out-of-bounds access in ops_init
(bsc#1225725).</li>
<li>CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).</li>
<li>CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV
sockets (bsc#1225742).</li>
<li>CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).</li>
<li>CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).</li>
<li>CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in
l2cap_le_flowctl_init() (bsc#1226130).</li>
<li>CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).</li>
<li>CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).</li>
<li>CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).</li>
<li>CVE-2024-42102: Revert &quot;mm/writeback: fix possible
divide-by-zero in wb_dirty_limits(), again&quot; (bsc#1233132).</li>
<li>CVE-2024-44995: net: hns3: fix a deadlock problem when config TC
during resetting (bsc#1230231).</li>
<li>CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while
removing driver (bsc#1230557).</li>
<li>CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init()
(bsc#1230558).</li>
<li>CVE-2024-46765: ice: protect XDP configuration with a mutex
(bsc#1230807).</li>
<li>CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).</li>
<li>CVE-2024-47679: vfs: fix race between evice_inodes() and
find_inode()&amp;iput() (bsc#1231930).</li>
<li>CVE-2024-47701: ext4: avoid OOB when system.data xattr changes
underneath the filesystem (bsc#1231920).</li>
<li>CVE-2024-47703: bpf, lsm: add check for BPF LSM return value
(bsc#1231946).</li>
<li>CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to
start a new trasacntion (bsc#1232272).</li>
<li>CVE-2024-49888: bpf: Fix a sdiv overflow issue
(bsc#1232208).</li>
<li>CVE-2024-49899: drm/amd/display: Initialize denominators&#x27;
default to 1 (bsc#1232358).</li>
<li>CVE-2024-49911: drm/amd/display: Add NULL check for function pointer
in dcn20_set_output_transfer_func (bsc#1232366).</li>
<li>CVE-2024-49912: drm/amd/display: Handle null
&#x27;stream_status&#x27; in &#x27;planes_changed_for_existing_stream&#x27; (bsc#1232367).</li>
<li>CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).</li>
<li>CVE-2024-49922: drm/amd/display: Check null pointers before using
them (bsc#1232374).</li>
<li>CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).</li>
<li>CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver
core (bsc#1232224)</li>
<li>CVE-2024-49933: blk_iocost: fix more out of bound shifts
(bsc#1232368).</li>
<li>CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).</li>
<li>CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails
in sctp_listen_start (bsc#1232166).</li>
<li>CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).</li>
<li>CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated
corruption (bsc#1232157).</li>
<li>CVE-2024-49968: ext4: filesystems without casefold feature cannot be
mounted with siphash (bsc#1232264).</li>
<li>CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to
avoid double-free (bsc#1232096).</li>
<li>CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0,
...) (bsc#1232258).</li>
<li>CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu
module unload (bsc#1232483).</li>
<li>CVE-2024-50003: drm/amd/display: Fix system hang while resume with
TBT monitor (bsc#1232385).</li>
<li>CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).</li>
<li>CVE-2024-50006: ext4: fix i_data_sem unlock order in
ext4_ind_migrate() (bsc#1232442).</li>
<li>CVE-2024-50009: cpufreq: amd-pstate: add check for
cpufreq_cpu_get&#x27;s return value (bsc#1232318).</li>
<li>CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).</li>
<li>CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay
path (bsc#1232446).</li>
<li>CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).</li>
<li>CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).</li>
<li>CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).</li>
<li>CVE-2024-50088: btrfs: fix uninitialized pointer free in
add_inode_ref() (bsc#1232498).</li>
<li>CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut
down (bsc#1232881).</li>
<li>CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).</li>
<li>CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from
memory (bsc#1232919).</li>
<li>CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout
(bsc#1232926).</li>
<li>CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout
(bsc#1232928).</li>
<li>CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).</li>
<li>CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy
(bsc#1232905).</li>
<li>CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).</li>
<li>CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf
(bsc#1232935).</li>
<li>CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug
(bsc#1233062).</li>
<li>CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).</li>
<li>CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).</li>
<li>CVE-2024-50154: tcp/dccp: Do not use timer_pending() in
reqsk_queue_unlink() (bsc#1233070).</li>
<li>CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related
devices (bsc#1233050).</li>
<li>CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).</li>
<li>CVE-2024-50169: vsock: Update rx_bytes on read_skb()
(bsc#1233320).</li>
<li>CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).</li>
<li>CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).</li>
<li>CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set
direct map (bsc#1233129).</li>
<li>CVE-2024-50184: virtio_pmem: Check device status before requesting
flush (bsc#1233135).</li>
<li>CVE-2024-50186: net: explicitly clear the sk pointer, when
pf-&gt;create fails (bsc#1233110).</li>
<li>CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).</li>
<li>CVE-2024-50225: btrfs: fix error propagation of split bios
(bsc#1233193).</li>
<li>CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr()
(bsc#1233204).</li>
<li>CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of
checked flag (bsc#1233206).</li>
<li>CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read
(bsc#1233203).</li>
<li>CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check
(bsc#1233207).</li>
<li>CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr()
(bsc#1233219).</li>
<li>CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).</li>
<li>CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing
remote IPv6 address (bsc#1233201).</li>
<li>CVE-2024-50257: netfilter: Fix use-after-free in get_info()
(bsc#1233244).</li>
<li>CVE-2024-50261: macsec: Fix use-after-free while sending the
offloading packet (bsc#1233253).</li>
<li>CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk-&gt;trans (bsc#1233453).</li>
<li>CVE-2024-50271: signal: restore the override_rlimit logic
(bsc#1233460).</li>
<li>CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting
it from the list (bsc#1233462).</li>
<li>CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).</li>
<li>CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE
traps (bsc#1233464).</li>
<li>CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of
TX skb (bsc#1233465).</li>
<li>CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty
bitset when resizing (bsc#1233468).</li>
<li>CVE-2024-50289: media: av7110: fix a spectre vulnerability
(bsc#1233478).</li>
<li>CVE-2024-50295: net: arc: fix the device for
dma_map_single/dma_unmap_single (bsc#1233484).</li>
<li>CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).</li>
<li>CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).</li>
<li>CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).</li>
<li>CVE-2024-53043: mctp i2c: handle NULL header address
(bsc#1233523).</li>
<li>CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).</li>
<li>CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).</li>
<li>CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).</li>
<li>CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).</li>
<li>CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for
non-paged SKB data (bsc#1233552).</li>
<li>CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).</li>
<li>CVE-2024-53082: virtio_net: Add hash_key_length check
(bsc#1233573).</li>
<li>CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).</li>
<li>CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).</li>
<li>CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).</li>
<li>CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: CPPC: Fix _CPC register setting issue (git-fixes).</li>
<li>ALSA: 6fire: Release resources at card release
(git-fixes).</li>
<li>ALSA: ac97: bus: Fix the mistake in the comment
(git-fixes).</li>
<li>ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init()
(git-fixes).</li>
<li>ALSA: hda/conexant: fix Z60MR100 startup pop issue
(stable-fixes).</li>
<li>ALSA: hda/realtek - Fixed Clevo platform headset Mic issue
(stable-fixes).</li>
<li>ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with
ALC1318 (git-fixes).</li>
<li>ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360
(NP730QFG) (stable-fixes).</li>
<li>ALSA: hda/realtek: Apply quirk for Medion E15433
(bsc#1233298).</li>
<li>ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).</li>
<li>ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4
Max (bsc#1233298).</li>
<li>ALSA: hda/realtek: Set PCBeep to default value for ALC274
(stable-fixes).</li>
<li>ALSA: hda/realtek: Update ALC225 depop procedure
(git-fixes).</li>
<li>ALSA: hda/realtek: Update ALC256 depop procedure
(git-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10
(stable-fixes).</li>
<li>ALSA: hda: Poll jack events for LS7A HD-Audio
(stable-fixes).</li>
<li>ALSA: hda: Show the codec quirk info at probing
(stable-fixes).</li>
<li>ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put
(stable-fixes).</li>
<li>ALSA: pcm: Add sanity NULL check for the default mmap fault handler
(stable-fixes).</li>
<li>ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).</li>
<li>ALSA: us122l: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer
(stable-fixes).</li>
<li>ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry
(stable-fixes).</li>
<li>ALSA: usb-audio: Fix a DMA to stack memory bug
(git-fixes).</li>
<li>ALSA: usb-audio: Fix out of bounds reads when finding clock sources
(stable-fixes).</li>
<li>ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and
Mbox devices (git-fixes).</li>
<li>ALSA: usb-audio: Make mic volume workarounds globally applicable
(stable-fixes).</li>
<li>ALSA: usb-audio: Use snprintf instead of sprintf in
build_mixer_unit_ctl (stable-fixes).</li>
<li>ALSA: usb-audio: add mixer mapping for Corsair HS80
(stable-fixes).</li>
<li>ALSA: usx2y: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post()
(stable-fixes).</li>
<li>ASoC: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).</li>
<li>ASoC: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).</li>
<li>ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).</li>
<li>ASoC: SOF: IPC4: get pipeline priority from topology
(bsc#1233305).</li>
<li>ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).</li>
<li>ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).</li>
<li>ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305).</li>
<li>ASoC: SOF: Wire up buffer flags (bsc#1233305).</li>
<li>ASoC: SOF: add alignment for topology header file struct definition
(bsc#1233305).</li>
<li>ASoC: SOF: align topology header file with sof topology header
(bsc#1233305).</li>
<li>ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai
index (git-fixes).</li>
<li>ASoC: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).</li>
<li>ASoC: SOF: ipc4-control: Add support for ALSA enum control
(bsc#1233305).</li>
<li>ASoC: SOF: ipc4-control: Add support for ALSA switch control
(bsc#1233305).</li>
<li>ASoC: SOF: ipc4-mtrace: move debug slot related definitions to
header.h (bsc#1233305).</li>
<li>ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).</li>
<li>ASoC: SOF: ipc4-topology: Add definition for generic switch/enum
control (bsc#1233305).</li>
<li>ASoC: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).</li>
<li>ASoC: SOF: ipc4-topology: Helper to find an swidget by
module/instance id (bsc#1233305).</li>
<li>ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for
ChainDMA (bsc#1233305).</li>
<li>ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).</li>
<li>ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).</li>
<li>ASoC: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).</li>
<li>ASoC: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).</li>
<li>ASoC: SOF: ipc4: Add new message type:
SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305).</li>
<li>ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits
(git-fixes).</li>
<li>ASoC: SOF: topology: Parse DAI type token for dspless mode
(bsc#1233305).</li>
<li>ASoC: SOF: topology: dynamically allocate and store DAI
widget-&gt;private (bsc#1233305).</li>
<li>ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA
(stable-fixes).</li>
<li>ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry
(git-fixes).</li>
<li>ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA
(stable-fixes).</li>
<li>ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14
Gen 6 (stable-fixes).</li>
<li>ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022
(stable-fixes).</li>
<li>ASoC: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).</li>
<li>ASoC: codecs: Fix atomicity violation in
snd_soc_component_get_drvdata() (git-fixes).</li>
<li>ASoC: fsl_micfil: Add sample rate constraint
(stable-fixes).</li>
<li>ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes).</li>
<li>ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec
(git-fixes).</li>
<li>ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c
(git-fixes).</li>
<li>ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue
(stable-fixes).</li>
<li>ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
(git-fixes).</li>
<li>ASoC: stm: Prevent potential division by zero in
stm32_sai_get_clk_div() (stable-fixes).</li>
<li>ASoC: stm: Prevent potential division by zero in
stm32_sai_mclk_round_rate() (stable-fixes).</li>
<li>ASoC: tas2781: Add new driver version for tas2563 &amp; tas2781
qfn chip (stable-fixes).</li>
<li>Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
(git-fixes).</li>
<li>Bluetooth: btintel: Direct exception event to bluetooth stack
(git-fixes).</li>
<li>Bluetooth: btnxpuart: Resolve TX timeout error in power save stress
test (bsc#1230557)</li>
<li>Bluetooth: fix use-after-free in device_for_each_child()
(git-fixes).</li>
<li>Bluetooth: hci_core: Fix calling mgmt_device_connected
(git-fixes).</li>
<li>Documentation: kgdb: Correct parameter error (git-fixes).</li>
<li>Drop OCFS2 patch causing a regression (bsc#1233255)</li>
<li>HID: core: zero-initialize the report buffer (git-fixes).</li>
<li>HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard
(stable-fixes).</li>
<li>HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad
(stable-fixes).</li>
<li>HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa
touchpad (stable-fixes).</li>
<li>HID: multitouch: Add support for B2402FVA track point
(stable-fixes).</li>
<li>HID: wacom: Interpret tilt data from Intuos Pro BT as signed values
(git-fixes).</li>
<li>HID: wacom: fix when get product name maybe null pointer
(git-fixes).</li>
<li>Input: hideep - add missing dependency on REGMAP_I2C
(git-fixes).</li>
<li>Input: hycon-hy46xx - add missing dependency on REGMAP_I2C
(git-fixes).</li>
<li>Input: xpad - add GameSir T4 Kaleid Controller support
(git-fixes).</li>
<li>Input: xpad - add GameSir VID for Xbox One controllers
(git-fixes).</li>
<li>Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller
(git-fixes).</li>
<li>Input: xpad - add support for MSI Claw A1M (git-fixes).</li>
<li>Input: xpad - add support for Machenike G5 Pro Controller
(git-fixes).</li>
<li>Input: xpad - fix support for some third-party controllers
(git-fixes).</li>
<li>Input: xpad - sort xpad_device by vendor and product ID
(git-fixes).</li>
<li>Input: xpad - spelling fixes for &quot;Xbox&quot;
(git-fixes).</li>
<li>KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).</li>
<li>KVM: PPC: Book3S HV: Stop using vc-&gt;dpdes for nested KVM
guests (bsc#1215199).</li>
<li>KVM: PPC: Book3S HV: remove unused varible (bsc#1194869).</li>
<li>KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT
guests (bsc#1232207).</li>
<li>KVM: SEV-ES: Prevent MSR access post VMSA encryption
(bsc#1232207).</li>
<li>Move kabi netfilter fix into patches.kabi</li>
<li>Move upstreamed crypto patches into sorted section</li>
<li>Move upstreamed patches into sorted section</li>
<li>NFS: remove revoked delegation from server&#x27;s delegation list
(git-fixes).</li>
<li>PCI: Add T_PVPERL macro (git-fixes).</li>
<li>PCI: Fix reset_method_store() memory leak (git-fixes).</li>
<li>PCI: endpoint: Clear secondary (not primary) EPC in
pci_epc_remove_epf() (git-fixes).</li>
<li>PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS
milliseconds (git-fixes).</li>
<li>PCI: keystone: Add link up check to ks_pcie_other_map_bus()
(git-fixes).</li>
<li>PCI: keystone: Set mode as Root Complex for
&quot;ti,keystone-pcie&quot; compatible (git-fixes).</li>
<li>PCI: rockchip-ep: Fix address translation unit programming
(git-fixes).</li>
<li>RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey
(git-fixes)</li>
<li>RDMA/hns: Add mutex_destroy() (git-fixes)</li>
<li>RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset
(git-fixes)</li>
<li>RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()
(git-fixes)</li>
<li>RDMA/hns: Fix an AEQE overflow error caused by untimely update of
eq_db_ci (git-fixes)</li>
<li>RDMA/hns: Fix cpu stuck caused by printings during reset
(git-fixes)</li>
<li>RDMA/hns: Fix different dgids mapping to the same dip_idx
(git-fixes)</li>
<li>RDMA/hns: Fix flush cqe error when racing with destroy qp
(git-fixes)</li>
<li>RDMA/hns: Fix out-of-order issue of requester when setting FENCE
(git-fixes)</li>
<li>RDMA/hns: Use dev_<em> printings in hem code instead of
ibdev_</em> (git-fixes)</li>
<li>RDMA/hns: Use macro instead of magic number (git-fixes)</li>
<li>RDMA/mlx5: Move events notifier registration to be after device
registration (git-fixes)</li>
<li>RDMA/rxe: Fix the qp flush warnings in req (git-fixes)</li>
<li>RDMA/rxe: Set queue pair cur_qp_state when being queried
(git-fixes)</li>
<li>RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES
(git-fixes)</li>
<li>Revert &quot;KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs
to L1&quot; (bsc#1215199).</li>
<li>Revert &quot;RDMA/core: Fix ENODEV error for iWARP test over
vlan&quot; (git-fixes)</li>
<li>Revert &quot;cgroup: Fix memory leak caused by missing
cgroup_bpf_offline&quot; (bsc#1234108).</li>
<li>Revert &quot;cpufreq: brcmstb-avs-cpufreq: Fix initial command
check&quot; (stable-fixes).</li>
<li>Revert &quot;mmc: dw_mmc: Fix IDMAC operation with pages bigger
than 4K&quot; (git-fixes).</li>
<li>Revert &quot;usb: gadget: composite: fix OS descriptors w_value
logic&quot; (git-fixes).</li>
<li>SUNRPC: Remove BUG_ON call sites (git-fixes).</li>
<li>USB: chaoskey: Fix possible deadlock chaoskey_list_lock
(git-fixes).</li>
<li>USB: chaoskey: fail open after removal (git-fixes).</li>
<li>USB: gadget: dummy-hcd: Fix &quot;task hung&quot; problem
(git-fixes).</li>
<li>USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info()
(git-fixes).</li>
<li>USB: serial: io_edgeport: fix use after free in debug printk
(git-fixes).</li>
<li>USB: serial: option: add Fibocom FG132 0x0112 composition
(stable-fixes).</li>
<li>USB: serial: option: add Quectel RG650V (stable-fixes).</li>
<li>USB: serial: qcserial: add support for Sierra Wireless EM86xx
(stable-fixes).</li>
<li>Update config files (bsc#1218644).</li>
<li>Update config files. Enabled IDPF for ARM64 (bsc#1221309)</li>
<li>accel: Use XArray instead of IDR for minors
(jsc#PED-11580).</li>
<li>acpi/arm64: Adjust error handling procedure in
gtdt_parse_timer_block() (git-fixes).</li>
<li>ad7780: fix division by zero in ad7780_write_raw()
(git-fixes).</li>
<li>add bugreference to a hv_netvsc patch (bsc#1232413).</li>
<li>aes-gcm-p10: Use the correct bit to test for P10
(bsc#1232704).</li>
<li>amd-pstate: Set min_perf to nominal_perf for active mode performance
gov (git-fixes).</li>
<li>apparmor: fix &#x27;Do simple duplicate message
elimination&#x27; (git-fixes).</li>
<li>apparmor: test: Fix memory leak for aa_unpack_strdup()
(git-fixes).</li>
<li>apparmor: use kvfree_sensitive to free data-&gt;data
(git-fixes).</li>
<li>arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer
(git-fixes)</li>
<li>arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay
(git-fixes)</li>
<li>arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay
(git-fixes)</li>
<li>arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)</li>
<li>arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)</li>
<li>arm64: dts: imx93: add nvmem property for eqos (git-fixes)</li>
<li>arm64: dts: imx93: add nvmem property for fec1 (git-fixes)</li>
<li>arm64: dts: imx93: add ocotp node (git-fixes)</li>
<li>arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus
(git-fixes)</li>
<li>arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes
(git-fixes)</li>
<li>arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc
(git-fixes)</li>
<li>arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards
(git-fixes)</li>
<li>arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo
(git-fixes)</li>
<li>arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes
(git-fixes)</li>
<li>arm64: dts: rockchip: Fix rt5651 compatible value on
(git-fixes)</li>
<li>arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610
(git-fixes)</li>
<li>arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node
(git-fixes)</li>
<li>arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma
(git-fixes)</li>
<li>arm64: dts: rockchip: Remove hdmi&#x27;s 2nd interrupt on rk3328
(git-fixes)</li>
<li>arm64: dts: rockchip: Remove undocumented supports-emmc property
(git-fixes)</li>
<li>arm64: dts: rockchip: fix i2c2 pinctrl-names property on
(git-fixes)</li>
<li>arm64: dts: rockchip: remove num-slots property from
(git-fixes)</li>
<li>arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone
(git-fixes)</li>
<li>arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG
(git-fixes)</li>
<li>arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint
(git-fixes)</li>
<li>arm64: smccc: replace custom COUNT_ARGS() &amp; CONCATENATE()
(git-fixes)</li>
<li>arm64: tegra: Move AGX Orin nodes to correct location
(git-fixes)</li>
<li>arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled
(git-fixes)</li>
<li>bpf, arm64: Fix address emission with tag-based KASAN enabled
(git-fixes)</li>
<li>bpf, arm64: Remove garbage frame for struct_ops trampoline
(git-fixes)</li>
<li>bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock
(git-fixes).</li>
<li>bpf, vsock: Drop static vsock_bpf_prot initialization
(git-fixes).</li>
<li>btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io()
(bsc#1233193)</li>
<li>can: c_can: c_can_handle_bus_err(): update statistics if skb
allocation fails (git-fixes).</li>
<li>can: c_can: fix {rx,tx}_errors statistics (git-fixes).</li>
<li>can: dev: can_set_termination(): allow sleeping GPIOs
(git-fixes).</li>
<li>can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>can: hi311x: hi3110_can_ist(): fix potential use-after-free
(git-fixes).</li>
<li>can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors
statistics (git-fixes).</li>
<li>can: j1939: j1939_session_new(): fix skb reference counting
(git-fixes).</li>
<li>can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation
(git-fixes).</li>
<li>can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum
DS80000789E 6 (git-fixes).</li>
<li>can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration
when switching CAN modes (git-fixes).</li>
<li>can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf
is NULL (git-fixes).</li>
<li>can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>cgroup/bpf: only cgroup v2 can be attached by bpf programs
(bsc#1234108).</li>
<li>clk: clk-apple-nco: Add NULL check in applnco_probe
(git-fixes).</li>
<li>clk: clk-axi-clkgen: make sure to enable the AXI bus clock
(git-fixes).</li>
<li>clk: imx: clk-scu: fix clk enable state save and restore
(git-fixes).</li>
<li>clk: imx: fracn-gppll: correct PLL initialization flow
(git-fixes).</li>
<li>clk: imx: fracn-gppll: fix pll power up (git-fixes).</li>
<li>clk: imx: lpcg-scu: SW workaround for errata (e10858)
(git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning
(git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check
(git-fixes).</li>
<li>clk: qcom: gcc-qcs404: fix initial rate of GPLL3
(git-fixes).</li>
<li>clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).</li>
<li>clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).</li>
<li>comedi: Flush partial mappings in error case (git-fixes).</li>
<li>cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost()
(git-fixes).</li>
<li>cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw()
(git-fixes).</li>
<li>cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost()
(git-fixes).</li>
<li>cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power()
(git-fixes).</li>
<li>cpufreq: loongson2: Unregister platform_driver on failure
(git-fixes).</li>
<li>cpufreq: mediatek-hw: Fix wrong return value in
mtk_cpufreq_get_cpu_power() (git-fixes).</li>
<li>crypto: aes-gcm-p10 - Use the correct bit to test for P10
(bsc#1232704).</li>
<li>crypto: api - Fix liveliness check in crypto_alg_tested
(stable-fixes).</li>
<li>crypto: bcm - add error check in the ahash_hmac_init function
(git-fixes).</li>
<li>crypto: caam - Fix the pointer passed to caam_qi_shutdown()
(git-fixes).</li>
<li>crypto: caam - add error check to caam_rsa_set_priv_key_form
(git-fixes).</li>
<li>crypto: cavium - Fix an error handling path in cpt_ucode_load_fw()
(git-fixes).</li>
<li>crypto: cavium - Fix the if condition to exit loop after timeout
(git-fixes).</li>
<li>crypto: inside-secure - Fix the return value of
safexcel_xcbcmac_cra_init() (git-fixes).</li>
<li>crypto: pcrypt - Call crypto layer directly when padata_do_parallel()
return -EBUSY (git-fixes).</li>
<li>crypto: qat - remove check after debugfs_create_dir()
(git-fixes).</li>
<li>crypto: qat - remove faulty arbiter config reset
(git-fixes).</li>
<li>crypto: qat/qat_4xxx - fix off by one in uof_get_name()
(git-fixes).</li>
<li>crypto: x86/aegis128 - access 32-bit arguments as 32-bit
(git-fixes).</li>
<li>cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).</li>
<li>dma-fence: Fix reference leak on fence merge failure path
(git-fixes).</li>
<li>dma-fence: Use kernel&#x27;s sort for merging fences
(git-fixes).</li>
<li>doc: rcu: update printed dynticks counter bits
(git-fixes).</li>
<li>drivers: soc: xilinx: add the missing kfree in
xlnx_add_cb_for_suspend() (git-fixes).</li>
<li>drm/amd/display: Adjust VSDB parser for replay feature
(stable-fixes).</li>
<li>drm/amd/display: Fix brightness level not retained over reboot
(git-fixes).</li>
<li>drm/amd/display: Fix null check for pipe_ctx-&gt;plane_state in
dcn20_program_pipe (git-fixes).</li>
<li>drm/amd/display: Fix null check for pipe_ctx-&gt;plane_state in
hwss_setup_dpp (git-fixes).</li>
<li>drm/amd: Add some missing straps from NBIO 7.11.0
(git-fixes).</li>
<li>drm/amd: Fix initialization mistake for NBIO 7.7.0
(stable-fixes).</li>
<li>drm/amdgpu: Adjust debugfs eviction and IB access permissions
(stable-fixes).</li>
<li>drm/amdgpu: Adjust debugfs register access permissions
(stable-fixes).</li>
<li>drm/amdgpu: Fix DPX valid mode check on GC 9.4.3
(git-fixes).</li>
<li>drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).</li>
<li>drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
(stable-fixes).</li>
<li>drm/amdgpu: fix check in gmc_v9_0_get_vm_pte()
(git-fixes).</li>
<li>drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
(git-fixes).</li>
<li>drm/amdkfd: Accounting pdd vram_usage for svm
(stable-fixes).</li>
<li>drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).</li>
<li>drm/bridge: anx7625: Drop EDID cache on bridge power off
(git-fixes).</li>
<li>drm/bridge: it6505: Drop EDID cache on bridge power off
(git-fixes).</li>
<li>drm/bridge: tc358767: Fix link properties discovery
(git-fixes).</li>
<li>drm/bridge: tc358768: Fix DSI command tx (git-fixes).</li>
<li>drm/etnaviv: Request pages from DMA32 zone on addressing_limited
(git-fixes).</li>
<li>drm/etnaviv: hold GPU lock across perfmon sampling
(git-fixes).</li>
<li>drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>drm/mediatek: Fix child node refcount handling in early exit
(git-fixes).</li>
<li>drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused
(git-fixes).</li>
<li>drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>drm/msm/dpu: cast crtc_clk calculation to u64 in
_dpu_core_perf_calc_clk() (git-fixes).</li>
<li>drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).</li>
<li>drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).</li>
<li>drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block
(git-fixes).</li>
<li>drm/msm/gpu: Check the status of registration to PM QoS
(git-fixes).</li>
<li>drm/msm: Fix some typos in comment (git-fixes).</li>
<li>drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new()
(git-fixes).</li>
<li>drm/omap: Fix locking in omap_gem_new_dmabuf()
(git-fixes).</li>
<li>drm/omap: Fix possible NULL dereference (git-fixes).</li>
<li>drm/panfrost: Add missing OPP table refcnt decremental
(git-fixes).</li>
<li>drm/panfrost: Remove unused id_mask from struct panfrost_model
(git-fixes).</li>
<li>drm/rockchip: vop: Fix a dereferenced before check warning
(git-fixes).</li>
<li>drm/sti: Add __iomem for mixer_dbg_mxn&#x27;s parameter
(git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers
(git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).</li>
<li>drm/v3d: Address race-condition in MMU flush (git-fixes).</li>
<li>drm/v3d: Enable Performance Counters before clearing them
(git-fixes).</li>
<li>drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush
(git-fixes).</li>
<li>drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load
(git-fixes).</li>
<li>drm/vc4: hdmi: Avoid hang with debug registers when suspended
(git-fixes).</li>
<li>drm/vc4: hvs: Correct logic on stopping an HVS channel
(git-fixes).</li>
<li>drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).</li>
<li>drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer
(git-fixes).</li>
<li>drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function
(git-fixes).</li>
<li>drm/vkms: Drop unnecessary call to drm_crtc_cleanup()
(git-fixes).</li>
<li>drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).</li>
<li>drm: Expand max DRM device number to full MINORBITS
(jsc#PED-11580).</li>
<li>drm: Use XArray instead of IDR for minors (jsc#PED-11580).</li>
<li>drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).</li>
<li>drm: xlnx: zynqmp_dpsub: fix hotplug detection
(git-fixes).</li>
<li>drm: zynqmp_kms: Unplug DRM device before removal
(git-fixes).</li>
<li>e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).</li>
<li>efi/libstub: Free correct pointer on failure (git-fixes).</li>
<li>efi/libstub: fix efi_parse_options() ignoring the default command
line (git-fixes).</li>
<li>efi/libstub: zboot.lds: Discard .discard sections
(stable-fixes).</li>
<li>efi/memattr: Ignore table if the size is clearly bogus
(bsc#1231465).</li>
<li>ext4: fix unttached inode after power cut with orphan file feature
enabled (bsc#1234009).</li>
<li>f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).</li>
<li>fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem()
(git-fixes).</li>
<li>firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
(git-fixes).</li>
<li>firmware: google: Unregister driver_info on failure
(git-fixes).</li>
<li>firmware_loader: Fix possible resource leak in fw_log_firmware_info()
(git-fixes).</li>
<li>fs/ntfs3: Add more attributes checks in mi_enum_attr()
(bsc#1233207)</li>
<li>fs/ntfs3: Fixed overflow check in mi_enum_attr()
(bsc#1233207)</li>
<li>fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)</li>
<li>fs: Fix uninitialized value issue in from_kuid and from_kgid
(git-fixes).</li>
<li>goldfish: Fix unused const variable
&#x27;goldfish_pipe_acpi_match&#x27; (git-fixes).</li>
<li>gpio: exar: set value when external pull-up or pull-down is present
(git-fixes).</li>
<li>gpio: zevio: Add missed label initialisation (git-fixes).</li>
<li>hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling
pointer (git-fixes).</li>
<li>hwmon: (nct6775-core) Fix overflows seen when writing limit
attributes (git-fixes).</li>
<li>hwmon: (tps23861) Fix reporting of negative temperatures
(git-fixes).</li>
<li>i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is
not set (git-fixes).</li>
<li>i3c: master: Fix miss free init_dyn_addr at
i3c_master_put_i3c_addrs() (git-fixes).</li>
<li>i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm
enabled (git-fixes).</li>
<li>i40e: fix race condition by adding filter&#x27;s intermediate
sync state (git-fixes).</li>
<li>iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call
(git-fixes).</li>
<li>igb: Disable threaded IRQ for igb_msix_other (git-fixes).</li>
<li>iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name()
(git-fixes).</li>
<li>iio: accel: kx022a: Fix raw read format (git-fixes).</li>
<li>iio: adc: ad7606: Fix typo in the driver name (git-fixes).</li>
<li>iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer
(git-fixes).</li>
<li>iio: gts: Fix uninitialized symbol &#x27;ret&#x27;
(git-fixes).</li>
<li>iio: gts: fix infinite loop for gain_to_scaletables()
(git-fixes).</li>
<li>iio: light: al3010: Fix an error handling path in al3010_probe()
(git-fixes).</li>
<li>ima: fix buffer overrun in ima_eventdigest_init_common
(git-fixes).</li>
<li>initramfs: avoid filename buffer overrun (bsc#1232436).</li>
<li>intel_idle: add Granite Rapids Xeon support (bsc#1231630).</li>
<li>intel_idle: fix ACPI _CST matching for newer Xeon platforms
(bsc#1231630).</li>
<li>io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
(git-fixes).</li>
<li>io_uring/sqpoll: close race on waiting for sqring entries
(git-fixes).</li>
<li>irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack
(git-fixes).</li>
<li>jbd2: Move j_transaction_overhead_buffers into a hole
(bsc#1234042).</li>
<li>jbd2: avoid infinite transaction commit loop
(bsc#1234039).</li>
<li>jbd2: avoid memleak in jbd2_journal_write_metadata_buffer
(bsc#1234043).</li>
<li>jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).</li>
<li>jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).</li>
<li>jbd2: fix kernel-doc for j_transaction_overhead_buffers
(bsc#1234042).</li>
<li>jbd2: fix potential data lost in recovering journal raced with
synchronizing fs bdev (bsc#1234044).</li>
<li>jbd2: fix soft lockup in journal_finish_inode_data_buffers()
(bsc#1234046).</li>
<li>jbd2: make jbd2_journal_get_max_txn_bufs() internal
(bsc#1234041).</li>
<li>jbd2: precompute number of transaction descriptor blocks
(bsc#1234042).</li>
<li>kABI workaround for ASoC SOF (bsc#1233305).</li>
<li>kABI: Restore exported __arm_smccc_sve_check (git-fixes)</li>
<li>kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling
(git-fixes kabi).</li>
<li>kasan: move checks to do_strncpy_from_user (git-fixes).</li>
<li>kernel-binary: Enable livepatch package only when livepatch is
enabled Otherwise the filelist may be empty failing the build (bsc#1218644).</li>
<li>kexec_file: fix elfcorehdr digest exclusion when
CONFIG_CRASH_HOTPLUG=y (git-fixes).</li>
<li>leds: lp55xx: Remove redundant test for invalid channel number
(git-fixes).</li>
<li>lib: string_helpers: silence snprintf() output truncation warning
(git-fixes).</li>
<li>mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb()
(git-fixes).</li>
<li>maple_tree: fix alloc node fail issue (git-fixes).</li>
<li>maple_tree: refine mas_store_root() on storing NULL
(git-fixes).</li>
<li>media: adv7604: prevent underflow condition when reporting colorspace
(git-fixes).</li>
<li>media: amphion: Fix pm_runtime_set_suspended() with runtime pm
enabled (git-fixes).</li>
<li>media: amphion: Set video drvdata before register video device
(git-fixes).</li>
<li>media: ar0521: do not overflow when checking PLL values
(git-fixes).</li>
<li>media: atomisp: Add check for rgby_data memory allocation failure
(git-fixes).</li>
<li>media: cx24116: prevent overflows on SNR calculus
(git-fixes).</li>
<li>media: dvb_frontend: do not play tricks with underflow values
(git-fixes).</li>
<li>media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set
(stable-fixes).</li>
<li>media: dvbdev: prevent the risk of out of memory access
(git-fixes).</li>
<li>media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate()
(git-fixes).</li>
<li>media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm
enabled (git-fixes).</li>
<li>media: i2c: tc358743: Fix crash in the probe error path when using
polling (git-fixes).</li>
<li>media: imx-jpeg: Ensure power suppliers be suspended before detach
them (git-fixes).</li>
<li>media: imx-jpeg: Set video drvdata before register video device
(git-fixes).</li>
<li>media: mantis: remove orphan mantis_core.h (git-fixes).</li>
<li>media: mtk-jpeg: Fix null-ptr-deref during unload module
(git-fixes).</li>
<li>media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).</li>
<li>media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).</li>
<li>media: pulse8-cec: fix data timestamp at pulse8_setup()
(git-fixes).</li>
<li>media: s5p-jpeg: prevent buffer overflows (git-fixes).</li>
<li>media: stb0899_algo: initialize cfr before using it
(git-fixes).</li>
<li>media: ts2020: fix null-ptr-deref in ts2020_probe()
(git-fixes).</li>
<li>media: uvcvideo: Require entities to have a non-zero unique ID
(git-fixes).</li>
<li>media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).</li>
<li>media: uvcvideo: Stop stream during unregister
(git-fixes).</li>
<li>media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl()
(git-fixes).</li>
<li>media: v4l2-tpg: prevent the risk of a division by zero
(git-fixes).</li>
<li>media: vb2: Fix comment (git-fixes).</li>
<li>media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).</li>
<li>media: wl128x: Fix atomicity violation in fmc_send_cmd()
(git-fixes).</li>
<li>mfd: rt5033: Fix missing regmap_del_irq_chip()
(git-fixes).</li>
<li>mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race
(git-fixes).</li>
<li>minmax: scsi: fix mis-use of &#x27;clamp()&#x27; in sr.c
(git-fixes).</li>
<li>misc: apds990x: Fix missing pm_runtime_disable()
(git-fixes).</li>
<li>mlxbf_gige: disable RX filters until RX path initialized
(git-fixes).</li>
<li>mm/hugetlb: fix nodes huge page allocation when there are surplus
pages (bsc#1234012).</li>
<li>mm: avoid unsafe VMA hook invocation when error arises on mmap hook
(git-fixes).</li>
<li>mm: move dummy_vm_ops out of a header (git-fixes
prerequisity).</li>
<li>mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling
(git-fixes).</li>
<li>mm: refactor map_deny_write_exec() (git-fixes).</li>
<li>mm: resolve faulty mmap_region() error path behaviour
(git-fixes).</li>
<li>mm: unconditionally close VMAs on error (git-fixes).</li>
<li>mmc: core: Further prevent card detect during shutdown
(git-fixes).</li>
<li>mmc: mmc_spi: drop buggy snprintf() (git-fixes).</li>
<li>mmc: sunxi-mmc: Fix A100 compatible description
(git-fixes).</li>
<li>modpost: remove incorrect code in do_eisa_entry()
(git-fixes).</li>
<li>mtd: rawnand: atmel: Fix possible memory leak (git-fixes).</li>
<li>mtd: spi-nor: core: replace dummy buswidth from addr to data
(git-fixes).</li>
<li>net: mdio-ipq4019: add missing error check (git-fixes).</li>
<li>net: phy: dp83822: Fix reset pin definitions (git-fixes).</li>
<li>net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).</li>
<li>net: relax socket state check at accept time (git-fixes).</li>
<li>net: usb: lan78xx: Fix double free issue with interrupt buffer
allocation (git-fixes).</li>
<li>net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY
device (git-fixes).</li>
<li>net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).</li>
<li>net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition
(stable-fixes).</li>
<li>net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).</li>
<li>net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc()
(git-fixes).</li>
<li>net: xfrm: preserve kabi for xfrm_state (bsc#1233754).</li>
<li>netdevsim: copy addresses for both in and out paths
(git-fixes).</li>
<li>netfilter: nf_tables: missing iterator type in lookup walk
(git-fixes).</li>
<li>nfs: Fix KMSAN warning in decode_getfattr_attrs()
(git-fixes).</li>
<li>nfs: avoid i_lock contention in nfs_clear_invalid_mapping
(git-fixes).</li>
<li>nfsd: remove unsafe BUG_ON from set_change_info
(bsc#1234121).</li>
<li>nilfs2: fix potential deadlock with newly created symlinks
(git-fixes).</li>
<li>nouveau/dp: handle retries for AUX CH transfers with GSP
(git-fixes).</li>
<li>nouveau: fw: sync dma after setup is called (git-fixes).</li>
<li>nouveau: handle EBUSY and EAGAIN for GSP aux errors
(git-fixes).</li>
<li>ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)</li>
<li>nvme-fabrics: fix kernel crash while shutting down controller
(git-fixes).</li>
<li>nvme-loop: flush off pending I/O while shutting down loop controller
(git-fixes).</li>
<li>nvme-pci: fix freeing of the HMB descriptor table
(git-fixes).</li>
<li>nvme-pci: reverse request order in nvme_queue_rqs
(git-fixes).</li>
<li>nvme/host: Fix RCU list traversal to use SRCU primitive
(git-fixes).</li>
<li>nvme: tcp: avoid race between queue_lock lock and destroy
(git-fixes).</li>
<li>ocfs2: fix UBSAN warning in ocfs2_verify_volume()
(git-fixes).</li>
<li>ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).</li>
<li>ocfs2: uncache inode which has failed entering the group
(git-fixes).</li>
<li>of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)</li>
<li>pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).</li>
<li>pinctrl: qcom: spmi: fix debugfs drive strength
(git-fixes).</li>
<li>pinctrl: zynqmp: drop excess struct member description
(git-fixes).</li>
<li>platform/chrome: cros_ec_typec: fix missing fwnode reference
decrement (git-fixes).</li>
<li>platform/x86/amd/pmc: Detect when STB is not available
(git-fixes).</li>
<li>platform/x86: panasonic-laptop: Return errno correctly in show
callback (git-fixes).</li>
<li>posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone
(bsc#1234098).</li>
<li>power: supply: bq27xxx: Fix registers of bq27426
(git-fixes).</li>
<li>power: supply: core: Remove might_sleep() from power_supply_put()
(git-fixes).</li>
<li>power: supply: rt9471: Fix wrong WDT function regfield declaration
(git-fixes).</li>
<li>power: supply: rt9471: Use IC status regfield to report real charger
status (git-fixes).</li>
<li>powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at
address 0 (bsc#1215199).</li>
<li>powerpc/atomic: Use YZ constraints for DS-form instructions
(bsc#1194869).</li>
<li>powerpc/fadump: Move fadump_cma_init to setup_arch() after
initmem_init() (bsc#1215199).</li>
<li>powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).</li>
<li>powerpc/kexec: Fix return of uninitialized variable
(bsc#1194869).</li>
<li>powerpc/mm/fault: Fix kfence page fault reporting
(bsc#1194869).</li>
<li>powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).</li>
<li>powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).</li>
<li>powerpc/powernv: Free name on error in opal_event_init()
(bsc#1194869).</li>
<li>powerpc/pseries: Fix KVM guest detection for disabling hardlockup
detector (bsc#1194869).</li>
<li>powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore
(bsc#1194869).</li>
<li>powerpc/pseries: Use correct data types from pseries_hp_errorlog
struct (bsc#1215199).</li>
<li>powerpc/vdso: Inconditionally use CFUNC macro
(bsc#1215199).</li>
<li>pwm: imx-tpm: Use correct MODULO value for EPWM mode
(git-fixes).</li>
<li>regmap: detach regmap from dev on regmap_exit (git-fixes).</li>
<li>regmap: irq: Set lockdep class for hierarchical IRQ domains
(git-fixes).</li>
<li>rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer
needed by the new klp-convert implementation. (bsc#1218644)</li>
<li>rtc: ab-eoz9: do not fail temperature reads on undervoltage
notification (git-fixes).</li>
<li>rtc: abx80x: Fix WDT bit position of the status register
(git-fixes).</li>
<li>rtc: bbnsm: add remove hook (git-fixes).</li>
<li>rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
(git-fixes).</li>
<li>rtc: rzn1: fix BCD to rtc_time conversion errors
(git-fixes).</li>
<li>rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>scsi: NCR5380: Check for phase match during PDMA fixup
(git-fixes).</li>
<li>scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers
(git-fixes).</li>
<li>scsi: Remove scsi device no_start_on_resume flag
(git-fixes).</li>
<li>scsi: aacraid: Rearrange order of struct aac_srb_unit
(git-fixes).</li>
<li>scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).</li>
<li>scsi: core: Disable CDL by default (git-fixes).</li>
<li>scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING
(git-fixes).</li>
<li>scsi: core: Fix the return value of scsi_logical_block_count()
(git-fixes).</li>
<li>scsi: core: Handle devices which return an unusually large VPD page
count (git-fixes).</li>
<li>scsi: core: alua: I/O errors for ALUA state transitions
(git-fixes).</li>
<li>scsi: hisi_sas: Handle the NCQ error returned by D2H frame
(git-fixes).</li>
<li>scsi: hpsa: Fix allocation size for Scsi_Host private data
(git-fixes).</li>
<li>scsi: kABI: restore no_start_on_resume to scsi_device
(git-fixes).</li>
<li>scsi: libsas: Fix exp-attached device scan after probe failure
scanned in again after probe failed (git-fixes).</li>
<li>scsi: libsas: Fix the failure of adding phy with zero-address to port
(git-fixes).</li>
<li>scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).</li>
<li>scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting
follow up FDMI (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Check devloss callbk done flag for potential stale NDLP
ptrs (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).</li>
<li>scsi: lpfc: Modify CGN warning signal calculation based on EDC
response (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo
callback (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241
jsc#PED-9943).</li>
<li>scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE
before BSG flag (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: mac_scsi: Disallow bus errors during PDMA send
(git-fixes).</li>
<li>scsi: mac_scsi: Refactor polling loop (git-fixes).</li>
<li>scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages
(git-fixes).</li>
<li>scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES
(git-fixes).</li>
<li>scsi: mpi3mr: Avoid memcpy field-spanning write WARNING
(git-fixes).</li>
<li>scsi: mpi3mr: Avoid possible run-time warning with long manufacturer
strings (git-fixes).</li>
<li>scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).</li>
<li>scsi: mpi3mr: Validate SAS port assignments (git-fixes).</li>
<li>scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES
(git-fixes).</li>
<li>scsi: pm8001: Do not overwrite PCI queue mapping
(git-fixes).</li>
<li>scsi: pm80xx: Set phy-&gt;enable_completion only when we wait for
it (git-fixes).</li>
<li>scsi: qedf: Set qed_slowpath_params to zero before use
(git-fixes).</li>
<li>scsi: scsi_transport_fc: Allow setting rport state to current state
(git-fixes).</li>
<li>scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in
progress (git-fixes).</li>
<li>scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer
(git-fixes).</li>
<li>scsi: smartpqi: correct stream detection (git-fixes).</li>
<li>scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly
(git-fixes).</li>
<li>scsi: spi: Fix sshdr use (git-fixes).</li>
<li>scsi: sr: Fix unintentional arithmetic wraparound
(git-fixes).</li>
<li>scsi: wd33c93: Do not use stale scsi_pointer value
(git-fixes).</li>
<li>security/keys: fix slab-out-of-bounds in key_task_permission
(git-fixes).</li>
<li>serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).</li>
<li>signal: Replace BUG_ON()s (bsc#1234093).</li>
<li>soc: fsl: rcpm: fix missing of_node_put() in
copy_ippdexpcr1_setting() (git-fixes).</li>
<li>soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()
(git-fixes).</li>
<li>soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>spi: Fix acpi deferred irq probe (git-fixes).</li>
<li>spi: atmel-quadspi: Fix register name in verbose logging function
(git-fixes).</li>
<li>spi: mpc52xx: Add cancel_work_sync before module remove
(git-fixes).</li>
<li>spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).</li>
<li>tcp: Fix refcnt handling in __inet_hash_connect()
(git-fixes).</li>
<li>thermal: core: Initialize thermal zones before registering them
(git-fixes).</li>
<li>thermal: int3400: Fix reading of current_uuid for active policy
(git-fixes).</li>
<li>thermal: intel: int340x: processor: Fix warning during module unload
(git-fixes).</li>
<li>thunderbolt: Honor TMU requirements in the domain when setting TMU
mode (stable-fixes).</li>
<li>tools/lib/thermal: Fix sampling handler context ptr
(git-fixes).</li>
<li>tools/power turbostat: Fix trailing &#x27;\n&#x27; parsing
(git-fixes).</li>
<li>tools/power turbostat: Increase the limit for fd opened
(bsc#1233119).</li>
<li>tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555
git-fixes).</li>
<li>tpm: fix signed/unsigned bug when checking event logs
(git-fixes).</li>
<li>tty: ldsic: fix tty_ldisc_autoload sysctl&#x27;s proc_handler
(git-fixes).</li>
<li>u64_stats: fix u64_stats_init() for lockdep when used repeatedly in
one file (git-fixes).</li>
<li>ucounts: fix counter leak in inc_rlimit_get_ucounts()
(bsc#1233460).</li>
<li>unicode: Fix utf8_load() error path (git-fixes).</li>
<li>usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO
resizing logic (git-fixes).</li>
<li>usb: dwc3: gadget: Fix checking for number of TRBs left
(git-fixes).</li>
<li>usb: dwc3: gadget: Fix looping of queued SG entries
(git-fixes).</li>
<li>usb: ehci-spear: fix call balance of sehci clk handling routines
(git-fixes).</li>
<li>usb: gadget: dummy_hcd: Set transfer interval to 1 microframe
(stable-fixes).</li>
<li>usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler
(stable-fixes).</li>
<li>usb: gadget: dummy_hcd: execute hrtimer callback in softirq context
(git-fixes).</li>
<li>usb: musb: Fix hardware lockup on first Rx endpoint request
(git-fixes).</li>
<li>usb: musb: sunxi: Fix accessing an released usb phy
(git-fixes).</li>
<li>usb: typec: fix potential out of bounds in
ucsi_ccg_update_set_new_cam_cmd() (git-fixes).</li>
<li>usb: using mutex lock and supporting O_NONBLOCK flag in
iowarrior_read() (git-fixes).</li>
<li>usb: xhci: Fix TD invalidation under pending Set TR Dequeue
(git-fixes).</li>
<li>usb: yurex: make waiting on yurex_write interruptible
(git-fixes).</li>
<li>vsock: Update msg_count on read_skb() (git-fixes).</li>
<li>watchdog: apple: Actually flush writes after requesting watchdog
restart (git-fixes).</li>
<li>watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).</li>
<li>watchdog: rti: of: honor timeout-sec property (git-fixes).</li>
<li>wifi: ath10k: fix invalid VHT parameters in
supported_vht_mcs_rate_nss1 (git-fixes).</li>
<li>wifi: ath10k: fix invalid VHT parameters in
supported_vht_mcs_rate_nss2 (git-fixes).</li>
<li>wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR
(git-fixes).</li>
<li>wifi: ath12k: Skip Rx TID cleanup for self peer
(git-fixes).</li>
<li>wifi: ath12k: fix crash when unbinding (git-fixes).</li>
<li>wifi: ath12k: fix warning when unbinding (git-fixes).</li>
<li>wifi: ath12k: remove msdu_end structure for WCN7850
(git-fixes).</li>
<li>wifi: ath9k: add range check for conn_rsp_epid in
htc_connect_service() (git-fixes).</li>
<li>wifi: brcmfmac: release &#x27;root&#x27; node in all
execution paths (git-fixes).</li>
<li>wifi: cw1200: Fix potential NULL dereference (git-fixes).</li>
<li>wifi: iwlegacy: Clear stale interrupts before resuming device
(stable-fixes).</li>
<li>wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).</li>
<li>wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>wifi: wfx: Fix error handling in wfx_core_init()
(git-fixes).</li>
<li>x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client
(bsc#1233443).</li>
<li>x86/microcode/intel: Remove unnecessary cache writeback and
invalidation (git-fixes).</li>
<li>x86/resctrl: Remove hard-coded memory bandwidth limit
(git-fixes).</li>
<li>x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments()
(git-fixes).</li>
<li>x86/tdx: Dynamically disable SEPT violations from causing #VEs
(git-fixes).</li>
<li>x86/tdx: Enable CPU topology enumeration (git-fixes).</li>
<li>x86/tdx: Introduce wrappers to read and write TD metadata
(git-fixes).</li>
<li>x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup()
(git-fixes).</li>
<li>x86/traps: move kmsan check after instrumentation_begin
(git-fixes).</li>
<li>x86: Increase brk randomness entropy for 64-bit systems
(git-fixes).</li>
<li>x86: fix off-by-one in access_ok() (git-fixes).</li>
<li>xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).</li>
<li>xfrm: Fix unregister netdevice hang on hardware offload
(bsc#1233754).</li>
<li>drm: Expand max DRM device number to full MINORBITS
(jsc#PED-11580).</li>
<li>accel: Use XArray instead of IDR for minors
(jsc#PED-11580).</li>
<li>drm: Use XArray instead of IDR for minors (jsc#PED-11580).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241
jsc#PED-9943).</li>
<li>scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo
callback (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).</li>
<li>scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting
follow up FDMI (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE
before BSG flag (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Check devloss callbk done flag for potential stale NDLP
ptrs (bsc#1233241 jsc#PED-9943).</li>
<li>scsi: lpfc: Modify CGN warning signal calculation based on EDC
response (bsc#1233241 jsc#PED-9943).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.6


<br/>
<code>zypper in -t patch SUSE-2024-4316=1
openSUSE-SLE-15.6-2024-4316=1</code>



</li>

<li class="list-group-item">
Public Cloud Module 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4316=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.6 (aarch64 x86_64)
<ul>


<li>kselftests-kmp-azure-debuginfo-6.4.0-150600.8.20.1</li>


<li>gfs2-kmp-azure-6.4.0-150600.8.20.1</li>


<li>reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.20.1</li>


<li>kernel-azure-extra-debuginfo-6.4.0-150600.8.20.1</li>


<li>kernel-azure-debuginfo-6.4.0-150600.8.20.1</li>


<li>kselftests-kmp-azure-6.4.0-150600.8.20.1</li>


<li>kernel-syms-azure-6.4.0-150600.8.20.1</li>


<li>kernel-azure-optional-6.4.0-150600.8.20.1</li>


<li>gfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1</li>


<li>ocfs2-kmp-azure-6.4.0-150600.8.20.1</li>


<li>ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1</li>


<li>kernel-azure-devel-6.4.0-150600.8.20.1</li>


<li>kernel-azure-optional-debuginfo-6.4.0-150600.8.20.1</li>


<li>reiserfs-kmp-azure-6.4.0-150600.8.20.1</li>


<li>cluster-md-kmp-azure-6.4.0-150600.8.20.1</li>


<li>kernel-azure-debugsource-6.4.0-150600.8.20.1</li>


<li>dlm-kmp-azure-6.4.0-150600.8.20.1</li>


<li>dlm-kmp-azure-debuginfo-6.4.0-150600.8.20.1</li>


<li>kernel-azure-extra-6.4.0-150600.8.20.1</li>


<li>cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.20.1</li>


<li>kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (aarch64 nosrc x86_64)
<ul>


<li>kernel-azure-6.4.0-150600.8.20.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (x86_64)
<ul>


<li>kernel-azure-vdso-6.4.0-150600.8.20.1</li>


<li>kernel-azure-vdso-debuginfo-6.4.0-150600.8.20.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (noarch)
<ul>


<li>kernel-devel-azure-6.4.0-150600.8.20.1</li>


<li>kernel-source-azure-6.4.0-150600.8.20.1</li>

</ul>
</li>



<li>
Public Cloud Module 15-SP6 (aarch64 x86_64)
<ul>


<li>kernel-syms-azure-6.4.0-150600.8.20.1</li>


<li>kernel-azure-devel-6.4.0-150600.8.20.1</li>


<li>kernel-azure-debugsource-6.4.0-150600.8.20.1</li>


<li>kernel-azure-debuginfo-6.4.0-150600.8.20.1</li>


<li>kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1</li>

</ul>
</li>

<li>
Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
<ul>


<li>kernel-azure-6.4.0-150600.8.20.1</li>

</ul>
</li>

<li>
Public Cloud Module 15-SP6 (noarch)
<ul>


<li>kernel-devel-azure-6.4.0-150600.8.20.1</li>


<li>kernel-source-azure-6.4.0-150600.8.20.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52778.html">https://www.suse.com/security/cve/CVE-2023-52778.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52920.html">https://www.suse.com/security/cve/CVE-2023-52920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52921.html">https://www.suse.com/security/cve/CVE-2023-52921.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52922.html">https://www.suse.com/security/cve/CVE-2023-52922.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26596.html">https://www.suse.com/security/cve/CVE-2024-26596.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26703.html">https://www.suse.com/security/cve/CVE-2024-26703.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26741.html">https://www.suse.com/security/cve/CVE-2024-26741.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26782.html">https://www.suse.com/security/cve/CVE-2024-26782.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26864.html">https://www.suse.com/security/cve/CVE-2024-26864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26953.html">https://www.suse.com/security/cve/CVE-2024-26953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27017.html">https://www.suse.com/security/cve/CVE-2024-27017.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27407.html">https://www.suse.com/security/cve/CVE-2024-27407.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35888.html">https://www.suse.com/security/cve/CVE-2024-35888.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36000.html">https://www.suse.com/security/cve/CVE-2024-36000.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36031.html">https://www.suse.com/security/cve/CVE-2024-36031.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36484.html">https://www.suse.com/security/cve/CVE-2024-36484.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36883.html">https://www.suse.com/security/cve/CVE-2024-36883.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36886.html">https://www.suse.com/security/cve/CVE-2024-36886.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36905.html">https://www.suse.com/security/cve/CVE-2024-36905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36920.html">https://www.suse.com/security/cve/CVE-2024-36920.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36927.html">https://www.suse.com/security/cve/CVE-2024-36927.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36954.html">https://www.suse.com/security/cve/CVE-2024-36954.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36968.html">https://www.suse.com/security/cve/CVE-2024-36968.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38589.html">https://www.suse.com/security/cve/CVE-2024-38589.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40914.html">https://www.suse.com/security/cve/CVE-2024-40914.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41023.html">https://www.suse.com/security/cve/CVE-2024-41023.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42102.html">https://www.suse.com/security/cve/CVE-2024-42102.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44995.html">https://www.suse.com/security/cve/CVE-2024-44995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46680.html">https://www.suse.com/security/cve/CVE-2024-46680.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46681.html">https://www.suse.com/security/cve/CVE-2024-46681.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46765.html">https://www.suse.com/security/cve/CVE-2024-46765.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46788.html">https://www.suse.com/security/cve/CVE-2024-46788.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46800.html">https://www.suse.com/security/cve/CVE-2024-46800.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46828.html">https://www.suse.com/security/cve/CVE-2024-46828.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46845.html">https://www.suse.com/security/cve/CVE-2024-46845.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47666.html">https://www.suse.com/security/cve/CVE-2024-47666.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47679.html">https://www.suse.com/security/cve/CVE-2024-47679.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">https://www.suse.com/security/cve/CVE-2024-47701.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47703.html">https://www.suse.com/security/cve/CVE-2024-47703.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49868.html">https://www.suse.com/security/cve/CVE-2024-49868.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">https://www.suse.com/security/cve/CVE-2024-49884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49888.html">https://www.suse.com/security/cve/CVE-2024-49888.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49899.html">https://www.suse.com/security/cve/CVE-2024-49899.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49905.html">https://www.suse.com/security/cve/CVE-2024-49905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49908.html">https://www.suse.com/security/cve/CVE-2024-49908.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49911.html">https://www.suse.com/security/cve/CVE-2024-49911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49912.html">https://www.suse.com/security/cve/CVE-2024-49912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49921.html">https://www.suse.com/security/cve/CVE-2024-49921.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49922.html">https://www.suse.com/security/cve/CVE-2024-49922.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49923.html">https://www.suse.com/security/cve/CVE-2024-49923.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49925.html">https://www.suse.com/security/cve/CVE-2024-49925.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49933.html">https://www.suse.com/security/cve/CVE-2024-49933.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49934.html">https://www.suse.com/security/cve/CVE-2024-49934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49944.html">https://www.suse.com/security/cve/CVE-2024-49944.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49945.html">https://www.suse.com/security/cve/CVE-2024-49945.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49952.html">https://www.suse.com/security/cve/CVE-2024-49952.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49968.html">https://www.suse.com/security/cve/CVE-2024-49968.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49975.html">https://www.suse.com/security/cve/CVE-2024-49975.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49976.html">https://www.suse.com/security/cve/CVE-2024-49976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49983.html">https://www.suse.com/security/cve/CVE-2024-49983.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49987.html">https://www.suse.com/security/cve/CVE-2024-49987.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49989.html">https://www.suse.com/security/cve/CVE-2024-49989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50003.html">https://www.suse.com/security/cve/CVE-2024-50003.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50004.html">https://www.suse.com/security/cve/CVE-2024-50004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50006.html">https://www.suse.com/security/cve/CVE-2024-50006.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50009.html">https://www.suse.com/security/cve/CVE-2024-50009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50012.html">https://www.suse.com/security/cve/CVE-2024-50012.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50014.html">https://www.suse.com/security/cve/CVE-2024-50014.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50026.html">https://www.suse.com/security/cve/CVE-2024-50026.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50067.html">https://www.suse.com/security/cve/CVE-2024-50067.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50082.html">https://www.suse.com/security/cve/CVE-2024-50082.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50084.html">https://www.suse.com/security/cve/CVE-2024-50084.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50087.html">https://www.suse.com/security/cve/CVE-2024-50087.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50088.html">https://www.suse.com/security/cve/CVE-2024-50088.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50089.html">https://www.suse.com/security/cve/CVE-2024-50089.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50093.html">https://www.suse.com/security/cve/CVE-2024-50093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50095.html">https://www.suse.com/security/cve/CVE-2024-50095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50096.html">https://www.suse.com/security/cve/CVE-2024-50096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50098.html">https://www.suse.com/security/cve/CVE-2024-50098.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50099.html">https://www.suse.com/security/cve/CVE-2024-50099.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50100.html">https://www.suse.com/security/cve/CVE-2024-50100.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50101.html">https://www.suse.com/security/cve/CVE-2024-50101.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50102.html">https://www.suse.com/security/cve/CVE-2024-50102.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50103.html">https://www.suse.com/security/cve/CVE-2024-50103.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50108.html">https://www.suse.com/security/cve/CVE-2024-50108.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50110.html">https://www.suse.com/security/cve/CVE-2024-50110.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">https://www.suse.com/security/cve/CVE-2024-50115.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50116.html">https://www.suse.com/security/cve/CVE-2024-50116.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50117.html">https://www.suse.com/security/cve/CVE-2024-50117.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50121.html">https://www.suse.com/security/cve/CVE-2024-50121.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50124.html">https://www.suse.com/security/cve/CVE-2024-50124.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50125.html">https://www.suse.com/security/cve/CVE-2024-50125.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50127.html">https://www.suse.com/security/cve/CVE-2024-50127.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50128.html">https://www.suse.com/security/cve/CVE-2024-50128.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50130.html">https://www.suse.com/security/cve/CVE-2024-50130.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50131.html">https://www.suse.com/security/cve/CVE-2024-50131.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50134.html">https://www.suse.com/security/cve/CVE-2024-50134.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50135.html">https://www.suse.com/security/cve/CVE-2024-50135.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50136.html">https://www.suse.com/security/cve/CVE-2024-50136.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50138.html">https://www.suse.com/security/cve/CVE-2024-50138.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50139.html">https://www.suse.com/security/cve/CVE-2024-50139.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50141.html">https://www.suse.com/security/cve/CVE-2024-50141.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50145.html">https://www.suse.com/security/cve/CVE-2024-50145.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50146.html">https://www.suse.com/security/cve/CVE-2024-50146.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50147.html">https://www.suse.com/security/cve/CVE-2024-50147.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50148.html">https://www.suse.com/security/cve/CVE-2024-50148.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50150.html">https://www.suse.com/security/cve/CVE-2024-50150.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50153.html">https://www.suse.com/security/cve/CVE-2024-50153.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50154.html">https://www.suse.com/security/cve/CVE-2024-50154.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50155.html">https://www.suse.com/security/cve/CVE-2024-50155.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50156.html">https://www.suse.com/security/cve/CVE-2024-50156.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50157.html">https://www.suse.com/security/cve/CVE-2024-50157.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50158.html">https://www.suse.com/security/cve/CVE-2024-50158.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50159.html">https://www.suse.com/security/cve/CVE-2024-50159.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50160.html">https://www.suse.com/security/cve/CVE-2024-50160.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50166.html">https://www.suse.com/security/cve/CVE-2024-50166.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50167.html">https://www.suse.com/security/cve/CVE-2024-50167.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50169.html">https://www.suse.com/security/cve/CVE-2024-50169.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50171.html">https://www.suse.com/security/cve/CVE-2024-50171.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50172.html">https://www.suse.com/security/cve/CVE-2024-50172.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50175.html">https://www.suse.com/security/cve/CVE-2024-50175.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50176.html">https://www.suse.com/security/cve/CVE-2024-50176.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50177.html">https://www.suse.com/security/cve/CVE-2024-50177.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50179.html">https://www.suse.com/security/cve/CVE-2024-50179.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50180.html">https://www.suse.com/security/cve/CVE-2024-50180.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50181.html">https://www.suse.com/security/cve/CVE-2024-50181.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50182.html">https://www.suse.com/security/cve/CVE-2024-50182.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50183.html">https://www.suse.com/security/cve/CVE-2024-50183.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50184.html">https://www.suse.com/security/cve/CVE-2024-50184.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50186.html">https://www.suse.com/security/cve/CVE-2024-50186.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50187.html">https://www.suse.com/security/cve/CVE-2024-50187.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50188.html">https://www.suse.com/security/cve/CVE-2024-50188.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50189.html">https://www.suse.com/security/cve/CVE-2024-50189.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50192.html">https://www.suse.com/security/cve/CVE-2024-50192.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50194.html">https://www.suse.com/security/cve/CVE-2024-50194.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50195.html">https://www.suse.com/security/cve/CVE-2024-50195.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50196.html">https://www.suse.com/security/cve/CVE-2024-50196.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50198.html">https://www.suse.com/security/cve/CVE-2024-50198.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50200.html">https://www.suse.com/security/cve/CVE-2024-50200.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50201.html">https://www.suse.com/security/cve/CVE-2024-50201.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50205.html">https://www.suse.com/security/cve/CVE-2024-50205.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50208.html">https://www.suse.com/security/cve/CVE-2024-50208.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50209.html">https://www.suse.com/security/cve/CVE-2024-50209.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50210.html">https://www.suse.com/security/cve/CVE-2024-50210.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50215.html">https://www.suse.com/security/cve/CVE-2024-50215.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50216.html">https://www.suse.com/security/cve/CVE-2024-50216.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50218.html">https://www.suse.com/security/cve/CVE-2024-50218.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50221.html">https://www.suse.com/security/cve/CVE-2024-50221.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50224.html">https://www.suse.com/security/cve/CVE-2024-50224.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50225.html">https://www.suse.com/security/cve/CVE-2024-50225.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50228.html">https://www.suse.com/security/cve/CVE-2024-50228.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50229.html">https://www.suse.com/security/cve/CVE-2024-50229.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50230.html">https://www.suse.com/security/cve/CVE-2024-50230.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50231.html">https://www.suse.com/security/cve/CVE-2024-50231.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50232.html">https://www.suse.com/security/cve/CVE-2024-50232.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50233.html">https://www.suse.com/security/cve/CVE-2024-50233.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50234.html">https://www.suse.com/security/cve/CVE-2024-50234.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50235.html">https://www.suse.com/security/cve/CVE-2024-50235.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50236.html">https://www.suse.com/security/cve/CVE-2024-50236.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50237.html">https://www.suse.com/security/cve/CVE-2024-50237.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50240.html">https://www.suse.com/security/cve/CVE-2024-50240.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50245.html">https://www.suse.com/security/cve/CVE-2024-50245.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50246.html">https://www.suse.com/security/cve/CVE-2024-50246.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50248.html">https://www.suse.com/security/cve/CVE-2024-50248.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50249.html">https://www.suse.com/security/cve/CVE-2024-50249.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50250.html">https://www.suse.com/security/cve/CVE-2024-50250.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50252.html">https://www.suse.com/security/cve/CVE-2024-50252.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50255.html">https://www.suse.com/security/cve/CVE-2024-50255.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50257.html">https://www.suse.com/security/cve/CVE-2024-50257.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50261.html">https://www.suse.com/security/cve/CVE-2024-50261.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50264.html">https://www.suse.com/security/cve/CVE-2024-50264.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50265.html">https://www.suse.com/security/cve/CVE-2024-50265.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50267.html">https://www.suse.com/security/cve/CVE-2024-50267.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50268.html">https://www.suse.com/security/cve/CVE-2024-50268.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50269.html">https://www.suse.com/security/cve/CVE-2024-50269.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50271.html">https://www.suse.com/security/cve/CVE-2024-50271.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50273.html">https://www.suse.com/security/cve/CVE-2024-50273.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50274.html">https://www.suse.com/security/cve/CVE-2024-50274.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50275.html">https://www.suse.com/security/cve/CVE-2024-50275.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50276.html">https://www.suse.com/security/cve/CVE-2024-50276.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50279.html">https://www.suse.com/security/cve/CVE-2024-50279.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50282.html">https://www.suse.com/security/cve/CVE-2024-50282.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50287.html">https://www.suse.com/security/cve/CVE-2024-50287.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50289.html">https://www.suse.com/security/cve/CVE-2024-50289.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">https://www.suse.com/security/cve/CVE-2024-50290.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50292.html">https://www.suse.com/security/cve/CVE-2024-50292.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50295.html">https://www.suse.com/security/cve/CVE-2024-50295.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50296.html">https://www.suse.com/security/cve/CVE-2024-50296.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50298.html">https://www.suse.com/security/cve/CVE-2024-50298.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50301.html">https://www.suse.com/security/cve/CVE-2024-50301.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50302.html">https://www.suse.com/security/cve/CVE-2024-50302.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53042.html">https://www.suse.com/security/cve/CVE-2024-53042.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53043.html">https://www.suse.com/security/cve/CVE-2024-53043.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53045.html">https://www.suse.com/security/cve/CVE-2024-53045.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53048.html">https://www.suse.com/security/cve/CVE-2024-53048.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53051.html">https://www.suse.com/security/cve/CVE-2024-53051.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53052.html">https://www.suse.com/security/cve/CVE-2024-53052.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53055.html">https://www.suse.com/security/cve/CVE-2024-53055.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53056.html">https://www.suse.com/security/cve/CVE-2024-53056.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53058.html">https://www.suse.com/security/cve/CVE-2024-53058.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53059.html">https://www.suse.com/security/cve/CVE-2024-53059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53060.html">https://www.suse.com/security/cve/CVE-2024-53060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53061.html">https://www.suse.com/security/cve/CVE-2024-53061.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">https://www.suse.com/security/cve/CVE-2024-53063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53066.html">https://www.suse.com/security/cve/CVE-2024-53066.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53068.html">https://www.suse.com/security/cve/CVE-2024-53068.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53072.html">https://www.suse.com/security/cve/CVE-2024-53072.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53074.html">https://www.suse.com/security/cve/CVE-2024-53074.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53076.html">https://www.suse.com/security/cve/CVE-2024-53076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53079.html">https://www.suse.com/security/cve/CVE-2024-53079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53081.html">https://www.suse.com/security/cve/CVE-2024-53081.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53082.html">https://www.suse.com/security/cve/CVE-2024-53082.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53085.html">https://www.suse.com/security/cve/CVE-2024-53085.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53088.html">https://www.suse.com/security/cve/CVE-2024-53088.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53093.html">https://www.suse.com/security/cve/CVE-2024-53093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53094.html">https://www.suse.com/security/cve/CVE-2024-53094.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53095.html">https://www.suse.com/security/cve/CVE-2024-53095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53096.html">https://www.suse.com/security/cve/CVE-2024-53096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53100.html">https://www.suse.com/security/cve/CVE-2024-53100.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53101.html">https://www.suse.com/security/cve/CVE-2024-53101.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53104.html">https://www.suse.com/security/cve/CVE-2024-53104.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53106.html">https://www.suse.com/security/cve/CVE-2024-53106.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53108.html">https://www.suse.com/security/cve/CVE-2024-53108.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53110.html">https://www.suse.com/security/cve/CVE-2024-53110.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53112.html">https://www.suse.com/security/cve/CVE-2024-53112.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53114.html">https://www.suse.com/security/cve/CVE-2024-53114.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53121.html">https://www.suse.com/security/cve/CVE-2024-53121.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53138.html">https://www.suse.com/security/cve/CVE-2024-53138.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">https://bugzilla.suse.com/show_bug.cgi?id=1082555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218644">https://bugzilla.suse.com/show_bug.cgi?id=1218644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220355">https://bugzilla.suse.com/show_bug.cgi?id=1220355</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221309">https://bugzilla.suse.com/show_bug.cgi?id=1221309</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222423">https://bugzilla.suse.com/show_bug.cgi?id=1222423</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222587">https://bugzilla.suse.com/show_bug.cgi?id=1222587</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222590">https://bugzilla.suse.com/show_bug.cgi?id=1222590</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223112">https://bugzilla.suse.com/show_bug.cgi?id=1223112</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223656">https://bugzilla.suse.com/show_bug.cgi?id=1223656</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223733">https://bugzilla.suse.com/show_bug.cgi?id=1223733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224429">https://bugzilla.suse.com/show_bug.cgi?id=1224429</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224518">https://bugzilla.suse.com/show_bug.cgi?id=1224518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224548">https://bugzilla.suse.com/show_bug.cgi?id=1224548</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224948">https://bugzilla.suse.com/show_bug.cgi?id=1224948</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225713">https://bugzilla.suse.com/show_bug.cgi?id=1225713</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225725">https://bugzilla.suse.com/show_bug.cgi?id=1225725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225730">https://bugzilla.suse.com/show_bug.cgi?id=1225730</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225764">https://bugzilla.suse.com/show_bug.cgi?id=1225764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225768">https://bugzilla.suse.com/show_bug.cgi?id=1225768</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225813">https://bugzilla.suse.com/show_bug.cgi?id=1225813</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">https://bugzilla.suse.com/show_bug.cgi?id=1225903</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226130">https://bugzilla.suse.com/show_bug.cgi?id=1226130</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226748">https://bugzilla.suse.com/show_bug.cgi?id=1226748</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226872">https://bugzilla.suse.com/show_bug.cgi?id=1226872</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227726">https://bugzilla.suse.com/show_bug.cgi?id=1227726</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227842">https://bugzilla.suse.com/show_bug.cgi?id=1227842</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228430">https://bugzilla.suse.com/show_bug.cgi?id=1228430</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228850">https://bugzilla.suse.com/show_bug.cgi?id=1228850</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229165">https://bugzilla.suse.com/show_bug.cgi?id=1229165</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230231">https://bugzilla.suse.com/show_bug.cgi?id=1230231</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230557">https://bugzilla.suse.com/show_bug.cgi?id=1230557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230558">https://bugzilla.suse.com/show_bug.cgi?id=1230558</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230733">https://bugzilla.suse.com/show_bug.cgi?id=1230733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230807">https://bugzilla.suse.com/show_bug.cgi?id=1230807</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230817">https://bugzilla.suse.com/show_bug.cgi?id=1230817</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230827">https://bugzilla.suse.com/show_bug.cgi?id=1230827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230971">https://bugzilla.suse.com/show_bug.cgi?id=1230971</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231076">https://bugzilla.suse.com/show_bug.cgi?id=1231076</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231114">https://bugzilla.suse.com/show_bug.cgi?id=1231114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231182">https://bugzilla.suse.com/show_bug.cgi?id=1231182</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231453">https://bugzilla.suse.com/show_bug.cgi?id=1231453</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231465">https://bugzilla.suse.com/show_bug.cgi?id=1231465</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231630">https://bugzilla.suse.com/show_bug.cgi?id=1231630</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">https://bugzilla.suse.com/show_bug.cgi?id=1231920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231930">https://bugzilla.suse.com/show_bug.cgi?id=1231930</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231946">https://bugzilla.suse.com/show_bug.cgi?id=1231946</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231952">https://bugzilla.suse.com/show_bug.cgi?id=1231952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232096">https://bugzilla.suse.com/show_bug.cgi?id=1232096</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232103">https://bugzilla.suse.com/show_bug.cgi?id=1232103</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232104">https://bugzilla.suse.com/show_bug.cgi?id=1232104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232157">https://bugzilla.suse.com/show_bug.cgi?id=1232157</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232165">https://bugzilla.suse.com/show_bug.cgi?id=1232165</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232166">https://bugzilla.suse.com/show_bug.cgi?id=1232166</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">https://bugzilla.suse.com/show_bug.cgi?id=1232198</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">https://bugzilla.suse.com/show_bug.cgi?id=1232201</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232207">https://bugzilla.suse.com/show_bug.cgi?id=1232207</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232208">https://bugzilla.suse.com/show_bug.cgi?id=1232208</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232224">https://bugzilla.suse.com/show_bug.cgi?id=1232224</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232258">https://bugzilla.suse.com/show_bug.cgi?id=1232258</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232264">https://bugzilla.suse.com/show_bug.cgi?id=1232264</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232272">https://bugzilla.suse.com/show_bug.cgi?id=1232272</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232318">https://bugzilla.suse.com/show_bug.cgi?id=1232318</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232335">https://bugzilla.suse.com/show_bug.cgi?id=1232335</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232357">https://bugzilla.suse.com/show_bug.cgi?id=1232357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232358">https://bugzilla.suse.com/show_bug.cgi?id=1232358</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232361">https://bugzilla.suse.com/show_bug.cgi?id=1232361</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232366">https://bugzilla.suse.com/show_bug.cgi?id=1232366</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232367">https://bugzilla.suse.com/show_bug.cgi?id=1232367</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232368">https://bugzilla.suse.com/show_bug.cgi?id=1232368</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232371">https://bugzilla.suse.com/show_bug.cgi?id=1232371</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232374">https://bugzilla.suse.com/show_bug.cgi?id=1232374</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232385">https://bugzilla.suse.com/show_bug.cgi?id=1232385</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232386">https://bugzilla.suse.com/show_bug.cgi?id=1232386</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232387">https://bugzilla.suse.com/show_bug.cgi?id=1232387</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232396">https://bugzilla.suse.com/show_bug.cgi?id=1232396</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232413">https://bugzilla.suse.com/show_bug.cgi?id=1232413</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232416">https://bugzilla.suse.com/show_bug.cgi?id=1232416</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232436">https://bugzilla.suse.com/show_bug.cgi?id=1232436</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232442">https://bugzilla.suse.com/show_bug.cgi?id=1232442</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232446">https://bugzilla.suse.com/show_bug.cgi?id=1232446</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232483">https://bugzilla.suse.com/show_bug.cgi?id=1232483</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232494">https://bugzilla.suse.com/show_bug.cgi?id=1232494</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232498">https://bugzilla.suse.com/show_bug.cgi?id=1232498</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232499">https://bugzilla.suse.com/show_bug.cgi?id=1232499</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232500">https://bugzilla.suse.com/show_bug.cgi?id=1232500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232704">https://bugzilla.suse.com/show_bug.cgi?id=1232704</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232757">https://bugzilla.suse.com/show_bug.cgi?id=1232757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232823">https://bugzilla.suse.com/show_bug.cgi?id=1232823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232860">https://bugzilla.suse.com/show_bug.cgi?id=1232860</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232869">https://bugzilla.suse.com/show_bug.cgi?id=1232869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232870">https://bugzilla.suse.com/show_bug.cgi?id=1232870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232873">https://bugzilla.suse.com/show_bug.cgi?id=1232873</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232876">https://bugzilla.suse.com/show_bug.cgi?id=1232876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232877">https://bugzilla.suse.com/show_bug.cgi?id=1232877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232878">https://bugzilla.suse.com/show_bug.cgi?id=1232878</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232880">https://bugzilla.suse.com/show_bug.cgi?id=1232880</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232881">https://bugzilla.suse.com/show_bug.cgi?id=1232881</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232884">https://bugzilla.suse.com/show_bug.cgi?id=1232884</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232885">https://bugzilla.suse.com/show_bug.cgi?id=1232885</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232887">https://bugzilla.suse.com/show_bug.cgi?id=1232887</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232888">https://bugzilla.suse.com/show_bug.cgi?id=1232888</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232890">https://bugzilla.suse.com/show_bug.cgi?id=1232890</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232892">https://bugzilla.suse.com/show_bug.cgi?id=1232892</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232894">https://bugzilla.suse.com/show_bug.cgi?id=1232894</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232896">https://bugzilla.suse.com/show_bug.cgi?id=1232896</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232897">https://bugzilla.suse.com/show_bug.cgi?id=1232897</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232905">https://bugzilla.suse.com/show_bug.cgi?id=1232905</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232907">https://bugzilla.suse.com/show_bug.cgi?id=1232907</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232914">https://bugzilla.suse.com/show_bug.cgi?id=1232914</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">https://bugzilla.suse.com/show_bug.cgi?id=1232919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232925">https://bugzilla.suse.com/show_bug.cgi?id=1232925</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232926">https://bugzilla.suse.com/show_bug.cgi?id=1232926</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232928">https://bugzilla.suse.com/show_bug.cgi?id=1232928</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232935">https://bugzilla.suse.com/show_bug.cgi?id=1232935</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233029">https://bugzilla.suse.com/show_bug.cgi?id=1233029</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233032">https://bugzilla.suse.com/show_bug.cgi?id=1233032</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233035">https://bugzilla.suse.com/show_bug.cgi?id=1233035</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233036">https://bugzilla.suse.com/show_bug.cgi?id=1233036</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233041">https://bugzilla.suse.com/show_bug.cgi?id=1233041</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233044">https://bugzilla.suse.com/show_bug.cgi?id=1233044</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233049">https://bugzilla.suse.com/show_bug.cgi?id=1233049</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233050">https://bugzilla.suse.com/show_bug.cgi?id=1233050</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233051">https://bugzilla.suse.com/show_bug.cgi?id=1233051</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233056">https://bugzilla.suse.com/show_bug.cgi?id=1233056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233057">https://bugzilla.suse.com/show_bug.cgi?id=1233057</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233061">https://bugzilla.suse.com/show_bug.cgi?id=1233061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233062">https://bugzilla.suse.com/show_bug.cgi?id=1233062</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233063">https://bugzilla.suse.com/show_bug.cgi?id=1233063</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233065">https://bugzilla.suse.com/show_bug.cgi?id=1233065</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233067">https://bugzilla.suse.com/show_bug.cgi?id=1233067</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233070">https://bugzilla.suse.com/show_bug.cgi?id=1233070</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233073">https://bugzilla.suse.com/show_bug.cgi?id=1233073</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233074">https://bugzilla.suse.com/show_bug.cgi?id=1233074</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233088">https://bugzilla.suse.com/show_bug.cgi?id=1233088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233091">https://bugzilla.suse.com/show_bug.cgi?id=1233091</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233092">https://bugzilla.suse.com/show_bug.cgi?id=1233092</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233097">https://bugzilla.suse.com/show_bug.cgi?id=1233097</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233100">https://bugzilla.suse.com/show_bug.cgi?id=1233100</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233103">https://bugzilla.suse.com/show_bug.cgi?id=1233103</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233104">https://bugzilla.suse.com/show_bug.cgi?id=1233104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233105">https://bugzilla.suse.com/show_bug.cgi?id=1233105</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233106">https://bugzilla.suse.com/show_bug.cgi?id=1233106</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233107">https://bugzilla.suse.com/show_bug.cgi?id=1233107</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233108">https://bugzilla.suse.com/show_bug.cgi?id=1233108</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233110">https://bugzilla.suse.com/show_bug.cgi?id=1233110</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233111">https://bugzilla.suse.com/show_bug.cgi?id=1233111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233113">https://bugzilla.suse.com/show_bug.cgi?id=1233113</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233114">https://bugzilla.suse.com/show_bug.cgi?id=1233114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233115">https://bugzilla.suse.com/show_bug.cgi?id=1233115</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233117">https://bugzilla.suse.com/show_bug.cgi?id=1233117</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233119">https://bugzilla.suse.com/show_bug.cgi?id=1233119</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233123">https://bugzilla.suse.com/show_bug.cgi?id=1233123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233125">https://bugzilla.suse.com/show_bug.cgi?id=1233125</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233127">https://bugzilla.suse.com/show_bug.cgi?id=1233127</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233129">https://bugzilla.suse.com/show_bug.cgi?id=1233129</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233130">https://bugzilla.suse.com/show_bug.cgi?id=1233130</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233132">https://bugzilla.suse.com/show_bug.cgi?id=1233132</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233135">https://bugzilla.suse.com/show_bug.cgi?id=1233135</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233176">https://bugzilla.suse.com/show_bug.cgi?id=1233176</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233179">https://bugzilla.suse.com/show_bug.cgi?id=1233179</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233185">https://bugzilla.suse.com/show_bug.cgi?id=1233185</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233188">https://bugzilla.suse.com/show_bug.cgi?id=1233188</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233189">https://bugzilla.suse.com/show_bug.cgi?id=1233189</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233191">https://bugzilla.suse.com/show_bug.cgi?id=1233191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233193">https://bugzilla.suse.com/show_bug.cgi?id=1233193</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233197">https://bugzilla.suse.com/show_bug.cgi?id=1233197</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233201">https://bugzilla.suse.com/show_bug.cgi?id=1233201</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233203">https://bugzilla.suse.com/show_bug.cgi?id=1233203</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233204">https://bugzilla.suse.com/show_bug.cgi?id=1233204</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233205">https://bugzilla.suse.com/show_bug.cgi?id=1233205</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233206">https://bugzilla.suse.com/show_bug.cgi?id=1233206</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233207">https://bugzilla.suse.com/show_bug.cgi?id=1233207</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233208">https://bugzilla.suse.com/show_bug.cgi?id=1233208</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233209">https://bugzilla.suse.com/show_bug.cgi?id=1233209</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233210">https://bugzilla.suse.com/show_bug.cgi?id=1233210</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233211">https://bugzilla.suse.com/show_bug.cgi?id=1233211</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233212">https://bugzilla.suse.com/show_bug.cgi?id=1233212</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233216">https://bugzilla.suse.com/show_bug.cgi?id=1233216</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233217">https://bugzilla.suse.com/show_bug.cgi?id=1233217</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233219">https://bugzilla.suse.com/show_bug.cgi?id=1233219</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233226">https://bugzilla.suse.com/show_bug.cgi?id=1233226</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233238">https://bugzilla.suse.com/show_bug.cgi?id=1233238</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233241">https://bugzilla.suse.com/show_bug.cgi?id=1233241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233244">https://bugzilla.suse.com/show_bug.cgi?id=1233244</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233253">https://bugzilla.suse.com/show_bug.cgi?id=1233253</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233255">https://bugzilla.suse.com/show_bug.cgi?id=1233255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233293">https://bugzilla.suse.com/show_bug.cgi?id=1233293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233298">https://bugzilla.suse.com/show_bug.cgi?id=1233298</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233305">https://bugzilla.suse.com/show_bug.cgi?id=1233305</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233320">https://bugzilla.suse.com/show_bug.cgi?id=1233320</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233350">https://bugzilla.suse.com/show_bug.cgi?id=1233350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233443">https://bugzilla.suse.com/show_bug.cgi?id=1233443</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233452">https://bugzilla.suse.com/show_bug.cgi?id=1233452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233453">https://bugzilla.suse.com/show_bug.cgi?id=1233453</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233454">https://bugzilla.suse.com/show_bug.cgi?id=1233454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233456">https://bugzilla.suse.com/show_bug.cgi?id=1233456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233457">https://bugzilla.suse.com/show_bug.cgi?id=1233457</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233458">https://bugzilla.suse.com/show_bug.cgi?id=1233458</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233460">https://bugzilla.suse.com/show_bug.cgi?id=1233460</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233462">https://bugzilla.suse.com/show_bug.cgi?id=1233462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233463">https://bugzilla.suse.com/show_bug.cgi?id=1233463</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233464">https://bugzilla.suse.com/show_bug.cgi?id=1233464</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233465">https://bugzilla.suse.com/show_bug.cgi?id=1233465</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233468">https://bugzilla.suse.com/show_bug.cgi?id=1233468</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233471">https://bugzilla.suse.com/show_bug.cgi?id=1233471</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233476">https://bugzilla.suse.com/show_bug.cgi?id=1233476</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233478">https://bugzilla.suse.com/show_bug.cgi?id=1233478</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">https://bugzilla.suse.com/show_bug.cgi?id=1233479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233481">https://bugzilla.suse.com/show_bug.cgi?id=1233481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233484">https://bugzilla.suse.com/show_bug.cgi?id=1233484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233485">https://bugzilla.suse.com/show_bug.cgi?id=1233485</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233487">https://bugzilla.suse.com/show_bug.cgi?id=1233487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233490">https://bugzilla.suse.com/show_bug.cgi?id=1233490</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233491">https://bugzilla.suse.com/show_bug.cgi?id=1233491</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233523">https://bugzilla.suse.com/show_bug.cgi?id=1233523</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233524">https://bugzilla.suse.com/show_bug.cgi?id=1233524</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233540">https://bugzilla.suse.com/show_bug.cgi?id=1233540</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233547">https://bugzilla.suse.com/show_bug.cgi?id=1233547</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233548">https://bugzilla.suse.com/show_bug.cgi?id=1233548</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233550">https://bugzilla.suse.com/show_bug.cgi?id=1233550</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233552">https://bugzilla.suse.com/show_bug.cgi?id=1233552</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233553">https://bugzilla.suse.com/show_bug.cgi?id=1233553</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233554">https://bugzilla.suse.com/show_bug.cgi?id=1233554</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233555">https://bugzilla.suse.com/show_bug.cgi?id=1233555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">https://bugzilla.suse.com/show_bug.cgi?id=1233557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233560">https://bugzilla.suse.com/show_bug.cgi?id=1233560</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233561">https://bugzilla.suse.com/show_bug.cgi?id=1233561</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233564">https://bugzilla.suse.com/show_bug.cgi?id=1233564</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233566">https://bugzilla.suse.com/show_bug.cgi?id=1233566</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233567">https://bugzilla.suse.com/show_bug.cgi?id=1233567</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233568">https://bugzilla.suse.com/show_bug.cgi?id=1233568</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233570">https://bugzilla.suse.com/show_bug.cgi?id=1233570</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233572">https://bugzilla.suse.com/show_bug.cgi?id=1233572</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233573">https://bugzilla.suse.com/show_bug.cgi?id=1233573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233577">https://bugzilla.suse.com/show_bug.cgi?id=1233577</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233580">https://bugzilla.suse.com/show_bug.cgi?id=1233580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233640">https://bugzilla.suse.com/show_bug.cgi?id=1233640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233641">https://bugzilla.suse.com/show_bug.cgi?id=1233641</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233642">https://bugzilla.suse.com/show_bug.cgi?id=1233642</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233721">https://bugzilla.suse.com/show_bug.cgi?id=1233721</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233754">https://bugzilla.suse.com/show_bug.cgi?id=1233754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233756">https://bugzilla.suse.com/show_bug.cgi?id=1233756</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233769">https://bugzilla.suse.com/show_bug.cgi?id=1233769</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233771">https://bugzilla.suse.com/show_bug.cgi?id=1233771</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233977">https://bugzilla.suse.com/show_bug.cgi?id=1233977</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234009">https://bugzilla.suse.com/show_bug.cgi?id=1234009</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234011">https://bugzilla.suse.com/show_bug.cgi?id=1234011</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234012">https://bugzilla.suse.com/show_bug.cgi?id=1234012</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234025">https://bugzilla.suse.com/show_bug.cgi?id=1234025</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234039">https://bugzilla.suse.com/show_bug.cgi?id=1234039</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234040">https://bugzilla.suse.com/show_bug.cgi?id=1234040</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234041">https://bugzilla.suse.com/show_bug.cgi?id=1234041</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234042">https://bugzilla.suse.com/show_bug.cgi?id=1234042</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234043">https://bugzilla.suse.com/show_bug.cgi?id=1234043</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234044">https://bugzilla.suse.com/show_bug.cgi?id=1234044</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234045">https://bugzilla.suse.com/show_bug.cgi?id=1234045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234046">https://bugzilla.suse.com/show_bug.cgi?id=1234046</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234072">https://bugzilla.suse.com/show_bug.cgi?id=1234072</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234078">https://bugzilla.suse.com/show_bug.cgi?id=1234078</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234081">https://bugzilla.suse.com/show_bug.cgi?id=1234081</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234083">https://bugzilla.suse.com/show_bug.cgi?id=1234083</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234085">https://bugzilla.suse.com/show_bug.cgi?id=1234085</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234087">https://bugzilla.suse.com/show_bug.cgi?id=1234087</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234093">https://bugzilla.suse.com/show_bug.cgi?id=1234093</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234098">https://bugzilla.suse.com/show_bug.cgi?id=1234098</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234108">https://bugzilla.suse.com/show_bug.cgi?id=1234108</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234121">https://bugzilla.suse.com/show_bug.cgi?id=1234121</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234223">https://bugzilla.suse.com/show_bug.cgi?id=1234223</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-11316">https://jira.suse.com/browse/PED-11316</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-11442">https://jira.suse.com/browse/PED-11442</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-11580">https://jira.suse.com/browse/PED-11580</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-9943">https://jira.suse.com/browse/PED-9943</a>
</li>


</ul>

</div>

--===============6027699515479577569==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung