Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:4376-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Public Cloud Module 15-SP5, SUSE openSUSE Leap 15.5
Datum: Mi, 18. Dezember 2024, 23:24
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48674
Applikationen: Linux

Originalnachricht

--===============7373679911819052108==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4376-1
Release Date:
Rating: important
References:

* bsc#1082555
* bsc#1194869
* bsc#1218644
* bsc#1220382
* bsc#1221309
* bsc#1221333
* bsc#1222364
* bsc#1222590
* bsc#1223202
* bsc#1223656
* bsc#1223848
* bsc#1223919
* bsc#1223942
* bsc#1224518
* bsc#1224526
* bsc#1224574
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225812
* bsc#1226560
* bsc#1226592
* bsc#1226631
* bsc#1226748
* bsc#1226872
* bsc#1227853
* bsc#1228410
* bsc#1228430
* bsc#1228486
* bsc#1228650
* bsc#1228857
* bsc#1229312
* bsc#1229429
* bsc#1229585
* bsc#1229752
* bsc#1229808
* bsc#1230055
* bsc#1230220
* bsc#1230231
* bsc#1230270
* bsc#1230558
* bsc#1230827
* bsc#1230918
* bsc#1231083
* bsc#1231089
* bsc#1231098
* bsc#1231101
* bsc#1231108
* bsc#1231111
* bsc#1231132
* bsc#1231135
* bsc#1231138
* bsc#1231169
* bsc#1231178
* bsc#1231180
* bsc#1231181
* bsc#1231187
* bsc#1231202
* bsc#1231434
* bsc#1231441
* bsc#1231452
* bsc#1231465
* bsc#1231474
* bsc#1231481
* bsc#1231537
* bsc#1231541
* bsc#1231646
* bsc#1231849
* bsc#1231856
* bsc#1231858
* bsc#1231859
* bsc#1231864
* bsc#1231904
* bsc#1231916
* bsc#1231920
* bsc#1231923
* bsc#1231930
* bsc#1231931
* bsc#1231947
* bsc#1231952
* bsc#1231953
* bsc#1231959
* bsc#1231978
* bsc#1232013
* bsc#1232015
* bsc#1232016
* bsc#1232017
* bsc#1232027
* bsc#1232028
* bsc#1232047
* bsc#1232048
* bsc#1232050
* bsc#1232056
* bsc#1232076
* bsc#1232080
* bsc#1232094
* bsc#1232096
* bsc#1232098
* bsc#1232111
* bsc#1232126
* bsc#1232134
* bsc#1232135
* bsc#1232141
* bsc#1232142
* bsc#1232147
* bsc#1232152
* bsc#1232159
* bsc#1232162
* bsc#1232165
* bsc#1232180
* bsc#1232185
* bsc#1232187
* bsc#1232189
* bsc#1232195
* bsc#1232198
* bsc#1232201
* bsc#1232218
* bsc#1232224
* bsc#1232232
* bsc#1232254
* bsc#1232255
* bsc#1232264
* bsc#1232272
* bsc#1232279
* bsc#1232287
* bsc#1232293
* bsc#1232312
* bsc#1232317
* bsc#1232318
* bsc#1232333
* bsc#1232334
* bsc#1232335
* bsc#1232339
* bsc#1232349
* bsc#1232357
* bsc#1232359
* bsc#1232362
* bsc#1232364
* bsc#1232370
* bsc#1232371
* bsc#1232378
* bsc#1232385
* bsc#1232387
* bsc#1232394
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232483
* bsc#1232500
* bsc#1232503
* bsc#1232504
* bsc#1232507
* bsc#1232520
* bsc#1232552
* bsc#1232757
* bsc#1232819
* bsc#1232860
* bsc#1232870
* bsc#1232873
* bsc#1232877
* bsc#1232878
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232919
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233035
* bsc#1233049
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233117
* bsc#1233123
* bsc#1233125
* bsc#1233129
* bsc#1233130
* bsc#1233134
* bsc#1233135
* bsc#1233150
* bsc#1233189
* bsc#1233191
* bsc#1233197
* bsc#1233205
* bsc#1233206
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233214
* bsc#1233216
* bsc#1233238
* bsc#1233241
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233350
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233528
* bsc#1233548
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233570
* bsc#1233577
* bsc#1233580
* bsc#1233977
* bsc#1234012
* bsc#1234025
* bsc#1234085
* bsc#1234093
* bsc#1234098
* bsc#1234108
* jsc#PED-1166
* jsc#PED-1168
* jsc#PED-1170
* jsc#PED-1218
* jsc#PED-1220
* jsc#PED-1222
* jsc#PED-1223
* jsc#PED-1225
* jsc#PED-2849
* jsc#SES-1880


Cross-References:

* CVE-2021-47594
* CVE-2022-48674
* CVE-2022-48979
* CVE-2022-48982
* CVE-2022-48983
* CVE-2022-48989
* CVE-2022-48990
* CVE-2023-52915
* CVE-2023-52917
* CVE-2023-52918
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26782
* CVE-2024-26906
* CVE-2024-26953
* CVE-2024-35888
* CVE-2024-35937
* CVE-2024-35980
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36953
* CVE-2024-36954
* CVE-2024-38577
* CVE-2024-38589
* CVE-2024-38615
* CVE-2024-40997
* CVE-2024-41016
* CVE-2024-41023
* CVE-2024-41049
* CVE-2024-42131
* CVE-2024-43817
* CVE-2024-43897
* CVE-2024-44932
* CVE-2024-44964
* CVE-2024-44995
* CVE-2024-46681
* CVE-2024-46800
* CVE-2024-46802
* CVE-2024-46804
* CVE-2024-46805
* CVE-2024-46807
* CVE-2024-46810
* CVE-2024-46812
* CVE-2024-46819
* CVE-2024-46821
* CVE-2024-46835
* CVE-2024-46842
* CVE-2024-46853
* CVE-2024-46859
* CVE-2024-46864
* CVE-2024-46871
* CVE-2024-47663
* CVE-2024-47665
* CVE-2024-47667
* CVE-2024-47669
* CVE-2024-47670
* CVE-2024-47671
* CVE-2024-47679
* CVE-2024-47682
* CVE-2024-47693
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47701
* CVE-2024-47709
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47718
* CVE-2024-47723
* CVE-2024-47728
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47742
* CVE-2024-47745
* CVE-2024-47749
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49852
* CVE-2024-49855
* CVE-2024-49861
* CVE-2024-49863
* CVE-2024-49868
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49875
* CVE-2024-49877
* CVE-2024-49879
* CVE-2024-49884
* CVE-2024-49891
* CVE-2024-49900
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49905
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49921
* CVE-2024-49924
* CVE-2024-49925
* CVE-2024-49934
* CVE-2024-49935
* CVE-2024-49938
* CVE-2024-49945
* CVE-2024-49947
* CVE-2024-49950
* CVE-2024-49957
* CVE-2024-49963
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49968
* CVE-2024-49981
* CVE-2024-49983
* CVE-2024-49985
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50009
* CVE-2024-50013
* CVE-2024-50017
* CVE-2024-50025
* CVE-2024-50026
* CVE-2024-50031
* CVE-2024-50044
* CVE-2024-50062
* CVE-2024-50067
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50077
* CVE-2024-50078
* CVE-2024-50082
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50138
* CVE-2024-50141
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50160
* CVE-2024-50167
* CVE-2024-50171
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50215
* CVE-2024-50218
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50249
* CVE-2024-50255
* CVE-2024-50259
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53052
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53079
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53104
* CVE-2024-53110


CVSS scores:

* CVE-2021-47594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48674 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48979 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48990 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48990 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52917 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46804 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46805 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46871 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47667 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47669 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47693 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47695 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49861 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49870 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49875 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49902 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49903 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49924 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50008 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50259 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5



An update that solves 230 vulnerabilities, contains 10 features and has 33
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
(bsc#1226560).
* CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
(bsc#1231959).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26906: Fixed invalid vsyscall page read for
copy_from_kernel_nofault() (bsc#1223202).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in
skb->head
(bsc#1224518).
* CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
(bsc#1224526).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
* CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
(bsc#1227853).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
* CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
reset (bsc#1230220).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init()
(bsc#1230558).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and
find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns
an
error (bsc#1231920).
* CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
LSMs in between (bsc#1232135).
* CVE-2024-47757: nilfs2: fix potential oob read in
nilfs_btree_check_delete()
(bsc#1232187).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start
a
new trasacntion (bsc#1232272).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
* CVE-2024-49968: ext4: fix error message when rejecting the default hash
(bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's
return
value (bsc#1232318).
* CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
(bsc#1232520).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during
module unload (bsc#1232877).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too
(bsc#1232884).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy
(bsc#1232905).
* CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
vbva_mouse_pointer_shape (bsc#1232890).
* CVE-2024-50135: nvme-pci: fix race condition between reset and
nvme_dev_disable() (bsc#1232888).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure
(bsc#1233056).
* CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler()
(bsc#1233070).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create
fails
(bsc#1233110).
* CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling
fiber
(bsc#1233107).
* CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-
mapped VPEs (bsc#1233106).
* CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in
pc_clock_settime() (bsc#1233103).
* CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts
(bsc#1233113).
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
(bsc#1233117).
* CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks
(bsc#1233205).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
nsim_nexthop_bucket_activity_write() (bsc#1233214).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug
printk
(bsc#1233456).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for
dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start
write (bsc#1233548).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for
non-paged
SKB data (bsc#1233552).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).
* CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
scmi_bus_notifier() (bsc#1233561).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53088: i40e: fix race condition by adding filter's
intermediate
sync state (bsc#1233580).
* CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).

The following non-security bugs were fixed:

* Drop OCFS2 patch causing a regression (bsc#1233255).
* Fix regression on AMDGPU driver (bsc#1233134).
* Removed the duplicated check of static_assert(sizeof(struct work_struct)
>=
sizeof(struct rcu_head)).
* Revert "cgroup: Fix memory leak caused by missing
cgroup_bpf_offline"
(bsc#1234108).
* Revert "ixgbe: Manual AN-37 for troublesome link partners for X550
SFI"
(git-fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
(git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic"
(git-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* acpi: CPPC: Fix _CPC register setting issue (git-fixes).
* acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
* acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
detection issue (stable-fixes).
* acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* add bugreference to a hv_netvsc patch (bsc#1232413).
* alsa: 6fire: Release resources at card release (git-fixes).
* alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
* alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
fixes).
* alsa: hda/realtek: Limit internal Mic boost on Dell platform
(stable-fixes).
* alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
* alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10
(stable-
fixes).
* alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
* alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
* alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
* arm64: Force position-independent veneers (git-fixes).
* arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
* asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).
* asoc: cs42l51: Fix some error handling paths in cs42l51_probe()
(git-fixes).
* asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit
(stable-fixes).
* asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
fixes).
* asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
* block: Avoid leaking hctx->nr_active counter on batched completion
(bsc#1231923).
* bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs
(git-fixes).
* bnxt_en: Fix the PCI-AER routines (git-fixes).
* bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
* bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
(git-fixes).
* bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
* bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
* bnxt_en: Wait for FLR to complete during probe (git-fixes).
* bnxt_en: refactor reset close code (git-fixes).
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* chtls: fix tp->rcv_tstamp initialization (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxgb4: Properly lock TX queue for the selftest (git-fixes).
* cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
* cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
fixes).
* drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-
fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
(stable-
fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with
real
VLA (stable-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* e1000e: Fix S0ix residency on corporate systems (git-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match'
(git-fixes).
* gve: Fix XDP TX completion handling when counters overflow (git-fixes).
* gve: Fix an edge case for TSO skb validity check (git-fixes).
* gve: Fix skb truesize underestimation (git-fixes).
* gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
fixes).
* hid: core: zero-initialize the report buffer (git-fixes).
* hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* hid: multitouch: Add support for B2402FVA track point (stable-fixes).
* hid: wacom: Defer calculation of resolution until resolution_code is known
(git-fixes).
* hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* hid: wacom: fix when get product name maybe null pointer (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
(git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()
(git-
fixes).
* i40e: Fix XDP program unloading while removing the driver (git-fixes).
* i40e: Fix filter input checks to prevent config with invalid values (git-
fixes).
* i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
* i40e: Report MFS in decimal base instead of hex (git-fixes).
* i40e: Restore VF MSI-X state during PCI reset (git-fixes).
* i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
* i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
fixes).
* i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
* i40e: take into account XDP Tx queues when stopping rings (git-fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
* iavf: Fix promiscuous mode configuration flow messages (git-fixes).
* iavf: Introduce new state machines for flow director (git-fixes).
* iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-
fixes).
* iavf: fix FDIR rule fields masks validation (git-fixes).
* iavf: in iavf_down, disable queues when removing the driver (git-fixes).
* iavf: initialize waitqueues before starting watchdog_task (git-fixes).
* iavf: send VLAN offloading caps once after VFR (git-fixes).
* iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-
fixes).
* ibmvnic: Do partial reset on login failure (bsc#1233150).
* ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
* ibmvnic: Ensure login failure recovery is safe from other resets
(bsc#1233150).
* ibmvnic: Handle DMA unmapping of login buffs in release functions
(bsc#1233150).
* ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
* ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
* ice: Fix NULL pointer deref during VF reset (git-fixes).
* ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
* ice: Fix link_down_on_close message (git-fixes).
* ice: Fix netif_is_ice() in Safe Mode (git-fixes).
* ice: Interpret .set_channels() input differently (git-fixes).
* ice: Shut down VSI with "link-down-on-close" enabled (git-fixes).
* ice: avoid executing commands on other ports when driving sync (git-fixes).
* ice: change q_index variable type to s16 to store -1 value (git-fixes).
* ice: fix ICE_LAST_OFFSET formula (git-fixes).
* ice: fix VLAN replay after reset (git-fixes).
* ice: fix accounting for filters shared by multiple VSIs (git-fixes).
* ice: fix accounting if a VLAN already exists (git-fixes).
* ice: fix over-shifted variable (git-fixes).
* ice: fix receive buffer size miscalculation (git-fixes).
* ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-
fixes).
* ice: reset first in crash dump kernels (git-fixes).
* ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
* ice: tc: allow zero flags in parsing tc flower (git-fixes).
* ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
fixes).
* idpf: Interpret .set_channels() input differently (git-fixes).
* idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-
fixes).
* idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
* idpf: disable local BH when scheduling napi for marker packets (git-fixes).
* idpf: distinguish vports by the dev_port attribute (git-fixes).
* idpf: do not enable NAPI and interrupts prior to allocating Rx buffers
(git-
fixes).
* idpf: fix UAFs when destroying the queues (git-fixes).
* idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
* idpf: fix memleak in vport interrupt configuration (git-fixes).
* idpf: fix memory leaks and crashes while performing a soft reset (git-
fixes).
* igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
* igb: Fix missing time sync events (git-fixes).
* igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
* igb: extend PTP timestamp adjustments to i211 (git-fixes).
* igc: Check VLAN EtherType mask (git-fixes).
* igc: Check VLAN TCI mask (git-fixes).
* igc: Fix hicredit calculation (git-fixes).
* igc: Fix missing time sync events (git-fixes).
* igc: Remove temporary workaround (git-fixes).
* igc: Report VLAN EtherType matching back to user (git-fixes).
* igc: Unlock on error in igc_io_resume() (git-fixes).
* iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* iio: light: veml6030: fix microlux value calculation (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
* input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
* input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
(git-fixes).
* input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-
fixes).
* input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
(git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
fixes).
* ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
* ixgbe: fix crash with empty VF macvlan list (git-fixes).
* ixgbe: fix timestamp configuration code (git-fixes).
* ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
* kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
* kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
* mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer
(stable-fixes).
* media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* mei: use kvmalloc for read buffer (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm/memory: add non-anonymous page check in the copy_present_page()
(bsc#1231646).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
fixes).
* net/mlx5: Added cond_resched() to crdump collection (git-fixes).
* net/mlx5: Allow 0 for total host VFs (git-fixes).
* net/mlx5: Correctly compare pkt reformat ids (git-fixes).
* net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
* net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
* net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
(git-fixes).
* net/mlx5: Drain health before unregistering devlink (git-fixes).
* net/mlx5: E-switch, register event handler before arming the event (git-
fixes).
* net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
* net/mlx5: Fix fw tracer first block check (git-fixes).
* net/mlx5: Handle fw tracer change ownership event based on MTRC
(git-fixes).
* net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
* net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
* net/mlx5: Lag, do not use the hardcoded value of the first port
(git-fixes).
* net/mlx5: Lag, restore buckets number to default after hash LAG
deactivation
(git-fixes).
* net/mlx5: Skip clock update work when device is in error state (git-fixes).
* net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
* net/mlx5: Update the list of the PCI supported devices (git-fixes).
* net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
* net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO
(git-fixes).
* net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
* net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
* net/mlx5: fs, lock FTE when checking if active (git-fixes).
* net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
(git-fixes).
* net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
* net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
fixes).
* net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
* net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
* net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
* net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer
(git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer for
representors (git-fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-
fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer used
by representors (git-fixes).
* net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
* net/mlx5e: Do not offload internal port if filter device is out device
(git-
fixes).
* net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
* net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
* net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set
(git-fixes).
* net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).
* net/mlx5e: Fix pedit endianness (git-fixes).
* net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
* net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-
fixes).
* net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
* net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
(git-fixes).
* net/mlx5e: Reduce the size of icosq_str (git-fixes).
* net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
* net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
exhaustion (git-fixes).
* net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
* net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-
fixes).
* net/mlx5e: fix double free of encap_header (git-fixes).
* net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-
fixes).
* net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
* net: ena: Fix potential sign extension issue (git-fixes).
* net: ena: Remove ena_select_queue (git-fixes).
* net: ena: Wrong missing IO completions check order (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flow_spec
(git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: usb: usbnet: fix race in probe failure (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* pci: Add T_PVPERL macro (git-fixes).
* pci: Fix reset_method_store() memory leak (git-fixes).
* pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* pci: keystone: Set mode as Root Complex for "ti,keystone-pcie"
compatible
(git-fixes).
* pci: rockchip-ep: Fix address translation unit programming (git-fixes).
* phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement
(git-
fixes).
* platform/surface: aggregator: Fix warning when controller is destroyed in
probe (git-fixes).
* platform/x86: dell-sysman: add support for alienware products (stable-
fixes).
* platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
* qed: avoid truncating work queue length (git-fixes).
* rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* rdma/hns: Add clear_hem return value to log (git-fixes)
* rdma/hns: Add mutex_destroy() (git-fixes)
* rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* rdma/hns: Fix out-of-order issue of requester when setting FENCE
(git-fixes)
* rdma/hns: Remove unnecessary QP type checks (git-fixes)
* rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* rdma/hns: Use macro instead of magic number (git-fixes)
* rdma/mlx5: Move events notifier registration to be after device
registration
(git-fixes)
* rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
fixes).
* rdma/rxe: Fix the qp flush warnings in req (git-fixes)
* rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* sfc: Check firmware supports Ethernet PTP filter (git-fixes).
* sfc: do not unregister flow_indr if it was never registered (git-fixes).
* sfc: fix a double-free bug in efx_probe_filters (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).
* thermal: core: Initialize thermal zones before registering them
(git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
* tun: prevent negative ifindex (git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* usb: chaoskey: fail open after removal (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
* usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* usb: serial: option: add Quectel RG650V (stable-fixes).
* usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* usb: typec: fix potential out of bounds in
ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* usbip: tools: Fix detach_port() invalid port error path (git-fixes).
* vdpa/mlx5: preserve CVQ vringh index (git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: Fix memory leak in management tx (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
(git-fixes).
* wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-
fixes).
* wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
(git-fixes).
* wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* x86/kvm: fix is_stale_page_fault() (bsc#1221333).
* xhci: Fix Link TRB DMA in command ring stopped completion event
(git-fixes).
* xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
* xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4376=1 openSUSE-SLE-15.5-2024-4376=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4376=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64)
* kernel-azure-extra-debuginfo-5.14.21-150500.33.75.1
* kernel-azure-debugsource-5.14.21-150500.33.75.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.75.1
* kernel-azure-devel-5.14.21-150500.33.75.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.75.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.75.1
* cluster-md-kmp-azure-5.14.21-150500.33.75.1
* kernel-syms-azure-5.14.21-150500.33.75.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.75.1
* kernel-azure-extra-5.14.21-150500.33.75.1
* kernel-azure-debuginfo-5.14.21-150500.33.75.1
* gfs2-kmp-azure-5.14.21-150500.33.75.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.75.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.75.1
* kernel-azure-optional-5.14.21-150500.33.75.1
* kselftests-kmp-azure-5.14.21-150500.33.75.1
* reiserfs-kmp-azure-5.14.21-150500.33.75.1
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.75.1
* dlm-kmp-azure-5.14.21-150500.33.75.1
* ocfs2-kmp-azure-5.14.21-150500.33.75.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.75.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.75.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-5.14.21-150500.33.75.1
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.75.1
* openSUSE Leap 15.5 (noarch)
* kernel-devel-azure-5.14.21-150500.33.75.1
* kernel-source-azure-5.14.21-150500.33.75.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.75.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-azure-debugsource-5.14.21-150500.33.75.1
* kernel-syms-azure-5.14.21-150500.33.75.1
* kernel-azure-devel-5.14.21-150500.33.75.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.75.1
* kernel-azure-debuginfo-5.14.21-150500.33.75.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-devel-azure-5.14.21-150500.33.75.1
* kernel-source-azure-5.14.21-150500.33.75.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47594.html
* https://www.suse.com/security/cve/CVE-2022-48674.html
* https://www.suse.com/security/cve/CVE-2022-48979.html
* https://www.suse.com/security/cve/CVE-2022-48982.html
* https://www.suse.com/security/cve/CVE-2022-48983.html
* https://www.suse.com/security/cve/CVE-2022-48989.html
* https://www.suse.com/security/cve/CVE-2022-48990.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-35937.html
* https://www.suse.com/security/cve/CVE-2024-35980.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36953.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-38577.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-38615.html
* https://www.suse.com/security/cve/CVE-2024-40997.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-41049.html
* https://www.suse.com/security/cve/CVE-2024-42131.html
* https://www.suse.com/security/cve/CVE-2024-43817.html
* https://www.suse.com/security/cve/CVE-2024-43897.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46804.html
* https://www.suse.com/security/cve/CVE-2024-46805.html
* https://www.suse.com/security/cve/CVE-2024-46807.html
* https://www.suse.com/security/cve/CVE-2024-46810.html
* https://www.suse.com/security/cve/CVE-2024-46812.html
* https://www.suse.com/security/cve/CVE-2024-46819.html
* https://www.suse.com/security/cve/CVE-2024-46821.html
* https://www.suse.com/security/cve/CVE-2024-46835.html
* https://www.suse.com/security/cve/CVE-2024-46842.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://www.suse.com/security/cve/CVE-2024-46864.html
* https://www.suse.com/security/cve/CVE-2024-46871.html
* https://www.suse.com/security/cve/CVE-2024-47663.html
* https://www.suse.com/security/cve/CVE-2024-47665.html
* https://www.suse.com/security/cve/CVE-2024-47667.html
* https://www.suse.com/security/cve/CVE-2024-47669.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50259.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1221333
* https://bugzilla.suse.com/show_bug.cgi?id=1222364
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1223919
* https://bugzilla.suse.com/show_bug.cgi?id=1223942
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224526
* https://bugzilla.suse.com/show_bug.cgi?id=1224574
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225812
* https://bugzilla.suse.com/show_bug.cgi?id=1226560
* https://bugzilla.suse.com/show_bug.cgi?id=1226592
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227853
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228486
* https://bugzilla.suse.com/show_bug.cgi?id=1228650
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229752
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231098
* https://bugzilla.suse.com/show_bug.cgi?id=1231101
* https://bugzilla.suse.com/show_bug.cgi?id=1231108
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231132
* https://bugzilla.suse.com/show_bug.cgi?id=1231135
* https://bugzilla.suse.com/show_bug.cgi?id=1231138
* https://bugzilla.suse.com/show_bug.cgi?id=1231169
* https://bugzilla.suse.com/show_bug.cgi?id=1231178
* https://bugzilla.suse.com/show_bug.cgi?id=1231180
* https://bugzilla.suse.com/show_bug.cgi?id=1231181
* https://bugzilla.suse.com/show_bug.cgi?id=1231187
* https://bugzilla.suse.com/show_bug.cgi?id=1231202
* https://bugzilla.suse.com/show_bug.cgi?id=1231434
* https://bugzilla.suse.com/show_bug.cgi?id=1231441
* https://bugzilla.suse.com/show_bug.cgi?id=1231452
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231474
* https://bugzilla.suse.com/show_bug.cgi?id=1231481
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231541
* https://bugzilla.suse.com/show_bug.cgi?id=1231646
* https://bugzilla.suse.com/show_bug.cgi?id=1231849
* https://bugzilla.suse.com/show_bug.cgi?id=1231856
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231904
* https://bugzilla.suse.com/show_bug.cgi?id=1231916
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231923
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231931
* https://bugzilla.suse.com/show_bug.cgi?id=1231947
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1231953
* https://bugzilla.suse.com/show_bug.cgi?id=1231959
* https://bugzilla.suse.com/show_bug.cgi?id=1231978
* https://bugzilla.suse.com/show_bug.cgi?id=1232013
* https://bugzilla.suse.com/show_bug.cgi?id=1232015
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232017
* https://bugzilla.suse.com/show_bug.cgi?id=1232027
* https://bugzilla.suse.com/show_bug.cgi?id=1232028
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232050
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232076
* https://bugzilla.suse.com/show_bug.cgi?id=1232080
* https://bugzilla.suse.com/show_bug.cgi?id=1232094
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232098
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232162
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232185
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232189
* https://bugzilla.suse.com/show_bug.cgi?id=1232195
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232232
* https://bugzilla.suse.com/show_bug.cgi?id=1232254
* https://bugzilla.suse.com/show_bug.cgi?id=1232255
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232279
* https://bugzilla.suse.com/show_bug.cgi?id=1232287
* https://bugzilla.suse.com/show_bug.cgi?id=1232293
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232317
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232333
* https://bugzilla.suse.com/show_bug.cgi?id=1232334
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232349
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232359
* https://bugzilla.suse.com/show_bug.cgi?id=1232362
* https://bugzilla.suse.com/show_bug.cgi?id=1232364
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232378
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232503
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232507
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232552
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233134
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233150
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233214
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233528
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://jira.suse.com/browse/PED-1166
* https://jira.suse.com/browse/PED-1168
* https://jira.suse.com/browse/PED-1170
* https://jira.suse.com/browse/PED-1218
* https://jira.suse.com/browse/PED-1220
* https://jira.suse.com/browse/PED-1222
* https://jira.suse.com/browse/PED-1223
* https://jira.suse.com/browse/PED-1225
* https://jira.suse.com/browse/PED-2849
* https://jira.suse.com/browse/SES-1880


--===============7373679911819052108==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:4376-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td></td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">bsc#1082555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218644">bsc#1218644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220382">bsc#1220382</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221309">bsc#1221309</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221333">bsc#1221333</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">bsc#1222364</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222590">bsc#1222590</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">bsc#1223202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223656">bsc#1223656</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223848">bsc#1223848</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223919">bsc#1223919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223942">bsc#1223942</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224518">bsc#1224518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224526">bsc#1224526</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224574">bsc#1224574</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225725">bsc#1225725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225730">bsc#1225730</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225764">bsc#1225764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225812">bsc#1225812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226560">bsc#1226560</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226592">bsc#1226592</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226631">bsc#1226631</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226748">bsc#1226748</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226872">bsc#1226872</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">bsc#1227853</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">bsc#1228410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228430">bsc#1228430</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">bsc#1228486</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">bsc#1228650</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">bsc#1228857</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">bsc#1229312</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229429">bsc#1229429</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229585">bsc#1229585</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">bsc#1229752</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229808">bsc#1229808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230055">bsc#1230055</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230220">bsc#1230220</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230231">bsc#1230231</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230270">bsc#1230270</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230558">bsc#1230558</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230827">bsc#1230827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230918">bsc#1230918</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231083">bsc#1231083</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231089">bsc#1231089</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231098">bsc#1231098</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231101">bsc#1231101</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231108">bsc#1231108</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231111">bsc#1231111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231132">bsc#1231132</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231135">bsc#1231135</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231138">bsc#1231138</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231169">bsc#1231169</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231178">bsc#1231178</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231180">bsc#1231180</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231181">bsc#1231181</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231187">bsc#1231187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231202">bsc#1231202</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231434">bsc#1231434</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231441">bsc#1231441</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231452">bsc#1231452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231465">bsc#1231465</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231474">bsc#1231474</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231481">bsc#1231481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231537">bsc#1231537</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231541">bsc#1231541</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231646">bsc#1231646</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231849">bsc#1231849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231856">bsc#1231856</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231858">bsc#1231858</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231859">bsc#1231859</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231864">bsc#1231864</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231904">bsc#1231904</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231916">bsc#1231916</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">bsc#1231920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231923">bsc#1231923</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231930">bsc#1231930</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231931">bsc#1231931</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231947">bsc#1231947</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231952">bsc#1231952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231953">bsc#1231953</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231959">bsc#1231959</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231978">bsc#1231978</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232013">bsc#1232013</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232015">bsc#1232015</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232016">bsc#1232016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232017">bsc#1232017</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232027">bsc#1232027</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232028">bsc#1232028</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232047">bsc#1232047</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232048">bsc#1232048</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232050">bsc#1232050</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232056">bsc#1232056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232076">bsc#1232076</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232080">bsc#1232080</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232094">bsc#1232094</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232096">bsc#1232096</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232098">bsc#1232098</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232111">bsc#1232111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232126">bsc#1232126</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232134">bsc#1232134</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232135">bsc#1232135</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232141">bsc#1232141</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232142">bsc#1232142</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232147">bsc#1232147</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232152">bsc#1232152</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">bsc#1232159</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232162">bsc#1232162</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232165">bsc#1232165</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232180">bsc#1232180</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232185">bsc#1232185</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232187">bsc#1232187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232189">bsc#1232189</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232195">bsc#1232195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">bsc#1232198</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">bsc#1232201</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232218">bsc#1232218</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232224">bsc#1232224</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232232">bsc#1232232</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232254">bsc#1232254</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232255">bsc#1232255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232264">bsc#1232264</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232272">bsc#1232272</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232279">bsc#1232279</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232287">bsc#1232287</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232293">bsc#1232293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232312">bsc#1232312</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232317">bsc#1232317</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232318">bsc#1232318</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232333">bsc#1232333</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232334">bsc#1232334</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232335">bsc#1232335</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232339">bsc#1232339</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232349">bsc#1232349</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232357">bsc#1232357</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232359">bsc#1232359</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232362">bsc#1232362</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232364">bsc#1232364</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232370">bsc#1232370</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232371">bsc#1232371</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232378">bsc#1232378</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232385">bsc#1232385</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232387">bsc#1232387</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232394">bsc#1232394</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232413">bsc#1232413</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232416">bsc#1232416</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232436">bsc#1232436</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232483">bsc#1232483</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232500">bsc#1232500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232503">bsc#1232503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232504">bsc#1232504</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232507">bsc#1232507</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">bsc#1232520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232552">bsc#1232552</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232757">bsc#1232757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232819">bsc#1232819</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232860">bsc#1232860</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232870">bsc#1232870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232873">bsc#1232873</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232877">bsc#1232877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232878">bsc#1232878</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232881">bsc#1232881</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232884">bsc#1232884</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232885">bsc#1232885</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232887">bsc#1232887</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232888">bsc#1232888</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232890">bsc#1232890</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232892">bsc#1232892</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232896">bsc#1232896</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232897">bsc#1232897</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232905">bsc#1232905</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232907">bsc#1232907</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">bsc#1232919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232926">bsc#1232926</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232928">bsc#1232928</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232935">bsc#1232935</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233035">bsc#1233035</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233049">bsc#1233049</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233051">bsc#1233051</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233056">bsc#1233056</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233057">bsc#1233057</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233061">bsc#1233061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233063">bsc#1233063</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233065">bsc#1233065</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233067">bsc#1233067</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233070">bsc#1233070</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233073">bsc#1233073</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233074">bsc#1233074</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233100">bsc#1233100</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233103">bsc#1233103</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233104">bsc#1233104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233105">bsc#1233105</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233106">bsc#1233106</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233107">bsc#1233107</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233108">bsc#1233108</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233110">bsc#1233110</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233111">bsc#1233111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233113">bsc#1233113</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233114">bsc#1233114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233117">bsc#1233117</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233123">bsc#1233123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233125">bsc#1233125</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233129">bsc#1233129</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233130">bsc#1233130</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233134">bsc#1233134</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233135">bsc#1233135</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233150">bsc#1233150</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233189">bsc#1233189</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233191">bsc#1233191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233197">bsc#1233197</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233205">bsc#1233205</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233206">bsc#1233206</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233209">bsc#1233209</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233210">bsc#1233210</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233211">bsc#1233211</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233212">bsc#1233212</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233214">bsc#1233214</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233216">bsc#1233216</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233238">bsc#1233238</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233241">bsc#1233241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233253">bsc#1233253</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233255">bsc#1233255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233293">bsc#1233293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233350">bsc#1233350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233452">bsc#1233452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233453">bsc#1233453</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233454">bsc#1233454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233456">bsc#1233456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233457">bsc#1233457</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233458">bsc#1233458</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233460">bsc#1233460</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233462">bsc#1233462</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233463">bsc#1233463</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233468">bsc#1233468</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233471">bsc#1233471</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233476">bsc#1233476</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233478">bsc#1233478</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">bsc#1233479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233481">bsc#1233481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233484">bsc#1233484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233487">bsc#1233487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233490">bsc#1233490</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233491">bsc#1233491</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233528">bsc#1233528</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233548">bsc#1233548</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233552">bsc#1233552</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233553">bsc#1233553</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233554">bsc#1233554</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233555">bsc#1233555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">bsc#1233557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233560">bsc#1233560</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233561">bsc#1233561</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233570">bsc#1233570</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233577">bsc#1233577</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233580">bsc#1233580</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233977">bsc#1233977</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234012">bsc#1234012</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234025">bsc#1234025</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234085">bsc#1234085</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234093">bsc#1234093</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234098">bsc#1234098</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234108">bsc#1234108</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-1166">jsc#PED-1166</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-1168">jsc#PED-1168</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-1170">jsc#PED-1170</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-1218">jsc#PED-1218</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-1220">jsc#PED-1220</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-1222">jsc#PED-1222</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-1223">jsc#PED-1223</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-1225">jsc#PED-1225</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-2849">jsc#PED-2849</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/SES-1880">jsc#SES-1880</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47594.html">CVE-2021-47594</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48674.html">CVE-2022-48674</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48979.html">CVE-2022-48979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48982.html">CVE-2022-48982</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48983.html">CVE-2022-48983</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48989.html">CVE-2022-48989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48990.html">CVE-2022-48990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52915.html">CVE-2023-52915</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52917.html">CVE-2023-52917</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52918.html">CVE-2023-52918</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52921.html">CVE-2023-52921</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52922.html">CVE-2023-52922</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26782.html">CVE-2024-26782</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26906.html">CVE-2024-26906</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26953.html">CVE-2024-26953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35888.html">CVE-2024-35888</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35937.html">CVE-2024-35937</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35980.html">CVE-2024-35980</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36484.html">CVE-2024-36484</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36883.html">CVE-2024-36883</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36886.html">CVE-2024-36886</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36905.html">CVE-2024-36905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36953.html">CVE-2024-36953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36954.html">CVE-2024-36954</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38577.html">CVE-2024-38577</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38589.html">CVE-2024-38589</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38615.html">CVE-2024-38615</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40997.html">CVE-2024-40997</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">CVE-2024-41016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41023.html">CVE-2024-41023</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41049.html">CVE-2024-41049</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42131.html">CVE-2024-42131</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43817.html">CVE-2024-43817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43897.html">CVE-2024-43897</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44932.html">CVE-2024-44932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44964.html">CVE-2024-44964</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44995.html">CVE-2024-44995</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46681.html">CVE-2024-46681</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46800.html">CVE-2024-46800</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46802.html">CVE-2024-46802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46804.html">CVE-2024-46804</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46805.html">CVE-2024-46805</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46807.html">CVE-2024-46807</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46810.html">CVE-2024-46810</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46812.html">CVE-2024-46812</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46819.html">CVE-2024-46819</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46821.html">CVE-2024-46821</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46835.html">CVE-2024-46835</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46842.html">CVE-2024-46842</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46853.html">CVE-2024-46853</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46859.html">CVE-2024-46859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46864.html">CVE-2024-46864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46871.html">CVE-2024-46871</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47663.html">CVE-2024-47663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47665.html">CVE-2024-47665</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47667.html">CVE-2024-47667</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47669.html">CVE-2024-47669</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47670.html">CVE-2024-47670</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47671.html">CVE-2024-47671</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47679.html">CVE-2024-47679</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47682.html">CVE-2024-47682</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47693.html">CVE-2024-47693</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47695.html">CVE-2024-47695</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47696.html">CVE-2024-47696</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47697.html">CVE-2024-47697</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47698.html">CVE-2024-47698</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47699.html">CVE-2024-47699</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">CVE-2024-47701</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47709.html">CVE-2024-47709</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47712.html">CVE-2024-47712</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47713.html">CVE-2024-47713</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47718.html">CVE-2024-47718</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47723.html">CVE-2024-47723</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47728.html">CVE-2024-47728</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47735.html">CVE-2024-47735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47737.html">CVE-2024-47737</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47742.html">CVE-2024-47742</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47745.html">CVE-2024-47745</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47749.html">CVE-2024-47749</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47756.html">CVE-2024-47756</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47757.html">CVE-2024-47757</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49850.html">CVE-2024-49850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49851.html">CVE-2024-49851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49852.html">CVE-2024-49852</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49855.html">CVE-2024-49855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49861.html">CVE-2024-49861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49863.html">CVE-2024-49863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49868.html">CVE-2024-49868</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49870.html">CVE-2024-49870</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49871.html">CVE-2024-49871</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49875.html">CVE-2024-49875</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49877.html">CVE-2024-49877</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49879.html">CVE-2024-49879</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">CVE-2024-49884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49891.html">CVE-2024-49891</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49900.html">CVE-2024-49900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49902.html">CVE-2024-49902</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49903.html">CVE-2024-49903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49905.html">CVE-2024-49905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49907.html">CVE-2024-49907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49908.html">CVE-2024-49908</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49921.html">CVE-2024-49921</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49924.html">CVE-2024-49924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49925.html">CVE-2024-49925</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49934.html">CVE-2024-49934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49935.html">CVE-2024-49935</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49938.html">CVE-2024-49938</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49945.html">CVE-2024-49945</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49947.html">CVE-2024-49947</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49950.html">CVE-2024-49950</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49957.html">CVE-2024-49957</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49963.html">CVE-2024-49963</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49965.html">CVE-2024-49965</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49966.html">CVE-2024-49966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49968.html">CVE-2024-49968</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49981.html">CVE-2024-49981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49983.html">CVE-2024-49983</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49985.html">CVE-2024-49985</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49989.html">CVE-2024-49989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50003.html">CVE-2024-50003</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50007.html">CVE-2024-50007</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50008.html">CVE-2024-50008</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50009.html">CVE-2024-50009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50013.html">CVE-2024-50013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50017.html">CVE-2024-50017</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50025.html">CVE-2024-50025</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50026.html">CVE-2024-50026</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50031.html">CVE-2024-50031</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50044.html">CVE-2024-50044</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50062.html">CVE-2024-50062</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50067.html">CVE-2024-50067</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50073.html">CVE-2024-50073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50074.html">CVE-2024-50074</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50077.html">CVE-2024-50077</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50078.html">CVE-2024-50078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50082.html">CVE-2024-50082</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50089.html">CVE-2024-50089</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50093.html">CVE-2024-50093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50095.html">CVE-2024-50095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50096.html">CVE-2024-50096</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50098.html">CVE-2024-50098</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50099.html">CVE-2024-50099</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50103.html">CVE-2024-50103</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50108.html">CVE-2024-50108</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50110.html">CVE-2024-50110</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">CVE-2024-50115</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50116.html">CVE-2024-50116</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50117.html">CVE-2024-50117</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50124.html">CVE-2024-50124</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50125.html">CVE-2024-50125</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50127.html">CVE-2024-50127</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50128.html">CVE-2024-50128</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50131.html">CVE-2024-50131</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50134.html">CVE-2024-50134</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50135.html">CVE-2024-50135</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50138.html">CVE-2024-50138</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50141.html">CVE-2024-50141</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50146.html">CVE-2024-50146</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50147.html">CVE-2024-50147</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50148.html">CVE-2024-50148</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50150.html">CVE-2024-50150</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50153.html">CVE-2024-50153</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50154.html">CVE-2024-50154</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50155.html">CVE-2024-50155</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50156.html">CVE-2024-50156</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50160.html">CVE-2024-50160</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50167.html">CVE-2024-50167</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50171.html">CVE-2024-50171</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50179.html">CVE-2024-50179</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50180.html">CVE-2024-50180</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50182.html">CVE-2024-50182</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50183.html">CVE-2024-50183</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50184.html">CVE-2024-50184</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50186.html">CVE-2024-50186</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50187.html">CVE-2024-50187</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50188.html">CVE-2024-50188</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50189.html">CVE-2024-50189</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50192.html">CVE-2024-50192</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50194.html">CVE-2024-50194</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50195.html">CVE-2024-50195</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50196.html">CVE-2024-50196</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50198.html">CVE-2024-50198</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50201.html">CVE-2024-50201</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50205.html">CVE-2024-50205</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50208.html">CVE-2024-50208</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50209.html">CVE-2024-50209</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50215.html">CVE-2024-50215</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50218.html">CVE-2024-50218</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50229.html">CVE-2024-50229</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50230.html">CVE-2024-50230</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50232.html">CVE-2024-50232</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50233.html">CVE-2024-50233</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50234.html">CVE-2024-50234</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50236.html">CVE-2024-50236</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50237.html">CVE-2024-50237</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50249.html">CVE-2024-50249</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50255.html">CVE-2024-50255</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50259.html">CVE-2024-50259</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50261.html">CVE-2024-50261</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50264.html">CVE-2024-50264</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50265.html">CVE-2024-50265</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50267.html">CVE-2024-50267</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50268.html">CVE-2024-50268</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50269.html">CVE-2024-50269</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50271.html">CVE-2024-50271</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50273.html">CVE-2024-50273</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50274.html">CVE-2024-50274</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50279.html">CVE-2024-50279</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50282.html">CVE-2024-50282</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50287.html">CVE-2024-50287</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50289.html">CVE-2024-50289</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">CVE-2024-50290</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50292.html">CVE-2024-50292</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50295.html">CVE-2024-50295</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50298.html">CVE-2024-50298</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50301.html">CVE-2024-50301</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50302.html">CVE-2024-50302</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53052.html">CVE-2024-53052</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53058.html">CVE-2024-53058</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53059.html">CVE-2024-53059</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53060.html">CVE-2024-53060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53061.html">CVE-2024-53061</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">CVE-2024-53063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53066.html">CVE-2024-53066</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53068.html">CVE-2024-53068</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53079.html">CVE-2024-53079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53085.html">CVE-2024-53085</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53088.html">CVE-2024-53088</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53104.html">CVE-2024-53104</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53110.html">CVE-2024-53110</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47594</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47594</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48674</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48674</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48674</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48979</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48982</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48982</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48983</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48983</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48989</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48990</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52915</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52915</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52917</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52917</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52917</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52918</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52918</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52918</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52922</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26782</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35888</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35888</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35937</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36484</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36886</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36886</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36953</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36954</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38577</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38577</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38589</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38615</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40997</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40997</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41023</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41023</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41049</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41049</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42131</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43817</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43897</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44932</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44964</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44995</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44995</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46681</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46800</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46802</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46804</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46805</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46805</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46807</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46807</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46807</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46810</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46812</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46812</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46819</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46821</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46821</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46835</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46835</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46842</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46842</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46853</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46853</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46859</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46864</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46871</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47663</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47665</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47667</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47669</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47670</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47671</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47671</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47679</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47682</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47682</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47682</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47693</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47695</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47695</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47695</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47696</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47696</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47696</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47697</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47697</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47697</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47698</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47698</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47698</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47699</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47709</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47709</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47709</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47712</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47712</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47713</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47713</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47718</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47718</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47723</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47723</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47723</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47728</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47728</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47735</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47737</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47737</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47737</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47742</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47742</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47742</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47745</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47745</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47745</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47749</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47756</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47756</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47756</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47757</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47757</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47757</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49851</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49852</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49861</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49863</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49868</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49870</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49870</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49870</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49871</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49875</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49875</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49875</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49877</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49877</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49877</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49879</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49879</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49879</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49891</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49891</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49891</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49900</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49902</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49902</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49905</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49907</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49908</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49921</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49925</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49934</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49935</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49938</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49945</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49945</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49947</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49947</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49950</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49950</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49957</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49957</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49963</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49963</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49965</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49965</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49966</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49966</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49968</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49981</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49983</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49983</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49985</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49985</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49989</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50003</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50007</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50007</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50007</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50008</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50008</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50008</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50013</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50017</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50025</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50025</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50026</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50026</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50031</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50031</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50044</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50062</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50062</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50067</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50074</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50074</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50077</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50077</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50078</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50082</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50082</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50089</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50093</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50095</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50096</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50096</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50098</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50098</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50099</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50099</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50103</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50103</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50108</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50108</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50110</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50116</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50117</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50124</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50125</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50127</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50128</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50131</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50134</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50135</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50138</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50141</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50146</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50147</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50148</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50150</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50153</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50154</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50155</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50155</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50156</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50160</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50167</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50167</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50171</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50179</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50180</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50182</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50183</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50184</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50186</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50186</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50187</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50187</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50188</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50188</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50189</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50189</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50192</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50192</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50194</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50194</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50195</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50195</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50196</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50196</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50198</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50198</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50201</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50201</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50205</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50208</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50209</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50215</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50215</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50218</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50229</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50230</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50232</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50233</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50234</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50236</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50237</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50249</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50249</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50255</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50259</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50259</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50259</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50261</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50264</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50265</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50265</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50267</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50268</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50268</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50269</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50269</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50271</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50271</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50273</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50273</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50274</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50274</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50279</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50279</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50282</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50282</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50287</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50287</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50289</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50292</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50295</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50298</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50298</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50301</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50301</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50302</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50302</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53052</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53052</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53058</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53059</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53059</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53060</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53061</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53061</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53066</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53066</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53068</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53068</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53079</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53085</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53085</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53088</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53088</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53104</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53104</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53110</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">Public Cloud
Module 15-SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 230 vulnerabilities, contains 10 features
and has 33 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to
receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
(bsc#1226560).</li>
<li>CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
(bsc#1231959).</li>
<li>CVE-2024-26782: mptcp: fix double-free on socket dismantle
(bsc#1222590).</li>
<li>CVE-2024-26906: Fixed invalid vsyscall page read for
copy_from_kernel_nofault() (bsc#1223202).</li>
<li>CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).</li>
<li>CVE-2024-35888: erspan: make sure erspan_base_hdr is present in
skb-&gt;head (bsc#1224518).</li>
<li>CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
(bsc#1224526).</li>
<li>CVE-2024-36883: net: fix out-of-bounds access in ops_init
(bsc#1225725).</li>
<li>CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).</li>
<li>CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV
sockets (bsc#1225742).</li>
<li>CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).</li>
<li>CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).</li>
<li>CVE-2024-38615: cpufreq: exit() callback is optional
(bsc#1226592).</li>
<li>CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
(bsc#1227853).</li>
<li>CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).</li>
<li>CVE-2024-44932: idpf: fix UAFs when destroying the queues
(bsc#1229808).</li>
<li>CVE-2024-44964: idpf: fix memory leaks and crashes while performing a
soft reset (bsc#1230220).</li>
<li>CVE-2024-44995: net: hns3: fix a deadlock problem when config TC
during resetting (bsc#1230231).</li>
<li>CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init()
(bsc#1230558).</li>
<li>CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).</li>
<li>CVE-2024-47679: vfs: fix race between evice_inodes() and
find_inode()&amp;iput() (bsc#1231930).</li>
<li>CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry
returns an error (bsc#1231920).</li>
<li>CVE-2024-47745: mm: split critical region in remap_file_pages() and
invoke LSMs in between (bsc#1232135).</li>
<li>CVE-2024-47757: nilfs2: fix potential oob read in
nilfs_btree_check_delete() (bsc#1232187).</li>
<li>CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to
start a new trasacntion (bsc#1232272).</li>
<li>CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).</li>
<li>CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver
core (bsc#1232224)</li>
<li>CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).</li>
<li>CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).</li>
<li>CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect
(bsc#1232159).</li>
<li>CVE-2024-49968: ext4: fix error message when rejecting the default
hash (bsc#1232264).</li>
<li>CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to
avoid double-free (bsc#1232096).</li>
<li>CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu
module unload (bsc#1232483).</li>
<li>CVE-2024-50009: cpufreq: amd-pstate: add check for
cpufreq_cpu_get&#x27;s return value (bsc#1232318).</li>
<li>CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
(bsc#1232520).</li>
<li>CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).</li>
<li>CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).</li>
<li>CVE-2024-50093: thermal: intel: int340x: processor: Fix warning
during module unload (bsc#1232877).</li>
<li>CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut
down (bsc#1232881).</li>
<li>CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON
too (bsc#1232884).</li>
<li>CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).</li>
<li>CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from
memory (bsc#1232919).</li>
<li>CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout
(bsc#1232928).</li>
<li>CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).</li>
<li>CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy
(bsc#1232905).</li>
<li>CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
vbva_mouse_pointer_shape (bsc#1232890).</li>
<li>CVE-2024-50135: nvme-pci: fix race condition between reset and
nvme_dev_disable() (bsc#1232888).</li>
<li>CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf
(bsc#1232935).</li>
<li>CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback
failure (bsc#1233056).</li>
<li>CVE-2024-50147: net/mlx5: Fix command bitmask initialization
(bsc#1233067).</li>
<li>CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).</li>
<li>CVE-2024-50154: tcp: Fix use-after-free of nreq in
reqsk_timer_handler() (bsc#1233070).</li>
<li>CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).</li>
<li>CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).</li>
<li>CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set
direct map (bsc#1233129).</li>
<li>CVE-2024-50184: virtio_pmem: Check device status before requesting
flush (bsc#1233135).</li>
<li>CVE-2024-50186: net: explicitly clear the sk pointer, when
pf-&gt;create fails (bsc#1233110).</li>
<li>CVE-2024-50188: net: phy: dp83869: fix memory corruption when
enabling fiber (bsc#1233107).</li>
<li>CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on
lazily-mapped VPEs (bsc#1233106).</li>
<li>CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in
pc_clock_settime() (bsc#1233103).</li>
<li>CVE-2024-50196: pinctrl: ocelot: fix system hang on level based
interrupts (bsc#1233113).</li>
<li>CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).</li>
<li>CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL
pages (bsc#1233117).</li>
<li>CVE-2024-50229: nilfs2: fix potential deadlock with newly created
symlinks (bsc#1233205).</li>
<li>CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of
checked flag (bsc#1233206).</li>
<li>CVE-2024-50259: netdevsim: Add trailing zero to terminate the string
in nsim_nexthop_bucket_activity_write() (bsc#1233214).</li>
<li>CVE-2024-50261: macsec: Fix use-after-free while sending the
offloading packet (bsc#1233253).</li>
<li>CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk-&gt;trans (bsc#1233453).</li>
<li>CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug
printk (bsc#1233456).</li>
<li>CVE-2024-50271: signal: restore the override_rlimit logic
(bsc#1233460).</li>
<li>CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting
it from the list (bsc#1233462).</li>
<li>CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).</li>
<li>CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty
bitset when resizing (bsc#1233468).</li>
<li>CVE-2024-50289: media: av7110: fix a spectre vulnerability
(bsc#1233478).</li>
<li>CVE-2024-50295: net: arc: fix the device for
dma_map_single/dma_unmap_single (bsc#1233484).</li>
<li>CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).</li>
<li>CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT
start write (bsc#1233548).</li>
<li>CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for
non-paged SKB data (bsc#1233552).</li>
<li>CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows
(bsc#1233555).</li>
<li>CVE-2024-53063: media: dvbdev: prevent the risk of out of memory
access (bsc#1233557).</li>
<li>CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
scmi_bus_notifier() (bsc#1233561).</li>
<li>CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).</li>
<li>CVE-2024-53088: i40e: fix race condition by adding filter&#x27;s
intermediate sync state (bsc#1233580).</li>
<li>CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).</li>
<li>CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Drop OCFS2 patch causing a regression (bsc#1233255).</li>
<li>Fix regression on AMDGPU driver (bsc#1233134).</li>
<li>Removed the duplicated check of static_assert(sizeof(struct
work_struct) &gt;= sizeof(struct rcu_head)).</li>
<li>Revert &quot;cgroup: Fix memory leak caused by missing
cgroup_bpf_offline&quot; (bsc#1234108).</li>
<li>Revert &quot;ixgbe: Manual AN-37 for troublesome link partners
for X550 SFI&quot; (git-fixes).</li>
<li>Revert &quot;mmc: dw_mmc: Fix IDMAC operation with pages bigger
than 4K&quot; (git-fixes).</li>
<li>Revert &quot;usb: gadget: composite: fix OS descriptors w_value
logic&quot; (git-fixes).</li>
<li>Update config files (bsc#1218644). </li>
<li>Update config files. Enabled IDPF for ARM64 (bsc#1221309)</li>
<li>acpi: CPPC: Fix _CPC register setting issue (git-fixes).</li>
<li>acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).</li>
<li>acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial
lid detection issue (stable-fixes).</li>
<li>acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[]
(stable-fixes).</li>
<li>ad7780: fix division by zero in ad7780_write_raw()
(git-fixes).</li>
<li>add bugreference to a hv_netvsc patch (bsc#1232413).</li>
<li>alsa: 6fire: Release resources at card release
(git-fixes).</li>
<li>alsa: ac97: bus: Fix the mistake in the comment
(git-fixes).</li>
<li>alsa: caiaq: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>alsa: firewire-lib: fix return value on fail in amdtp_tscm_init()
(git-fixes).</li>
<li>alsa: hda/realtek - Fixed Clevo platform headset Mic issue
(stable-fixes).</li>
<li>alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593
(stable-fixes).</li>
<li>alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3
(stable-fixes).</li>
<li>alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1
(stable-fixes).</li>
<li>alsa: hda/realtek: Limit internal Mic boost on Dell platform
(stable-fixes).</li>
<li>alsa: hda/realtek: Update ALC225 depop procedure
(git-fixes).</li>
<li>alsa: hda/realtek: Update ALC256 depop procedure
(git-fixes).</li>
<li>alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10
(stable-fixes).</li>
<li>alsa: us122l: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>alsa: usb-audio: Add quirk for HP 320 FHD Webcam
(stable-fixes).</li>
<li>alsa: usb-audio: Add quirks for Dell WD19 dock
(stable-fixes).</li>
<li>alsa: usx2y: Use snd_card_free_when_closed() at disconnection
(git-fixes).</li>
<li>amd-pstate: Set min_perf to nominal_perf for active mode performance
gov (git-fixes).</li>
<li>arm64/sve: Discard stale CPU state when handling SVE traps
(git-fixes)</li>
<li>arm64: Force position-independent veneers (git-fixes).</li>
<li>arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).</li>
<li>arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG
(git-fixes)</li>
<li>arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint
(git-fixes)</li>
<li>arm64: smccc: replace custom COUNT_ARGS() &amp; CONCATENATE()
(git-fixes)</li>
<li>arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled
(git-fixes)</li>
<li>arm64:uprobe fix the uprobe SWBP_INSN in big-endian
(git-fixes)</li>
<li>asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry
(git-fixes).</li>
<li>asoc: codecs: Fix atomicity violation in
snd_soc_component_get_drvdata() (git-fixes).</li>
<li>asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).</li>
<li>asoc: cs42l51: Fix some error handling paths in cs42l51_probe()
(git-fixes).</li>
<li>asoc: fsl_sai: Enable &#x27;FIFO continue on error&#x27;
FCONT bit (stable-fixes).</li>
<li>asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string
(stable-fixes).</li>
<li>asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove
(git-fixes).</li>
<li>blk-throttle: Fix io statistics for cgroup v1
(bsc#1233528).</li>
<li>block: Avoid leaking hctx-&gt;nr_active counter on batched
completion (bsc#1231923).</li>
<li>bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
(git-fixes).</li>
<li>bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs
(git-fixes).</li>
<li>bnxt_en: Fix the PCI-AER routines (git-fixes).</li>
<li>bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters()
(git-fixes).</li>
<li>bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is
down (git-fixes).</li>
<li>bnxt_en: Reset PTP tx_avail after possible firmware reset
(git-fixes).</li>
<li>bnxt_en: Restore PTP tx_avail count in case of skb_pad() error
(git-fixes).</li>
<li>bnxt_en: Wait for FLR to complete during probe
(git-fixes).</li>
<li>bnxt_en: refactor reset close code (git-fixes).</li>
<li>can: c_can: c_can_handle_bus_err(): update statistics if skb
allocation fails (git-fixes).</li>
<li>can: c_can: fix {rx,tx}_errors statistics (git-fixes).</li>
<li>can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors
statistics (git-fixes).</li>
<li>can: j1939: j1939_session_new(): fix skb reference counting
(git-fixes).</li>
<li>can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf
is NULL (git-fixes).</li>
<li>can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics
(git-fixes).</li>
<li>cgroup/bpf: only cgroup v2 can be attached by bpf programs
(bsc#1234108).</li>
<li>chtls: fix tp-&gt;rcv_tstamp initialization
(git-fixes).</li>
<li>comedi: Flush partial mappings in error case (git-fixes).</li>
<li>crypto: bcm - add error check in the ahash_hmac_init function
(git-fixes).</li>
<li>crypto: caam - Fix the pointer passed to caam_qi_shutdown()
(git-fixes).</li>
<li>crypto: caam - add error check to caam_rsa_set_priv_key_form
(git-fixes).</li>
<li>crypto: cavium - Fix an error handling path in cpt_ucode_load_fw()
(git-fixes).</li>
<li>crypto: cavium - Fix the if condition to exit loop after timeout
(git-fixes).</li>
<li>crypto: inside-secure - Fix the return value of
safexcel_xcbcmac_cra_init() (git-fixes).</li>
<li>crypto: x86/aegis128 - access 32-bit arguments as 32-bit
(git-fixes).</li>
<li>cxgb4: Properly lock TX queue for the selftest
(git-fixes).</li>
<li>cxgb4: add forgotten u64 ivlan cast before shift
(git-fixes).</li>
<li>cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function
(git-fixes).</li>
<li>drivers: net: prevent tun_build_skb() to exceed the packet size limit
(git-fixes).</li>
<li>drm/amd: Fix initialization mistake for NBIO 7.7.0
(stable-fixes).</li>
<li>drm/amdgpu: Adjust debugfs eviction and IB access permissions
(stable-fixes).</li>
<li>drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
(stable-fixes).</li>
<li>drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
(git-fixes).</li>
<li>drm/bridge: anx7625: Drop EDID cache on bridge power off
(git-fixes).</li>
<li>drm/bridge: tc358767: Fix link properties discovery
(git-fixes).</li>
<li>drm/bridge: tc358768: Fix DSI command tx (git-fixes).</li>
<li>drm/etnaviv: Request pages from DMA32 zone on addressing_limited
(git-fixes).</li>
<li>drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused
(git-fixes).</li>
<li>drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>drm/msm/dpu: cast crtc_clk calculation to u64 in
_dpu_core_perf_calc_clk() (git-fixes).</li>
<li>drm/omap: Fix locking in omap_gem_new_dmabuf()
(git-fixes).</li>
<li>drm/omap: Fix possible NULL dereference (git-fixes).</li>
<li>drm/panfrost: Remove unused id_mask from struct panfrost_model
(git-fixes).</li>
<li>drm/rockchip: vop: Fix a dereferenced before check warning
(git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers
(git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).</li>
<li>drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).</li>
<li>drm/v3d: Address race-condition in MMU flush (git-fixes).</li>
<li>drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape
with real VLA (stable-fixes).</li>
<li>drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).</li>
<li>drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer
(git-fixes).</li>
<li>drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function
(git-fixes).</li>
<li>drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).</li>
<li>e1000e: Fix S0ix residency on corporate systems
(git-fixes).</li>
<li>efi/memattr: Ignore table if the size is clearly bogus
(bsc#1231465).</li>
<li>eth: bnxt: fix counting packets discarded due to OOM and netpoll
(git-fixes).</li>
<li>firmware: google: Unregister driver_info on failure
(git-fixes).</li>
<li>genirq/msi: Fix off-by-one error in msi_domain_alloc()
(git-fixes).</li>
<li>goldfish: Fix unused const variable
&#x27;goldfish_pipe_acpi_match&#x27; (git-fixes).</li>
<li>gve: Fix XDP TX completion handling when counters overflow
(git-fixes).</li>
<li>gve: Fix an edge case for TSO skb validity check
(git-fixes).</li>
<li>gve: Fix skb truesize underestimation (git-fixes).</li>
<li>gve: ignore nonrelevant GSO type bits when processing TSO headers
(git-fixes).</li>
<li>hid: core: zero-initialize the report buffer (git-fixes).</li>
<li>hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard
(stable-fixes).</li>
<li>hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad
(stable-fixes).</li>
<li>hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa
touchpad (stable-fixes).</li>
<li>hid: multitouch: Add support for B2402FVA track point
(stable-fixes).</li>
<li>hid: wacom: Defer calculation of resolution until resolution_code is
known (git-fixes).</li>
<li>hid: wacom: Interpret tilt data from Intuos Pro BT as signed values
(git-fixes).</li>
<li>hid: wacom: fix when get product name maybe null pointer
(git-fixes).</li>
<li>hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling
pointer (git-fixes).</li>
<li>hwmon: (tps23861) Fix reporting of negative temperatures
(git-fixes).</li>
<li>i3c: master: Fix miss free init_dyn_addr at
i3c_master_put_i3c_addrs() (git-fixes).</li>
<li>i40e: Fix XDP program unloading while removing the driver
(git-fixes).</li>
<li>i40e: Fix filter input checks to prevent config with invalid values
(git-fixes).</li>
<li>i40e: Fix waiting for queues of all VSIs to be disabled
(git-fixes).</li>
<li>i40e: Report MFS in decimal base instead of hex
(git-fixes).</li>
<li>i40e: Restore VF MSI-X state during PCI reset (git-fixes).</li>
<li>i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).</li>
<li>i40e: disable NAPI right after disabling irqs when handling xsk_pool
(git-fixes).</li>
<li>i40e: fix use-after-free in i40e_aqc_add_filters()
(git-fixes).</li>
<li>i40e: take into account XDP Tx queues when stopping rings
(git-fixes).</li>
<li>iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call
(git-fixes).</li>
<li>iavf: Fix TC config comparison with existing adapter TC config
(git-fixes).</li>
<li>iavf: Fix promiscuous mode configuration flow messages
(git-fixes).</li>
<li>iavf: Introduce new state machines for flow director
(git-fixes).</li>
<li>iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set
(git-fixes).</li>
<li>iavf: fix FDIR rule fields masks validation (git-fixes).</li>
<li>iavf: in iavf_down, disable queues when removing the driver
(git-fixes).</li>
<li>iavf: initialize waitqueues before starting watchdog_task
(git-fixes).</li>
<li>iavf: send VLAN offloading caps once after VFR
(git-fixes).</li>
<li>iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero
(git-fixes).</li>
<li>ibmvnic: Do partial reset on login failure (bsc#1233150).</li>
<li>ibmvnic: Enforce stronger sanity checks on login response
(bsc#1233150).</li>
<li>ibmvnic: Ensure login failure recovery is safe from other resets
(bsc#1233150).</li>
<li>ibmvnic: Handle DMA unmapping of login buffs in release functions
(bsc#1233150).</li>
<li>ibmvnic: Unmap DMA login rsp buffer on send login fail
(bsc#1233150).</li>
<li>ice: Block switchdev mode when ADQ is active and vice versa
(git-fixes).</li>
<li>ice: Fix NULL pointer deref during VF reset (git-fixes).</li>
<li>ice: Fix VSI list rule with ICE_SW_LKUP_LAST type
(git-fixes).</li>
<li>ice: Fix link_down_on_close message (git-fixes).</li>
<li>ice: Fix netif_is_ice() in Safe Mode (git-fixes).</li>
<li>ice: Interpret .set_channels() input differently
(git-fixes).</li>
<li>ice: Shut down VSI with &quot;link-down-on-close&quot;
enabled (git-fixes).</li>
<li>ice: avoid executing commands on other ports when driving sync
(git-fixes).</li>
<li>ice: change q_index variable type to s16 to store -1 value
(git-fixes).</li>
<li>ice: fix ICE_LAST_OFFSET formula (git-fixes).</li>
<li>ice: fix VLAN replay after reset (git-fixes).</li>
<li>ice: fix accounting for filters shared by multiple VSIs
(git-fixes).</li>
<li>ice: fix accounting if a VLAN already exists (git-fixes).</li>
<li>ice: fix over-shifted variable (git-fixes).</li>
<li>ice: fix receive buffer size miscalculation (git-fixes).</li>
<li>ice: ice_aq_check_events: fix off-by-one check when filling buffer
(git-fixes).</li>
<li>ice: reset first in crash dump kernels (git-fixes).</li>
<li>ice: respect netif readiness in AF_XDP ZC related ndo&#x27;s
(git-fixes).</li>
<li>ice: tc: allow zero flags in parsing tc flower
(git-fixes).</li>
<li>ice: virtchnl: stop pretending to support RSS over AQ or registers
(git-fixes).</li>
<li>idpf: Interpret .set_channels() input differently
(git-fixes).</li>
<li>idpf: avoid compiler introduced padding in virtchnl2_rss_key struct
(git-fixes).</li>
<li>idpf: avoid compiler padding in virtchnl2_ptype struct
(git-fixes).</li>
<li>idpf: disable local BH when scheduling napi for marker packets
(git-fixes).</li>
<li>idpf: distinguish vports by the dev_port attribute
(git-fixes).</li>
<li>idpf: do not enable NAPI and interrupts prior to allocating Rx
buffers (git-fixes).</li>
<li>idpf: fix UAFs when destroying the queues (git-fixes).</li>
<li>idpf: fix corrupted frames and skb leaks in singleq mode
(git-fixes).</li>
<li>idpf: fix memleak in vport interrupt configuration
(git-fixes).</li>
<li>idpf: fix memory leaks and crashes while performing a soft reset
(git-fixes).</li>
<li>igb: Always call igb_xdp_ring_update_tail() under Tx lock
(git-fixes).</li>
<li>igb: Fix missing time sync events (git-fixes).</li>
<li>igb: Fix not clearing TimeSync interrupts for 82580
(git-fixes).</li>
<li>igb: extend PTP timestamp adjustments to i211 (git-fixes).</li>
<li>igc: Check VLAN EtherType mask (git-fixes).</li>
<li>igc: Check VLAN TCI mask (git-fixes).</li>
<li>igc: Fix hicredit calculation (git-fixes).</li>
<li>igc: Fix missing time sync events (git-fixes).</li>
<li>igc: Remove temporary workaround (git-fixes).</li>
<li>igc: Report VLAN EtherType matching back to user
(git-fixes).</li>
<li>igc: Unlock on error in igc_io_resume() (git-fixes).</li>
<li>iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()
(git-fixes).</li>
<li>iio: adc: ad7606: Fix typo in the driver name (git-fixes).</li>
<li>iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer
(git-fixes).</li>
<li>iio: light: al3010: Fix an error handling path in al3010_probe()
(git-fixes).</li>
<li>iio: light: veml6030: fix microlux value calculation
(git-fixes).</li>
<li>initramfs: avoid filename buffer overrun (bsc#1232436).</li>
<li>input: i8042 - add Ayaneo Kun to i8042 quirk table
(git-fixes).</li>
<li>input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table
(git-fixes).</li>
<li>input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk
table (git-fixes).</li>
<li>input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table
(git-fixes).</li>
<li>input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD
line (git-fixes).</li>
<li>irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack
(git-fixes).</li>
<li>irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1
(git-fixes).</li>
<li>ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa()
(git-fixes).</li>
<li>ixgbe: fix crash with empty VF macvlan list (git-fixes).</li>
<li>ixgbe: fix timestamp configuration code (git-fixes).</li>
<li>ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able
(git-fixes).</li>
<li>kABI: Restore exported __arm_smccc_sve_check (git-fixes)</li>
<li>kernel-binary: Enable livepatch package only when livepatch is
enabled Otherwise the filelist may be empty failing the build (bsc#1218644).</li>
<li>kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h
(git-fixes)</li>
<li>kexec: fix a memory leak in crash_shrink_memory()
(git-fixes).</li>
<li>kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).</li>
<li>mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING
(git-fixes).</li>
<li>media: adv7604: prevent underflow condition when reporting colorspace
(git-fixes).</li>
<li>media: cx24116: prevent overflows on SNR calculus
(git-fixes).</li>
<li>media: dvb-usb-v2: af9035: Fix null-ptr-deref in
af9035_i2c_master_xfer (stable-fixes).</li>
<li>media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).</li>
<li>media: dvb_frontend: do not play tricks with underflow values
(git-fixes).</li>
<li>media: dvbdev: prevent the risk of out of memory access
(git-fixes).</li>
<li>media: pci: cx23885: check cx23885_vdev_init() return
(stable-fixes).</li>
<li>media: pulse8-cec: fix data timestamp at pulse8_setup()
(git-fixes).</li>
<li>media: stb0899_algo: initialize cfr before using it
(git-fixes).</li>
<li>media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl()
(git-fixes).</li>
<li>media: v4l2-tpg: prevent the risk of a division by zero
(git-fixes).</li>
<li>mei: use kvmalloc for read buffer (git-fixes).</li>
<li>misc: apds990x: Fix missing pm_runtime_disable()
(git-fixes).</li>
<li>mm/hugetlb: fix nodes huge page allocation when there are surplus
pages (bsc#1234012).</li>
<li>mm/memory: add non-anonymous page check in the copy_present_page()
(bsc#1231646).</li>
<li>modpost: remove incorrect code in do_eisa_entry()
(git-fixes).</li>
<li>net/mlx5: Add missing masks and QoS bit masks for scheduling elements
(git-fixes).</li>
<li>net/mlx5: Added cond_resched() to crdump collection
(git-fixes).</li>
<li>net/mlx5: Allow 0 for total host VFs (git-fixes).</li>
<li>net/mlx5: Correctly compare pkt reformat ids (git-fixes).</li>
<li>net/mlx5: DR, Can&#x27;t go to uplink vport on RX rule
(git-fixes).</li>
<li>net/mlx5: DR, Use the right GVMI number for drop action
(git-fixes).</li>
<li>net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
(git-fixes).</li>
<li>net/mlx5: Drain health before unregistering devlink
(git-fixes).</li>
<li>net/mlx5: E-switch, register event handler before arming the event
(git-fixes).</li>
<li>net/mlx5: Explicitly set scheduling element and TSAR type
(git-fixes).</li>
<li>net/mlx5: Fix fw tracer first block check (git-fixes).</li>
<li>net/mlx5: Handle fw tracer change ownership event based on MTRC
(git-fixes).</li>
<li>net/mlx5: LAG, Check correct bucket when modifying LAG
(git-fixes).</li>
<li>net/mlx5: Lag, do bond only if slaves agree on roce state
(git-fixes).</li>
<li>net/mlx5: Lag, do not use the hardcoded value of the first port
(git-fixes).</li>
<li>net/mlx5: Lag, restore buckets number to default after hash LAG
deactivation (git-fixes).</li>
<li>net/mlx5: Skip clock update work when device is in error state
(git-fixes).</li>
<li>net/mlx5: Unregister notifier on eswitch init failure
(git-fixes).</li>
<li>net/mlx5: Update the list of the PCI supported devices
(git-fixes).</li>
<li>net/mlx5: Use RMW accessors for changing LNKCTL
(git-fixes).</li>
<li>net/mlx5: Use mlx5 device constant for selecting CQ period mode for
ASO (git-fixes).</li>
<li>net/mlx5: Use recovery timeout on sync reset flow
(git-fixes).</li>
<li>net/mlx5: fix potential memory leak in mlx5e_init_rep_rx
(git-fixes).</li>
<li>net/mlx5: fs, lock FTE when checking if active
(git-fixes).</li>
<li>net/mlx5e: Add a check for the return value from
mlx5_port_set_eth_ptys (git-fixes).</li>
<li>net/mlx5e: Add missing link modes to ptys2ethtool_map
(git-fixes).</li>
<li>net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup()
(git-fixes).</li>
<li>net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp
(git-fixes).</li>
<li>net/mlx5e: Allow software parsing when IPsec crypto is enabled
(git-fixes).</li>
<li>net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
(git-fixes).</li>
<li>net/mlx5e: Change the warning when ignore_flow_level is not supported
(git-fixes).</li>
<li>net/mlx5e: Check return value of snprintf writing to fw_version
buffer (git-fixes).</li>
<li>net/mlx5e: Check return value of snprintf writing to fw_version
buffer for representors (git-fixes).</li>
<li>net/mlx5e: Correct snprintf truncation handling for fw_version buffer
(git-fixes).</li>
<li>net/mlx5e: Correct snprintf truncation handling for fw_version buffer
used by representors (git-fixes).</li>
<li>net/mlx5e: Correctly report errors for ethtool rx flows
(git-fixes).</li>
<li>net/mlx5e: Do not offload internal port if filter device is out
device (git-fixes).</li>
<li>net/mlx5e: Fix IPsec tunnel mode offload feature check
(git-fixes).</li>
<li>net/mlx5e: Fix UDP GSO for encapsulated packets
(git-fixes).</li>
<li>net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is
set (git-fixes).</li>
<li>net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).</li>
<li>net/mlx5e: Fix pedit endianness (git-fixes).</li>
<li>net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work
(git-fixes).</li>
<li>net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list()
(git-fixes).</li>
<li>net/mlx5e: HTB, Fix inconsistencies with QoS SQs number
(git-fixes).</li>
<li>net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
(git-fixes).</li>
<li>net/mlx5e: Reduce the size of icosq_str (git-fixes).</li>
<li>net/mlx5e: Take state lock during tx timeout reporter
(git-fixes).</li>
<li>net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting
buffer exhaustion (git-fixes).</li>
<li>net/mlx5e: fix a potential double-free in fs_udp_create_groups
(git-fixes).</li>
<li>net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups
(git-fixes).</li>
<li>net/mlx5e: fix double free of encap_header (git-fixes).</li>
<li>net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer()
(git-fixes).</li>
<li>net/mlx5e: kTLS, Fix incorrect page refcounting
(git-fixes).</li>
<li>net: ena: Fix potential sign extension issue (git-fixes).</li>
<li>net: ena: Remove ena_select_queue (git-fixes).</li>
<li>net: ena: Wrong missing IO completions check order
(git-fixes).</li>
<li>net: qede: use return from qede_parse_flow_attr() for flow_spec
(git-fixes).</li>
<li>net: relax socket state check at accept time (git-fixes).</li>
<li>net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY
device (git-fixes).</li>
<li>net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).</li>
<li>net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition
(stable-fixes).</li>
<li>net: usb: usbnet: fix race in probe failure (git-fixes).</li>
<li>nfs: Fix KMSAN warning in decode_getfattr_attrs()
(git-fixes).</li>
<li>nvme-fabrics: fix kernel crash while shutting down controller
(git-fixes).</li>
<li>nvme-pci: fix freeing of the HMB descriptor table
(git-fixes).</li>
<li>nvme-pci: reverse request order in nvme_queue_rqs
(git-fixes).</li>
<li>ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).</li>
<li>pci: Add T_PVPERL macro (git-fixes).</li>
<li>pci: Fix reset_method_store() memory leak (git-fixes).</li>
<li>pci: endpoint: Clear secondary (not primary) EPC in
pci_epc_remove_epf() (git-fixes).</li>
<li>pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS
milliseconds (git-fixes).</li>
<li>pci: keystone: Add link up check to ks_pcie_other_map_bus()
(git-fixes).</li>
<li>pci: keystone: Set mode as Root Complex for
&quot;ti,keystone-pcie&quot; compatible (git-fixes).</li>
<li>pci: rockchip-ep: Fix address translation unit programming
(git-fixes).</li>
<li>phy: tegra: xusb: Add error pointer check in xusb.c
(git-fixes).</li>
<li>platform/chrome: cros_ec_typec: fix missing fwnode reference
decrement (git-fixes).</li>
<li>platform/surface: aggregator: Fix warning when controller is
destroyed in probe (git-fixes).</li>
<li>platform/x86: dell-sysman: add support for alienware products
(stable-fixes).</li>
<li>platform/x86: dell-wmi: Ignore suspend notifications
(stable-fixes).</li>
<li>posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone
(bsc#1234098).</li>
<li>power: supply: bq27xxx: Fix registers of bq27426
(git-fixes).</li>
<li>power: supply: core: Remove might_sleep() from power_supply_put()
(git-fixes).</li>
<li>powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal
(bsc#1194869).</li>
<li>powerpc/atomic: Use YZ constraints for DS-form instructions
(bsc#1194869).</li>
<li>powerpc/kexec: Fix return of uninitialized variable
(bsc#1194869).</li>
<li>powerpc/mm/fault: Fix kfence page fault reporting
(bsc#1194869).</li>
<li>powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).</li>
<li>powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).</li>
<li>powerpc/powernv: Free name on error in opal_event_init()
(bsc#1194869).</li>
<li>powerpc/pseries: Fix KVM guest detection for disabling hardlockup
detector (bsc#1194869).</li>
<li>powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore
(bsc#1194869).</li>
<li>powerpc: remove GCC version check for UPD_CONSTR
(bsc#1194869).</li>
<li>qed: avoid truncating work queue length (git-fixes).</li>
<li>rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey
(git-fixes)</li>
<li>rdma/hns: Add clear_hem return value to log (git-fixes)</li>
<li>rdma/hns: Add mutex_destroy() (git-fixes)</li>
<li>rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()
(git-fixes)</li>
<li>rdma/hns: Fix an AEQE overflow error caused by untimely update of
eq_db_ci (git-fixes)</li>
<li>rdma/hns: Fix cpu stuck caused by printings during reset
(git-fixes)</li>
<li>rdma/hns: Fix different dgids mapping to the same dip_idx
(git-fixes)</li>
<li>rdma/hns: Fix flush cqe error when racing with destroy qp
(git-fixes)</li>
<li>rdma/hns: Fix out-of-order issue of requester when setting FENCE
(git-fixes)</li>
<li>rdma/hns: Remove unnecessary QP type checks (git-fixes)</li>
<li>rdma/hns: Use dev_<em> printings in hem code instead of
ibdev_</em> (git-fixes)</li>
<li>rdma/hns: Use macro instead of magic number (git-fixes)</li>
<li>rdma/mlx5: Move events notifier registration to be after device
registration (git-fixes)</li>
<li>rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled
(git-fixes).</li>
<li>rdma/rxe: Fix the qp flush warnings in req (git-fixes)</li>
<li>rdma/rxe: Set queue pair cur_qp_state when being queried
(git-fixes)</li>
<li>rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer
needed by the new klp-convert implementation. (bsc#1218644)</li>
<li>rtc: ab-eoz9: do not fail temperature reads on undervoltage
notification (git-fixes).</li>
<li>rtc: abx80x: Fix WDT bit position of the status register
(git-fixes).</li>
<li>rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
(git-fixes).</li>
<li>rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>scsi: lpfc: Add cleanup of nvmels_wq after HBA reset
(bsc#1233241).</li>
<li>scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241).</li>
<li>scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241).</li>
<li>scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting
follow up FDMI (bsc#1233241).</li>
<li>scsi: lpfc: Check devloss callbk done flag for potential stale NDLP
ptrs (bsc#1233241).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.6 patches
(bsc#1233241).</li>
<li>scsi: lpfc: Modify CGN warning signal calculation based on EDC
response (bsc#1233241).</li>
<li>scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo
callback (bsc#1233241).</li>
<li>scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).</li>
<li>scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE
before BSG flag (bsc#1233241).</li>
<li>scsi: scsi_transport_fc: Allow setting rport state to current state
(git-fixes).</li>
<li>scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer
(git-fixes).</li>
<li>security/keys: fix slab-out-of-bounds in key_task_permission
(git-fixes).</li>
<li>serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).</li>
<li>sfc: Check firmware supports Ethernet PTP filter
(git-fixes).</li>
<li>sfc: do not unregister flow_indr if it was never registered
(git-fixes).</li>
<li>sfc: fix a double-free bug in efx_probe_filters
(git-fixes).</li>
<li>signal: Replace BUG_ON()s (bsc#1234093).</li>
<li>spi: Fix acpi deferred irq probe (git-fixes).</li>
<li>spi: atmel-quadspi: Fix register name in verbose logging function
(git-fixes).</li>
<li>staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).</li>
<li>thermal: core: Initialize thermal zones before registering them
(git-fixes).</li>
<li>thermal: intel: int340x: processor: Fix warning during module unload
(git-fixes).</li>
<li>tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555
git-fixes).</li>
<li>tun: Fix xdp_rxq_info&#x27;s queue_index when detaching
(git-fixes).</li>
<li>tun: prevent negative ifindex (git-fixes).</li>
<li>ucounts: fix counter leak in inc_rlimit_get_ucounts()
(bsc#1233460).</li>
<li>usb: chaoskey: Fix possible deadlock chaoskey_list_lock
(git-fixes).</li>
<li>usb: chaoskey: fail open after removal (git-fixes).</li>
<li>usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO
resizing logic (git-fixes).</li>
<li>usb: dwc3: gadget: Fix checking for number of TRBs left
(git-fixes).</li>
<li>usb: dwc3: gadget: Fix looping of queued SG entries
(git-fixes).</li>
<li>usb: ehci-spear: fix call balance of sehci clk handling routines
(git-fixes).</li>
<li>usb: musb: sunxi: Fix accessing an released usb phy
(git-fixes).</li>
<li>usb: phy: Fix API devm_usb_put_phy() can not release the phy
(git-fixes).</li>
<li>usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info()
(git-fixes).</li>
<li>usb: serial: io_edgeport: fix use after free in debug printk
(git-fixes).</li>
<li>usb: serial: option: add Fibocom FG132 0x0112 composition
(stable-fixes).</li>
<li>usb: serial: option: add Quectel RG650V (stable-fixes).</li>
<li>usb: serial: qcserial: add support for Sierra Wireless EM86xx
(stable-fixes).</li>
<li>usb: typec: fix potential out of bounds in
ucsi_ccg_update_set_new_cam_cmd() (git-fixes).</li>
<li>usb: typec: fix unreleased fwnode_handle in
typec_port_register_altmodes() (git-fixes).</li>
<li>usb: using mutex lock and supporting O_NONBLOCK flag in
iowarrior_read() (git-fixes).</li>
<li>usb: xhci: Fix TD invalidation under pending Set TR Dequeue
(git-fixes).</li>
<li>usb: yurex: make waiting on yurex_write interruptible
(git-fixes).</li>
<li>usbip: tools: Fix detach_port() invalid port error path
(git-fixes).</li>
<li>vdpa/mlx5: preserve CVQ vringh index (git-fixes).</li>
<li>watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).</li>
<li>watchdog: rti: of: honor timeout-sec property (git-fixes).</li>
<li>wifi: ath10k: Fix memory leak in management tx
(git-fixes).</li>
<li>wifi: ath10k: fix invalid VHT parameters in
supported_vht_mcs_rate_nss1 (git-fixes).</li>
<li>wifi: ath10k: fix invalid VHT parameters in
supported_vht_mcs_rate_nss2 (git-fixes).</li>
<li>wifi: ath11k: Fix invalid ring usage in full monitor mode
(git-fixes).</li>
<li>wifi: ath9k: add range check for conn_rsp_epid in
htc_connect_service() (git-fixes).</li>
<li>wifi: brcm80211: BRCM_TRACING should depend on TRACING
(git-fixes).</li>
<li>wifi: iwlegacy: Clear stale interrupts before resuming device
(stable-fixes).</li>
<li>wifi: iwlwifi: mvm: Fix response handling in
iwl_mvm_send_recovery_cmd() (git-fixes).</li>
<li>wifi: iwlwifi: mvm: disconnect station vifs if recovery failed
(stable-fixes).</li>
<li>wifi: mac80211: do not pass a stopped vif to the driver in
.get_txpower (git-fixes).</li>
<li>wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys
(git-fixes).</li>
<li>wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).</li>
<li>wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq()
(git-fixes).</li>
<li>x86/kvm: fix is_stale_page_fault() (bsc#1221333).</li>
<li>xhci: Fix Link TRB DMA in command ring stopped completion event
(git-fixes).</li>
<li>xhci: Separate PORT and CAPs macros into dedicated file
(stable-fixes).</li>
<li>xhci: Use pm_runtime_get to prevent RPM on unsupported systems
(git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch SUSE-2024-4376=1
openSUSE-SLE-15.5-2024-4376=1</code>



</li>

<li class="list-group-item">
Public Cloud Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4376=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.5 (aarch64 x86_64)
<ul>


<li>kernel-azure-extra-debuginfo-5.14.21-150500.33.75.1</li>


<li>kernel-azure-debugsource-5.14.21-150500.33.75.1</li>


<li>kernel-azure-optional-debuginfo-5.14.21-150500.33.75.1</li>


<li>kernel-azure-devel-5.14.21-150500.33.75.1</li>


<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.75.1</li>


<li>kselftests-kmp-azure-debuginfo-5.14.21-150500.33.75.1</li>


<li>cluster-md-kmp-azure-5.14.21-150500.33.75.1</li>


<li>kernel-syms-azure-5.14.21-150500.33.75.1</li>


<li>ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.75.1</li>


<li>kernel-azure-extra-5.14.21-150500.33.75.1</li>


<li>kernel-azure-debuginfo-5.14.21-150500.33.75.1</li>


<li>gfs2-kmp-azure-5.14.21-150500.33.75.1</li>


<li>reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.75.1</li>


<li>dlm-kmp-azure-debuginfo-5.14.21-150500.33.75.1</li>


<li>kernel-azure-optional-5.14.21-150500.33.75.1</li>


<li>kselftests-kmp-azure-5.14.21-150500.33.75.1</li>


<li>reiserfs-kmp-azure-5.14.21-150500.33.75.1</li>


<li>cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.75.1</li>


<li>dlm-kmp-azure-5.14.21-150500.33.75.1</li>


<li>ocfs2-kmp-azure-5.14.21-150500.33.75.1</li>


<li>gfs2-kmp-azure-debuginfo-5.14.21-150500.33.75.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (aarch64 nosrc x86_64)
<ul>


<li>kernel-azure-5.14.21-150500.33.75.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (x86_64)
<ul>


<li>kernel-azure-vdso-5.14.21-150500.33.75.1</li>


<li>kernel-azure-vdso-debuginfo-5.14.21-150500.33.75.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (noarch)
<ul>


<li>kernel-devel-azure-5.14.21-150500.33.75.1</li>


<li>kernel-source-azure-5.14.21-150500.33.75.1</li>

</ul>
</li>



<li>
Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
<ul>


<li>kernel-azure-5.14.21-150500.33.75.1</li>

</ul>
</li>

<li>
Public Cloud Module 15-SP5 (aarch64 x86_64)
<ul>


<li>kernel-azure-debugsource-5.14.21-150500.33.75.1</li>


<li>kernel-syms-azure-5.14.21-150500.33.75.1</li>


<li>kernel-azure-devel-5.14.21-150500.33.75.1</li>


<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.75.1</li>


<li>kernel-azure-debuginfo-5.14.21-150500.33.75.1</li>

</ul>
</li>

<li>
Public Cloud Module 15-SP5 (noarch)
<ul>


<li>kernel-devel-azure-5.14.21-150500.33.75.1</li>


<li>kernel-source-azure-5.14.21-150500.33.75.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47594.html">https://www.suse.com/security/cve/CVE-2021-47594.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48674.html">https://www.suse.com/security/cve/CVE-2022-48674.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48979.html">https://www.suse.com/security/cve/CVE-2022-48979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48982.html">https://www.suse.com/security/cve/CVE-2022-48982.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48983.html">https://www.suse.com/security/cve/CVE-2022-48983.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48989.html">https://www.suse.com/security/cve/CVE-2022-48989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48990.html">https://www.suse.com/security/cve/CVE-2022-48990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52915.html">https://www.suse.com/security/cve/CVE-2023-52915.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52917.html">https://www.suse.com/security/cve/CVE-2023-52917.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52918.html">https://www.suse.com/security/cve/CVE-2023-52918.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52921.html">https://www.suse.com/security/cve/CVE-2023-52921.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52922.html">https://www.suse.com/security/cve/CVE-2023-52922.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26782.html">https://www.suse.com/security/cve/CVE-2024-26782.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26906.html">https://www.suse.com/security/cve/CVE-2024-26906.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26953.html">https://www.suse.com/security/cve/CVE-2024-26953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35888.html">https://www.suse.com/security/cve/CVE-2024-35888.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35937.html">https://www.suse.com/security/cve/CVE-2024-35937.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35980.html">https://www.suse.com/security/cve/CVE-2024-35980.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36484.html">https://www.suse.com/security/cve/CVE-2024-36484.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36883.html">https://www.suse.com/security/cve/CVE-2024-36883.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36886.html">https://www.suse.com/security/cve/CVE-2024-36886.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36905.html">https://www.suse.com/security/cve/CVE-2024-36905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36953.html">https://www.suse.com/security/cve/CVE-2024-36953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36954.html">https://www.suse.com/security/cve/CVE-2024-36954.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38577.html">https://www.suse.com/security/cve/CVE-2024-38577.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38589.html">https://www.suse.com/security/cve/CVE-2024-38589.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38615.html">https://www.suse.com/security/cve/CVE-2024-38615.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40997.html">https://www.suse.com/security/cve/CVE-2024-40997.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41016.html">https://www.suse.com/security/cve/CVE-2024-41016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41023.html">https://www.suse.com/security/cve/CVE-2024-41023.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41049.html">https://www.suse.com/security/cve/CVE-2024-41049.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42131.html">https://www.suse.com/security/cve/CVE-2024-42131.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43817.html">https://www.suse.com/security/cve/CVE-2024-43817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43897.html">https://www.suse.com/security/cve/CVE-2024-43897.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44932.html">https://www.suse.com/security/cve/CVE-2024-44932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44964.html">https://www.suse.com/security/cve/CVE-2024-44964.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44995.html">https://www.suse.com/security/cve/CVE-2024-44995.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46681.html">https://www.suse.com/security/cve/CVE-2024-46681.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46800.html">https://www.suse.com/security/cve/CVE-2024-46800.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46802.html">https://www.suse.com/security/cve/CVE-2024-46802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46804.html">https://www.suse.com/security/cve/CVE-2024-46804.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46805.html">https://www.suse.com/security/cve/CVE-2024-46805.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46807.html">https://www.suse.com/security/cve/CVE-2024-46807.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46810.html">https://www.suse.com/security/cve/CVE-2024-46810.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46812.html">https://www.suse.com/security/cve/CVE-2024-46812.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46819.html">https://www.suse.com/security/cve/CVE-2024-46819.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46821.html">https://www.suse.com/security/cve/CVE-2024-46821.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46835.html">https://www.suse.com/security/cve/CVE-2024-46835.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46842.html">https://www.suse.com/security/cve/CVE-2024-46842.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46853.html">https://www.suse.com/security/cve/CVE-2024-46853.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46859.html">https://www.suse.com/security/cve/CVE-2024-46859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46864.html">https://www.suse.com/security/cve/CVE-2024-46864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46871.html">https://www.suse.com/security/cve/CVE-2024-46871.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47663.html">https://www.suse.com/security/cve/CVE-2024-47663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47665.html">https://www.suse.com/security/cve/CVE-2024-47665.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47667.html">https://www.suse.com/security/cve/CVE-2024-47667.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47669.html">https://www.suse.com/security/cve/CVE-2024-47669.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47670.html">https://www.suse.com/security/cve/CVE-2024-47670.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47671.html">https://www.suse.com/security/cve/CVE-2024-47671.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47679.html">https://www.suse.com/security/cve/CVE-2024-47679.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47682.html">https://www.suse.com/security/cve/CVE-2024-47682.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47693.html">https://www.suse.com/security/cve/CVE-2024-47693.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47695.html">https://www.suse.com/security/cve/CVE-2024-47695.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47696.html">https://www.suse.com/security/cve/CVE-2024-47696.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47697.html">https://www.suse.com/security/cve/CVE-2024-47697.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47698.html">https://www.suse.com/security/cve/CVE-2024-47698.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47699.html">https://www.suse.com/security/cve/CVE-2024-47699.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">https://www.suse.com/security/cve/CVE-2024-47701.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47709.html">https://www.suse.com/security/cve/CVE-2024-47709.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47712.html">https://www.suse.com/security/cve/CVE-2024-47712.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47713.html">https://www.suse.com/security/cve/CVE-2024-47713.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47718.html">https://www.suse.com/security/cve/CVE-2024-47718.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47723.html">https://www.suse.com/security/cve/CVE-2024-47723.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47728.html">https://www.suse.com/security/cve/CVE-2024-47728.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47735.html">https://www.suse.com/security/cve/CVE-2024-47735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47737.html">https://www.suse.com/security/cve/CVE-2024-47737.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47742.html">https://www.suse.com/security/cve/CVE-2024-47742.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47745.html">https://www.suse.com/security/cve/CVE-2024-47745.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47749.html">https://www.suse.com/security/cve/CVE-2024-47749.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47756.html">https://www.suse.com/security/cve/CVE-2024-47756.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47757.html">https://www.suse.com/security/cve/CVE-2024-47757.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49850.html">https://www.suse.com/security/cve/CVE-2024-49850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49851.html">https://www.suse.com/security/cve/CVE-2024-49851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49852.html">https://www.suse.com/security/cve/CVE-2024-49852.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49855.html">https://www.suse.com/security/cve/CVE-2024-49855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49861.html">https://www.suse.com/security/cve/CVE-2024-49861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49863.html">https://www.suse.com/security/cve/CVE-2024-49863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49868.html">https://www.suse.com/security/cve/CVE-2024-49868.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49870.html">https://www.suse.com/security/cve/CVE-2024-49870.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49871.html">https://www.suse.com/security/cve/CVE-2024-49871.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49875.html">https://www.suse.com/security/cve/CVE-2024-49875.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49877.html">https://www.suse.com/security/cve/CVE-2024-49877.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49879.html">https://www.suse.com/security/cve/CVE-2024-49879.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">https://www.suse.com/security/cve/CVE-2024-49884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49891.html">https://www.suse.com/security/cve/CVE-2024-49891.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49900.html">https://www.suse.com/security/cve/CVE-2024-49900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49902.html">https://www.suse.com/security/cve/CVE-2024-49902.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49903.html">https://www.suse.com/security/cve/CVE-2024-49903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49905.html">https://www.suse.com/security/cve/CVE-2024-49905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49907.html">https://www.suse.com/security/cve/CVE-2024-49907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49908.html">https://www.suse.com/security/cve/CVE-2024-49908.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49921.html">https://www.suse.com/security/cve/CVE-2024-49921.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49924.html">https://www.suse.com/security/cve/CVE-2024-49924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49925.html">https://www.suse.com/security/cve/CVE-2024-49925.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49934.html">https://www.suse.com/security/cve/CVE-2024-49934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49935.html">https://www.suse.com/security/cve/CVE-2024-49935.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49938.html">https://www.suse.com/security/cve/CVE-2024-49938.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49945.html">https://www.suse.com/security/cve/CVE-2024-49945.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49947.html">https://www.suse.com/security/cve/CVE-2024-49947.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49950.html">https://www.suse.com/security/cve/CVE-2024-49950.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49957.html">https://www.suse.com/security/cve/CVE-2024-49957.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49963.html">https://www.suse.com/security/cve/CVE-2024-49963.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49965.html">https://www.suse.com/security/cve/CVE-2024-49965.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49966.html">https://www.suse.com/security/cve/CVE-2024-49966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49968.html">https://www.suse.com/security/cve/CVE-2024-49968.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49981.html">https://www.suse.com/security/cve/CVE-2024-49981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49983.html">https://www.suse.com/security/cve/CVE-2024-49983.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49985.html">https://www.suse.com/security/cve/CVE-2024-49985.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49989.html">https://www.suse.com/security/cve/CVE-2024-49989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50003.html">https://www.suse.com/security/cve/CVE-2024-50003.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50007.html">https://www.suse.com/security/cve/CVE-2024-50007.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50008.html">https://www.suse.com/security/cve/CVE-2024-50008.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50009.html">https://www.suse.com/security/cve/CVE-2024-50009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50013.html">https://www.suse.com/security/cve/CVE-2024-50013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50017.html">https://www.suse.com/security/cve/CVE-2024-50017.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50025.html">https://www.suse.com/security/cve/CVE-2024-50025.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50026.html">https://www.suse.com/security/cve/CVE-2024-50026.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50031.html">https://www.suse.com/security/cve/CVE-2024-50031.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50044.html">https://www.suse.com/security/cve/CVE-2024-50044.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50062.html">https://www.suse.com/security/cve/CVE-2024-50062.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50067.html">https://www.suse.com/security/cve/CVE-2024-50067.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50073.html">https://www.suse.com/security/cve/CVE-2024-50073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50074.html">https://www.suse.com/security/cve/CVE-2024-50074.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50077.html">https://www.suse.com/security/cve/CVE-2024-50077.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50078.html">https://www.suse.com/security/cve/CVE-2024-50078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50082.html">https://www.suse.com/security/cve/CVE-2024-50082.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50089.html">https://www.suse.com/security/cve/CVE-2024-50089.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50093.html">https://www.suse.com/security/cve/CVE-2024-50093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50095.html">https://www.suse.com/security/cve/CVE-2024-50095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50096.html">https://www.suse.com/security/cve/CVE-2024-50096.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50098.html">https://www.suse.com/security/cve/CVE-2024-50098.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50099.html">https://www.suse.com/security/cve/CVE-2024-50099.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50103.html">https://www.suse.com/security/cve/CVE-2024-50103.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50108.html">https://www.suse.com/security/cve/CVE-2024-50108.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50110.html">https://www.suse.com/security/cve/CVE-2024-50110.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">https://www.suse.com/security/cve/CVE-2024-50115.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50116.html">https://www.suse.com/security/cve/CVE-2024-50116.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50117.html">https://www.suse.com/security/cve/CVE-2024-50117.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50124.html">https://www.suse.com/security/cve/CVE-2024-50124.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50125.html">https://www.suse.com/security/cve/CVE-2024-50125.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50127.html">https://www.suse.com/security/cve/CVE-2024-50127.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50128.html">https://www.suse.com/security/cve/CVE-2024-50128.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50131.html">https://www.suse.com/security/cve/CVE-2024-50131.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50134.html">https://www.suse.com/security/cve/CVE-2024-50134.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50135.html">https://www.suse.com/security/cve/CVE-2024-50135.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50138.html">https://www.suse.com/security/cve/CVE-2024-50138.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50141.html">https://www.suse.com/security/cve/CVE-2024-50141.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50146.html">https://www.suse.com/security/cve/CVE-2024-50146.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50147.html">https://www.suse.com/security/cve/CVE-2024-50147.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50148.html">https://www.suse.com/security/cve/CVE-2024-50148.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50150.html">https://www.suse.com/security/cve/CVE-2024-50150.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50153.html">https://www.suse.com/security/cve/CVE-2024-50153.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50154.html">https://www.suse.com/security/cve/CVE-2024-50154.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50155.html">https://www.suse.com/security/cve/CVE-2024-50155.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50156.html">https://www.suse.com/security/cve/CVE-2024-50156.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50160.html">https://www.suse.com/security/cve/CVE-2024-50160.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50167.html">https://www.suse.com/security/cve/CVE-2024-50167.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50171.html">https://www.suse.com/security/cve/CVE-2024-50171.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50179.html">https://www.suse.com/security/cve/CVE-2024-50179.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50180.html">https://www.suse.com/security/cve/CVE-2024-50180.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50182.html">https://www.suse.com/security/cve/CVE-2024-50182.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50183.html">https://www.suse.com/security/cve/CVE-2024-50183.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50184.html">https://www.suse.com/security/cve/CVE-2024-50184.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50186.html">https://www.suse.com/security/cve/CVE-2024-50186.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50187.html">https://www.suse.com/security/cve/CVE-2024-50187.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50188.html">https://www.suse.com/security/cve/CVE-2024-50188.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50189.html">https://www.suse.com/security/cve/CVE-2024-50189.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50192.html">https://www.suse.com/security/cve/CVE-2024-50192.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50194.html">https://www.suse.com/security/cve/CVE-2024-50194.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50195.html">https://www.suse.com/security/cve/CVE-2024-50195.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50196.html">https://www.suse.com/security/cve/CVE-2024-50196.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50198.html">https://www.suse.com/security/cve/CVE-2024-50198.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50201.html">https://www.suse.com/security/cve/CVE-2024-50201.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50205.html">https://www.suse.com/security/cve/CVE-2024-50205.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50208.html">https://www.suse.com/security/cve/CVE-2024-50208.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50209.html">https://www.suse.com/security/cve/CVE-2024-50209.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50215.html">https://www.suse.com/security/cve/CVE-2024-50215.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50218.html">https://www.suse.com/security/cve/CVE-2024-50218.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50229.html">https://www.suse.com/security/cve/CVE-2024-50229.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50230.html">https://www.suse.com/security/cve/CVE-2024-50230.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50232.html">https://www.suse.com/security/cve/CVE-2024-50232.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50233.html">https://www.suse.com/security/cve/CVE-2024-50233.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50234.html">https://www.suse.com/security/cve/CVE-2024-50234.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50236.html">https://www.suse.com/security/cve/CVE-2024-50236.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50237.html">https://www.suse.com/security/cve/CVE-2024-50237.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50249.html">https://www.suse.com/security/cve/CVE-2024-50249.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50255.html">https://www.suse.com/security/cve/CVE-2024-50255.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50259.html">https://www.suse.com/security/cve/CVE-2024-50259.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50261.html">https://www.suse.com/security/cve/CVE-2024-50261.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50264.html">https://www.suse.com/security/cve/CVE-2024-50264.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50265.html">https://www.suse.com/security/cve/CVE-2024-50265.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50267.html">https://www.suse.com/security/cve/CVE-2024-50267.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50268.html">https://www.suse.com/security/cve/CVE-2024-50268.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50269.html">https://www.suse.com/security/cve/CVE-2024-50269.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50271.html">https://www.suse.com/security/cve/CVE-2024-50271.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50273.html">https://www.suse.com/security/cve/CVE-2024-50273.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50274.html">https://www.suse.com/security/cve/CVE-2024-50274.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50279.html">https://www.suse.com/security/cve/CVE-2024-50279.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50282.html">https://www.suse.com/security/cve/CVE-2024-50282.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50287.html">https://www.suse.com/security/cve/CVE-2024-50287.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50289.html">https://www.suse.com/security/cve/CVE-2024-50289.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">https://www.suse.com/security/cve/CVE-2024-50290.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50292.html">https://www.suse.com/security/cve/CVE-2024-50292.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50295.html">https://www.suse.com/security/cve/CVE-2024-50295.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50298.html">https://www.suse.com/security/cve/CVE-2024-50298.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50301.html">https://www.suse.com/security/cve/CVE-2024-50301.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50302.html">https://www.suse.com/security/cve/CVE-2024-50302.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53052.html">https://www.suse.com/security/cve/CVE-2024-53052.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53058.html">https://www.suse.com/security/cve/CVE-2024-53058.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53059.html">https://www.suse.com/security/cve/CVE-2024-53059.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53060.html">https://www.suse.com/security/cve/CVE-2024-53060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53061.html">https://www.suse.com/security/cve/CVE-2024-53061.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">https://www.suse.com/security/cve/CVE-2024-53063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53066.html">https://www.suse.com/security/cve/CVE-2024-53066.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53068.html">https://www.suse.com/security/cve/CVE-2024-53068.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53079.html">https://www.suse.com/security/cve/CVE-2024-53079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53085.html">https://www.suse.com/security/cve/CVE-2024-53085.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53088.html">https://www.suse.com/security/cve/CVE-2024-53088.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53104.html">https://www.suse.com/security/cve/CVE-2024-53104.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53110.html">https://www.suse.com/security/cve/CVE-2024-53110.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1082555">https://bugzilla.suse.com/show_bug.cgi?id=1082555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218644">https://bugzilla.suse.com/show_bug.cgi?id=1218644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220382">https://bugzilla.suse.com/show_bug.cgi?id=1220382</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221309">https://bugzilla.suse.com/show_bug.cgi?id=1221309</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221333">https://bugzilla.suse.com/show_bug.cgi?id=1221333</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222364">https://bugzilla.suse.com/show_bug.cgi?id=1222364</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222590">https://bugzilla.suse.com/show_bug.cgi?id=1222590</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">https://bugzilla.suse.com/show_bug.cgi?id=1223202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223656">https://bugzilla.suse.com/show_bug.cgi?id=1223656</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223848">https://bugzilla.suse.com/show_bug.cgi?id=1223848</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223919">https://bugzilla.suse.com/show_bug.cgi?id=1223919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223942">https://bugzilla.suse.com/show_bug.cgi?id=1223942</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224518">https://bugzilla.suse.com/show_bug.cgi?id=1224518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224526">https://bugzilla.suse.com/show_bug.cgi?id=1224526</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224574">https://bugzilla.suse.com/show_bug.cgi?id=1224574</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225725">https://bugzilla.suse.com/show_bug.cgi?id=1225725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225730">https://bugzilla.suse.com/show_bug.cgi?id=1225730</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225764">https://bugzilla.suse.com/show_bug.cgi?id=1225764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225812">https://bugzilla.suse.com/show_bug.cgi?id=1225812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226560">https://bugzilla.suse.com/show_bug.cgi?id=1226560</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226592">https://bugzilla.suse.com/show_bug.cgi?id=1226592</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226631">https://bugzilla.suse.com/show_bug.cgi?id=1226631</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226748">https://bugzilla.suse.com/show_bug.cgi?id=1226748</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226872">https://bugzilla.suse.com/show_bug.cgi?id=1226872</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227853">https://bugzilla.suse.com/show_bug.cgi?id=1227853</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228410">https://bugzilla.suse.com/show_bug.cgi?id=1228410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228430">https://bugzilla.suse.com/show_bug.cgi?id=1228430</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228486">https://bugzilla.suse.com/show_bug.cgi?id=1228486</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228650">https://bugzilla.suse.com/show_bug.cgi?id=1228650</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228857">https://bugzilla.suse.com/show_bug.cgi?id=1228857</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229312">https://bugzilla.suse.com/show_bug.cgi?id=1229312</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229429">https://bugzilla.suse.com/show_bug.cgi?id=1229429</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229585">https://bugzilla.suse.com/show_bug.cgi?id=1229585</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229752">https://bugzilla.suse.com/show_bug.cgi?id=1229752</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229808">https://bugzilla.suse.com/show_bug.cgi?id=1229808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230055">https://bugzilla.suse.com/show_bug.cgi?id=1230055</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230220">https://bugzilla.suse.com/show_bug.cgi?id=1230220</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230231">https://bugzilla.suse.com/show_bug.cgi?id=1230231</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230270">https://bugzilla.suse.com/show_bug.cgi?id=1230270</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230558">https://bugzilla.suse.com/show_bug.cgi?id=1230558</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230827">https://bugzilla.suse.com/show_bug.cgi?id=1230827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230918">https://bugzilla.suse.com/show_bug.cgi?id=1230918</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231083">https://bugzilla.suse.com/show_bug.cgi?id=1231083</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231089">https://bugzilla.suse.com/show_bug.cgi?id=1231089</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231098">https://bugzilla.suse.com/show_bug.cgi?id=1231098</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231101">https://bugzilla.suse.com/show_bug.cgi?id=1231101</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231108">https://bugzilla.suse.com/show_bug.cgi?id=1231108</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231111">https://bugzilla.suse.com/show_bug.cgi?id=1231111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231132">https://bugzilla.suse.com/show_bug.cgi?id=1231132</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231135">https://bugzilla.suse.com/show_bug.cgi?id=1231135</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231138">https://bugzilla.suse.com/show_bug.cgi?id=1231138</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231169">https://bugzilla.suse.com/show_bug.cgi?id=1231169</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231178">https://bugzilla.suse.com/show_bug.cgi?id=1231178</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231180">https://bugzilla.suse.com/show_bug.cgi?id=1231180</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231181">https://bugzilla.suse.com/show_bug.cgi?id=1231181</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231187">https://bugzilla.suse.com/show_bug.cgi?id=1231187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231202">https://bugzilla.suse.com/show_bug.cgi?id=1231202</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231434">https://bugzilla.suse.com/show_bug.cgi?id=1231434</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231441">https://bugzilla.suse.com/show_bug.cgi?id=1231441</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231452">https://bugzilla.suse.com/show_bug.cgi?id=1231452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231465">https://bugzilla.suse.com/show_bug.cgi?id=1231465</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231474">https://bugzilla.suse.com/show_bug.cgi?id=1231474</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231481">https://bugzilla.suse.com/show_bug.cgi?id=1231481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231537">https://bugzilla.suse.com/show_bug.cgi?id=1231537</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231541">https://bugzilla.suse.com/show_bug.cgi?id=1231541</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231646">https://bugzilla.suse.com/show_bug.cgi?id=1231646</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231849">https://bugzilla.suse.com/show_bug.cgi?id=1231849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231856">https://bugzilla.suse.com/show_bug.cgi?id=1231856</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231858">https://bugzilla.suse.com/show_bug.cgi?id=1231858</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231859">https://bugzilla.suse.com/show_bug.cgi?id=1231859</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231864">https://bugzilla.suse.com/show_bug.cgi?id=1231864</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231904">https://bugzilla.suse.com/show_bug.cgi?id=1231904</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231916">https://bugzilla.suse.com/show_bug.cgi?id=1231916</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">https://bugzilla.suse.com/show_bug.cgi?id=1231920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231923">https://bugzilla.suse.com/show_bug.cgi?id=1231923</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231930">https://bugzilla.suse.com/show_bug.cgi?id=1231930</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231931">https://bugzilla.suse.com/show_bug.cgi?id=1231931</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231947">https://bugzilla.suse.com/show_bug.cgi?id=1231947</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231952">https://bugzilla.suse.com/show_bug.cgi?id=1231952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231953">https://bugzilla.suse.com/show_bug.cgi?id=1231953</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231959">https://bugzilla.suse.com/show_bug.cgi?id=1231959</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231978">https://bugzilla.suse.com/show_bug.cgi?id=1231978</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232013">https://bugzilla.suse.com/show_bug.cgi?id=1232013</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232015">https://bugzilla.suse.com/show_bug.cgi?id=1232015</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232016">https://bugzilla.suse.com/show_bug.cgi?id=1232016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232017">https://bugzilla.suse.com/show_bug.cgi?id=1232017</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232027">https://bugzilla.suse.com/show_bug.cgi?id=1232027</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232028">https://bugzilla.suse.com/show_bug.cgi?id=1232028</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232047">https://bugzilla.suse.com/show_bug.cgi?id=1232047</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232048">https://bugzilla.suse.com/show_bug.cgi?id=1232048</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232050">https://bugzilla.suse.com/show_bug.cgi?id=1232050</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232056">https://bugzilla.suse.com/show_bug.cgi?id=1232056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232076">https://bugzilla.suse.com/show_bug.cgi?id=1232076</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232080">https://bugzilla.suse.com/show_bug.cgi?id=1232080</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232094">https://bugzilla.suse.com/show_bug.cgi?id=1232094</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232096">https://bugzilla.suse.com/show_bug.cgi?id=1232096</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232098">https://bugzilla.suse.com/show_bug.cgi?id=1232098</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232111">https://bugzilla.suse.com/show_bug.cgi?id=1232111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232126">https://bugzilla.suse.com/show_bug.cgi?id=1232126</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232134">https://bugzilla.suse.com/show_bug.cgi?id=1232134</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232135">https://bugzilla.suse.com/show_bug.cgi?id=1232135</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232141">https://bugzilla.suse.com/show_bug.cgi?id=1232141</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232142">https://bugzilla.suse.com/show_bug.cgi?id=1232142</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232147">https://bugzilla.suse.com/show_bug.cgi?id=1232147</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232152">https://bugzilla.suse.com/show_bug.cgi?id=1232152</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">https://bugzilla.suse.com/show_bug.cgi?id=1232159</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232162">https://bugzilla.suse.com/show_bug.cgi?id=1232162</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232165">https://bugzilla.suse.com/show_bug.cgi?id=1232165</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232180">https://bugzilla.suse.com/show_bug.cgi?id=1232180</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232185">https://bugzilla.suse.com/show_bug.cgi?id=1232185</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232187">https://bugzilla.suse.com/show_bug.cgi?id=1232187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232189">https://bugzilla.suse.com/show_bug.cgi?id=1232189</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232195">https://bugzilla.suse.com/show_bug.cgi?id=1232195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">https://bugzilla.suse.com/show_bug.cgi?id=1232198</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">https://bugzilla.suse.com/show_bug.cgi?id=1232201</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232218">https://bugzilla.suse.com/show_bug.cgi?id=1232218</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232224">https://bugzilla.suse.com/show_bug.cgi?id=1232224</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232232">https://bugzilla.suse.com/show_bug.cgi?id=1232232</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232254">https://bugzilla.suse.com/show_bug.cgi?id=1232254</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232255">https://bugzilla.suse.com/show_bug.cgi?id=1232255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232264">https://bugzilla.suse.com/show_bug.cgi?id=1232264</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232272">https://bugzilla.suse.com/show_bug.cgi?id=1232272</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232279">https://bugzilla.suse.com/show_bug.cgi?id=1232279</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232287">https://bugzilla.suse.com/show_bug.cgi?id=1232287</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232293">https://bugzilla.suse.com/show_bug.cgi?id=1232293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232312">https://bugzilla.suse.com/show_bug.cgi?id=1232312</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232317">https://bugzilla.suse.com/show_bug.cgi?id=1232317</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232318">https://bugzilla.suse.com/show_bug.cgi?id=1232318</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232333">https://bugzilla.suse.com/show_bug.cgi?id=1232333</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232334">https://bugzilla.suse.com/show_bug.cgi?id=1232334</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232335">https://bugzilla.suse.com/show_bug.cgi?id=1232335</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232339">https://bugzilla.suse.com/show_bug.cgi?id=1232339</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232349">https://bugzilla.suse.com/show_bug.cgi?id=1232349</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232357">https://bugzilla.suse.com/show_bug.cgi?id=1232357</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232359">https://bugzilla.suse.com/show_bug.cgi?id=1232359</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232362">https://bugzilla.suse.com/show_bug.cgi?id=1232362</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232364">https://bugzilla.suse.com/show_bug.cgi?id=1232364</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232370">https://bugzilla.suse.com/show_bug.cgi?id=1232370</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232371">https://bugzilla.suse.com/show_bug.cgi?id=1232371</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232378">https://bugzilla.suse.com/show_bug.cgi?id=1232378</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232385">https://bugzilla.suse.com/show_bug.cgi?id=1232385</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232387">https://bugzilla.suse.com/show_bug.cgi?id=1232387</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232394">https://bugzilla.suse.com/show_bug.cgi?id=1232394</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232413">https://bugzilla.suse.com/show_bug.cgi?id=1232413</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232416">https://bugzilla.suse.com/show_bug.cgi?id=1232416</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232436">https://bugzilla.suse.com/show_bug.cgi?id=1232436</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232483">https://bugzilla.suse.com/show_bug.cgi?id=1232483</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232500">https://bugzilla.suse.com/show_bug.cgi?id=1232500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232503">https://bugzilla.suse.com/show_bug.cgi?id=1232503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232504">https://bugzilla.suse.com/show_bug.cgi?id=1232504</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232507">https://bugzilla.suse.com/show_bug.cgi?id=1232507</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">https://bugzilla.suse.com/show_bug.cgi?id=1232520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232552">https://bugzilla.suse.com/show_bug.cgi?id=1232552</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232757">https://bugzilla.suse.com/show_bug.cgi?id=1232757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232819">https://bugzilla.suse.com/show_bug.cgi?id=1232819</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232860">https://bugzilla.suse.com/show_bug.cgi?id=1232860</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232870">https://bugzilla.suse.com/show_bug.cgi?id=1232870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232873">https://bugzilla.suse.com/show_bug.cgi?id=1232873</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232877">https://bugzilla.suse.com/show_bug.cgi?id=1232877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232878">https://bugzilla.suse.com/show_bug.cgi?id=1232878</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232881">https://bugzilla.suse.com/show_bug.cgi?id=1232881</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232884">https://bugzilla.suse.com/show_bug.cgi?id=1232884</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232885">https://bugzilla.suse.com/show_bug.cgi?id=1232885</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232887">https://bugzilla.suse.com/show_bug.cgi?id=1232887</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232888">https://bugzilla.suse.com/show_bug.cgi?id=1232888</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232890">https://bugzilla.suse.com/show_bug.cgi?id=1232890</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232892">https://bugzilla.suse.com/show_bug.cgi?id=1232892</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232896">https://bugzilla.suse.com/show_bug.cgi?id=1232896</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232897">https://bugzilla.suse.com/show_bug.cgi?id=1232897</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232905">https://bugzilla.suse.com/show_bug.cgi?id=1232905</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232907">https://bugzilla.suse.com/show_bug.cgi?id=1232907</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">https://bugzilla.suse.com/show_bug.cgi?id=1232919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232926">https://bugzilla.suse.com/show_bug.cgi?id=1232926</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232928">https://bugzilla.suse.com/show_bug.cgi?id=1232928</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232935">https://bugzilla.suse.com/show_bug.cgi?id=1232935</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233035">https://bugzilla.suse.com/show_bug.cgi?id=1233035</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233049">https://bugzilla.suse.com/show_bug.cgi?id=1233049</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233051">https://bugzilla.suse.com/show_bug.cgi?id=1233051</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233056">https://bugzilla.suse.com/show_bug.cgi?id=1233056</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233057">https://bugzilla.suse.com/show_bug.cgi?id=1233057</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233061">https://bugzilla.suse.com/show_bug.cgi?id=1233061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233063">https://bugzilla.suse.com/show_bug.cgi?id=1233063</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233065">https://bugzilla.suse.com/show_bug.cgi?id=1233065</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233067">https://bugzilla.suse.com/show_bug.cgi?id=1233067</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233070">https://bugzilla.suse.com/show_bug.cgi?id=1233070</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233073">https://bugzilla.suse.com/show_bug.cgi?id=1233073</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233074">https://bugzilla.suse.com/show_bug.cgi?id=1233074</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233100">https://bugzilla.suse.com/show_bug.cgi?id=1233100</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233103">https://bugzilla.suse.com/show_bug.cgi?id=1233103</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233104">https://bugzilla.suse.com/show_bug.cgi?id=1233104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233105">https://bugzilla.suse.com/show_bug.cgi?id=1233105</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233106">https://bugzilla.suse.com/show_bug.cgi?id=1233106</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233107">https://bugzilla.suse.com/show_bug.cgi?id=1233107</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233108">https://bugzilla.suse.com/show_bug.cgi?id=1233108</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233110">https://bugzilla.suse.com/show_bug.cgi?id=1233110</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233111">https://bugzilla.suse.com/show_bug.cgi?id=1233111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233113">https://bugzilla.suse.com/show_bug.cgi?id=1233113</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233114">https://bugzilla.suse.com/show_bug.cgi?id=1233114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233117">https://bugzilla.suse.com/show_bug.cgi?id=1233117</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233123">https://bugzilla.suse.com/show_bug.cgi?id=1233123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233125">https://bugzilla.suse.com/show_bug.cgi?id=1233125</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233129">https://bugzilla.suse.com/show_bug.cgi?id=1233129</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233130">https://bugzilla.suse.com/show_bug.cgi?id=1233130</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233134">https://bugzilla.suse.com/show_bug.cgi?id=1233134</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233135">https://bugzilla.suse.com/show_bug.cgi?id=1233135</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233150">https://bugzilla.suse.com/show_bug.cgi?id=1233150</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233189">https://bugzilla.suse.com/show_bug.cgi?id=1233189</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233191">https://bugzilla.suse.com/show_bug.cgi?id=1233191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233197">https://bugzilla.suse.com/show_bug.cgi?id=1233197</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233205">https://bugzilla.suse.com/show_bug.cgi?id=1233205</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233206">https://bugzilla.suse.com/show_bug.cgi?id=1233206</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233209">https://bugzilla.suse.com/show_bug.cgi?id=1233209</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233210">https://bugzilla.suse.com/show_bug.cgi?id=1233210</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233211">https://bugzilla.suse.com/show_bug.cgi?id=1233211</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233212">https://bugzilla.suse.com/show_bug.cgi?id=1233212</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233214">https://bugzilla.suse.com/show_bug.cgi?id=1233214</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233216">https://bugzilla.suse.com/show_bug.cgi?id=1233216</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233238">https://bugzilla.suse.com/show_bug.cgi?id=1233238</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233241">https://bugzilla.suse.com/show_bug.cgi?id=1233241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233253">https://bugzilla.suse.com/show_bug.cgi?id=1233253</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233255">https://bugzilla.suse.com/show_bug.cgi?id=1233255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233293">https://bugzilla.suse.com/show_bug.cgi?id=1233293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233350">https://bugzilla.suse.com/show_bug.cgi?id=1233350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233452">https://bugzilla.suse.com/show_bug.cgi?id=1233452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233453">https://bugzilla.suse.com/show_bug.cgi?id=1233453</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233454">https://bugzilla.suse.com/show_bug.cgi?id=1233454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233456">https://bugzilla.suse.com/show_bug.cgi?id=1233456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233457">https://bugzilla.suse.com/show_bug.cgi?id=1233457</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233458">https://bugzilla.suse.com/show_bug.cgi?id=1233458</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233460">https://bugzilla.suse.com/show_bug.cgi?id=1233460</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233462">https://bugzilla.suse.com/show_bug.cgi?id=1233462</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233463">https://bugzilla.suse.com/show_bug.cgi?id=1233463</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233468">https://bugzilla.suse.com/show_bug.cgi?id=1233468</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233471">https://bugzilla.suse.com/show_bug.cgi?id=1233471</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233476">https://bugzilla.suse.com/show_bug.cgi?id=1233476</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233478">https://bugzilla.suse.com/show_bug.cgi?id=1233478</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">https://bugzilla.suse.com/show_bug.cgi?id=1233479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233481">https://bugzilla.suse.com/show_bug.cgi?id=1233481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233484">https://bugzilla.suse.com/show_bug.cgi?id=1233484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233487">https://bugzilla.suse.com/show_bug.cgi?id=1233487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233490">https://bugzilla.suse.com/show_bug.cgi?id=1233490</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233491">https://bugzilla.suse.com/show_bug.cgi?id=1233491</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233528">https://bugzilla.suse.com/show_bug.cgi?id=1233528</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233548">https://bugzilla.suse.com/show_bug.cgi?id=1233548</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233552">https://bugzilla.suse.com/show_bug.cgi?id=1233552</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233553">https://bugzilla.suse.com/show_bug.cgi?id=1233553</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233554">https://bugzilla.suse.com/show_bug.cgi?id=1233554</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233555">https://bugzilla.suse.com/show_bug.cgi?id=1233555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">https://bugzilla.suse.com/show_bug.cgi?id=1233557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233560">https://bugzilla.suse.com/show_bug.cgi?id=1233560</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233561">https://bugzilla.suse.com/show_bug.cgi?id=1233561</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233570">https://bugzilla.suse.com/show_bug.cgi?id=1233570</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233577">https://bugzilla.suse.com/show_bug.cgi?id=1233577</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233580">https://bugzilla.suse.com/show_bug.cgi?id=1233580</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233977">https://bugzilla.suse.com/show_bug.cgi?id=1233977</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234012">https://bugzilla.suse.com/show_bug.cgi?id=1234012</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234025">https://bugzilla.suse.com/show_bug.cgi?id=1234025</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234085">https://bugzilla.suse.com/show_bug.cgi?id=1234085</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234093">https://bugzilla.suse.com/show_bug.cgi?id=1234093</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234098">https://bugzilla.suse.com/show_bug.cgi?id=1234098</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234108">https://bugzilla.suse.com/show_bug.cgi?id=1234108</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-1166">https://jira.suse.com/browse/PED-1166</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-1168">https://jira.suse.com/browse/PED-1168</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-1170">https://jira.suse.com/browse/PED-1170</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-1218">https://jira.suse.com/browse/PED-1218</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-1220">https://jira.suse.com/browse/PED-1220</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-1222">https://jira.suse.com/browse/PED-1222</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-1223">https://jira.suse.com/browse/PED-1223</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-1225">https://jira.suse.com/browse/PED-1225</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-2849">https://jira.suse.com/browse/PED-2849</a>
</li>



<li>
<a href="https://jira.suse.com/browse/SES-1880">https://jira.suse.com/browse/SES-1880</a>
</li>


</ul>

</div>

--===============7373679911819052108==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung