Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2025:0557-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE Linux Enterprise Real Time 15 SP6, SUSE openSUSE Leap 15.6, SUSE Linux Enterprise Live Patching 15-SP6, SUSE Real Time Module 15-SP6
Datum: Fr, 14. Februar 2025, 23:11
Referenzen: https://www.cve.org/CVERecord?id=CVE-2024-56687
https://www.cve.org/CVERecord?id=CVE-2024-56739
https://www.cve.org/CVERecord?id=CVE-2024-56715
https://www.cve.org/CVERecord?id=CVE-2024-56760
https://www.cve.org/CVERecord?id=CVE-2024-56615
https://www.cve.org/CVERecord?id=CVE-2024-50051
https://www.cve.org/CVERecord?id=CVE-2024-57896
https://www.cve.org/CVERecord?id=CVE-2024-56592
https://www.cve.org/CVERecord?id=CVE-2024-53170
https://www.cve.org/CVERecord?id=CVE-2024-57899
https://www.cve.org/CVERecord?id=CVE-2024-50258
https://www.cve.org/CVERecord?id=CVE-2024-56690
https://www.cve.org/CVERecord?id=CVE-2024-56748
https://www.cve.org/CVERecord?id=CVE-2024-56741
https://www.cve.org/CVERecord?id=CVE-2024-56716
https://www.cve.org/CVERecord?id=CVE-2024-57904
https://www.cve.org/CVERecord?id=CVE-2024-49998
https://www.cve.org/CVERecord?id=CVE-2024-56712
https://www.cve.org/CVERecord?id=CVE-2024-56729
https://www.cve.org/CVERecord?id=CVE-2024-56670
https://www.cve.org/CVERecord?id=CVE-2024-56728
https://www.cve.org/CVERecord?id=CVE-2024-57850
https://www.cve.org/CVERecord?id=CVE-2024-56778
https://www.cve.org/CVERecord?id=CVE-2024-56709
https://www.cve.org/CVERecord?id=CVE-2024-56573
https://www.cve.org/CVERecord?id=CVE-2024-57933
https://www.cve.org/CVERecord?id=CVE-2025-21670
https://www.cve.org/CVERecord?id=CVE-2024-56776
https://www.cve.org/CVERecord?id=CVE-2024-56664
https://www.cve.org/CVERecord?id=CVE-2024-39282
https://www.cve.org/CVERecord?id=CVE-2024-49951
https://www.cve.org/CVERecord?id=CVE-2024-53203
https://www.cve.org/CVERecord?id=CVE-2024-49978
https://www.cve.org/CVERecord?id=CVE-2023-52923
https://www.cve.org/CVERecord?id=CVE-2024-57809
https://www.cve.org/CVERecord?id=CVE-2025-21650
https://www.cve.org/CVERecord?id=CVE-2024-56722
https://www.cve.org/CVERecord?id=CVE-2024-57804
https://www.cve.org/CVERecord?id=CVE-2024-56745
https://www.cve.org/CVERecord?id=CVE-2024-56654
https://www.cve.org/CVERecord?id=CVE-2024-53230
https://www.cve.org/CVERecord?id=CVE-2025-21675
https://www.cve.org/CVERecord?id=CVE-2024-50106
https://www.cve.org/CVERecord?id=CVE-2024-56650
https://www.cve.org/CVERecord?id=CVE-2024-56575
https://www.cve.org/CVERecord?id=CVE-2024-57838
https://www.cve.org/CVERecord?id=CVE-2024-56572
https://www.cve.org/CVERecord?id=CVE-2024-56538
https://www.cve.org/CVERecord?id=CVE-2024-50199
https://www.cve.org/CVERecord?id=CVE-2024-56620
https://www.cve.org/CVERecord?id=CVE-2025-21669
https://www.cve.org/CVERecord?id=CVE-2024-57849
https://www.cve.org/CVERecord?id=CVE-2024-56648
https://www.cve.org/CVERecord?id=CVE-2024-56617
https://www.cve.org/CVERecord?id=CVE-2024-53175
https://www.cve.org/CVERecord?id=CVE-2024-56594
https://www.cve.org/CVERecord?id=CVE-2024-5660
https://www.cve.org/CVERecord?id=CVE-2024-53196
https://www.cve.org/CVERecord?id=CVE-2024-57801
https://www.cve.org/CVERecord?id=CVE-2024-53232
https://www.cve.org/CVERecord?id=CVE-2024-57936
https://www.cve.org/CVERecord?id=CVE-2024-48873
https://www.cve.org/CVERecord?id=CVE-2024-53233
https://www.cve.org/CVERecord?id=CVE-2024-56704
https://www.cve.org/CVERecord?id=CVE-2024-56662
https://www.cve.org/CVERecord?id=CVE-2024-56724
https://www.cve.org/CVERecord?id=CVE-2024-47143
https://www.cve.org/CVERecord?id=CVE-2025-21678
https://www.cve.org/CVERecord?id=CVE-2024-56584
https://www.cve.org/CVERecord?id=CVE-2024-57940
https://www.cve.org/CVERecord?id=CVE-2024-53195
https://www.cve.org/CVERecord?id=CVE-2024-56598
https://www.cve.org/CVERecord?id=CVE-2025-21682
https://www.cve.org/CVERecord?id=CVE-2024-56578
https://www.cve.org/CVERecord?id=CVE-2024-56636
https://www.cve.org/CVERecord?id=CVE-2024-56588
https://www.cve.org/CVERecord?id=CVE-2024-55639
https://www.cve.org/CVERecord?id=CVE-2024-56546
https://www.cve.org/CVERecord?id=CVE-2025-21655
https://www.cve.org/CVERecord?id=CVE-2024-53236
https://www.cve.org/CVERecord?id=CVE-2024-56634
https://www.cve.org/CVERecord?id=CVE-2024-53164
https://www.cve.org/CVERecord?id=CVE-2024-56631
https://www.cve.org/CVERecord?id=CVE-2024-53239
https://www.cve.org/CVERecord?id=CVE-2024-53194
https://www.cve.org/CVERecord?id=CVE-2024-56597
https://www.cve.org/CVERecord?id=CVE-2024-56587
https://www.cve.org/CVERecord?id=CVE-2024-55916
https://www.cve.org/CVERecord?id=CVE-2025-21652
https://www.cve.org/CVERecord?id=CVE-2024-56596
https://www.cve.org/CVERecord?id=CVE-2024-53187
https://www.cve.org/CVERecord?id=CVE-2024-56557
https://www.cve.org/CVERecord?id=CVE-2024-57876
https://www.cve.org/CVERecord?id=CVE-2024-57912
https://www.cve.org/CVERecord?id=CVE-2024-56701
https://www.cve.org/CVERecord?id=CVE-2024-47141
https://www.cve.org/CVERecord?id=CVE-2024-56603
https://www.cve.org/CVERecord?id=CVE-2024-50304
https://www.cve.org/CVERecord?id=CVE-2024-57884
https://www.cve.org/CVERecord?id=CVE-2024-46896
https://www.cve.org/CVERecord?id=CVE-2024-52332
https://www.cve.org/CVERecord?id=CVE-2024-53197
https://www.cve.org/CVERecord?id=CVE-2024-56607
https://www.cve.org/CVERecord?id=CVE-2024-56600
https://www.cve.org/CVERecord?id=CVE-2024-56774
https://www.cve.org/CVERecord?id=CVE-2024-56726
https://www.cve.org/CVERecord?id=CVE-2024-57915
https://www.cve.org/CVERecord?id=CVE-2024-56707
https://www.cve.org/CVERecord?id=CVE-2024-53685
https://www.cve.org/CVERecord?id=CVE-2024-53095
https://www.cve.org/CVERecord?id=CVE-2024-57795
https://www.cve.org/CVERecord?id=CVE-2024-46858
https://www.cve.org/CVERecord?id=CVE-2024-57917
https://www.cve.org/CVERecord?id=CVE-2024-53091
https://www.cve.org/CVERecord?id=CVE-2024-45828
https://www.cve.org/CVERecord?id=CVE-2024-49569
https://www.cve.org/CVERecord?id=CVE-2024-56589
https://www.cve.org/CVERecord?id=CVE-2024-57793
https://www.cve.org/CVERecord?id=CVE-2024-56681
https://www.cve.org/CVERecord?id=CVE-2024-56577
https://www.cve.org/CVERecord?id=CVE-2025-21632
https://www.cve.org/CVERecord?id=CVE-2024-56643
https://www.cve.org/CVERecord?id=CVE-2024-57857
https://www.cve.org/CVERecord?id=CVE-2024-53227
https://www.cve.org/CVERecord?id=CVE-2024-57946
https://www.cve.org/CVERecord?id=CVE-2024-56569
https://www.cve.org/CVERecord?id=CVE-2025-21676
https://www.cve.org/CVERecord?id=CVE-2024-56531
https://www.cve.org/CVERecord?id=CVE-2024-57932
https://www.cve.org/CVERecord?id=CVE-2024-56775
https://www.cve.org/CVERecord?id=CVE-2025-21664
https://www.cve.org/CVERecord?id=CVE-2024-56663
https://www.cve.org/CVERecord?id=CVE-2024-56574
https://www.cve.org/CVERecord?id=CVE-2024-56651
https://www.cve.org/CVERecord?id=CVE-2025-21663
https://www.cve.org/CVERecord?id=CVE-2024-53231
https://www.cve.org/CVERecord?id=CVE-2025-21674
https://www.cve.org/CVERecord?id=CVE-2024-56642
https://www.cve.org/CVERecord?id=CVE-2024-56570
https://www.cve.org/CVERecord?id=CVE-2024-56532
https://www.cve.org/CVERecord?id=CVE-2024-56558
https://www.cve.org/CVERecord?id=CVE-2025-21645
https://www.cve.org/CVERecord?id=CVE-2024-53185
https://www.cve.org/CVERecord?id=CVE-2024-56595
https://www.cve.org/CVERecord?id=CVE-2024-56614
https://www.cve.org/CVERecord?id=CVE-2024-56369
https://www.cve.org/CVERecord?id=CVE-2024-56372
https://www.cve.org/CVERecord?id=CVE-2024-56568
https://www.cve.org/CVERecord?id=CVE-2024-56747
https://www.cve.org/CVERecord?id=CVE-2024-57893
https://www.cve.org/CVERecord?id=CVE-2025-21656
https://www.cve.org/CVERecord?id=CVE-2024-56593
https://www.cve.org/CVERecord?id=CVE-2024-53172
https://www.cve.org/CVERecord?id=CVE-2024-56619
https://www.cve.org/CVERecord?id=CVE-2024-57897
https://www.cve.org/CVERecord?id=CVE-2025-21662
https://www.cve.org/CVERecord?id=CVE-2024-56683
https://www.cve.org/CVERecord?id=CVE-2025-21646
https://www.cve.org/CVERecord?id=CVE-2024-56641
https://www.cve.org/CVERecord?id=CVE-2024-56637
https://www.cve.org/CVERecord?id=CVE-2024-56533
https://www.cve.org/CVERecord?id=CVE-2024-57903
https://www.cve.org/CVERecord?id=CVE-2024-56608
https://www.cve.org/CVERecord?id=CVE-2024-56571
https://www.cve.org/CVERecord?id=CVE-2024-56616
https://www.cve.org/CVERecord?id=CVE-2024-56609
https://www.cve.org/CVERecord?id=CVE-2024-57888
https://www.cve.org/CVERecord?id=CVE-2024-57887
https://www.cve.org/CVERecord?id=CVE-2024-57929
https://www.cve.org/CVERecord?id=CVE-2024-50299
https://www.cve.org/CVERecord?id=CVE-2024-56688
https://www.cve.org/CVERecord?id=CVE-2025-21666
https://www.cve.org/CVERecord?id=CVE-2024-57931
https://www.cve.org/CVERecord?id=CVE-2024-56759
https://www.cve.org/CVERecord?id=CVE-2024-56644
https://www.cve.org/CVERecord?id=CVE-2024-50251
https://www.cve.org/CVERecord?id=CVE-2024-56746
https://www.cve.org/CVERecord?id=CVE-2024-56649
https://www.cve.org/CVERecord?id=CVE-2024-56723
https://www.cve.org/CVERecord?id=CVE-2025-21649
https://www.cve.org/CVERecord?id=CVE-2024-56610
https://www.cve.org/CVERecord?id=CVE-2024-57890
https://www.cve.org/CVERecord?id=CVE-2024-43913
https://www.cve.org/CVERecord?id=CVE-2024-57922
https://www.cve.org/CVERecord?id=CVE-2024-57926
https://www.cve.org/CVERecord?id=CVE-2024-57892
https://www.cve.org/CVERecord?id=CVE-2024-36476
https://www.cve.org/CVERecord?id=CVE-2024-56665
https://www.cve.org/CVERecord?id=CVE-2024-56777
https://www.cve.org/CVERecord?id=CVE-2024-50151
https://www.cve.org/CVERecord?id=CVE-2024-56611
https://www.cve.org/CVERecord?id=CVE-2024-57906
https://www.cve.org/CVERecord?id=CVE-2024-56606
https://www.cve.org/CVERecord?id=CVE-2024-57791
https://www.cve.org/CVERecord?id=CVE-2025-21651
https://www.cve.org/CVERecord?id=CVE-2024-57907
https://www.cve.org/CVERecord?id=CVE-2024-56678
https://www.cve.org/CVERecord?id=CVE-2024-56632
https://www.cve.org/CVERecord?id=CVE-2024-56693
https://www.cve.org/CVERecord?id=CVE-2024-57882
https://www.cve.org/CVERecord?id=CVE-2024-56691
https://www.cve.org/CVERecord?id=CVE-2024-56630
https://www.cve.org/CVERecord?id=CVE-2024-53168
https://www.cve.org/CVERecord?id=CVE-2024-54680
https://www.cve.org/CVERecord?id=CVE-2024-56543
https://www.cve.org/CVERecord?id=CVE-2024-56763
https://www.cve.org/CVERecord?id=CVE-2024-56765
https://www.cve.org/CVERecord?id=CVE-2024-56677
https://www.cve.org/CVERecord?id=CVE-2024-56787
https://www.cve.org/CVERecord?id=CVE-2024-57908
https://www.cve.org/CVERecord?id=CVE-2024-49948
https://www.cve.org/CVERecord?id=CVE-2024-56767
https://www.cve.org/CVERecord?id=CVE-2024-56705
https://www.cve.org/CVERecord?id=CVE-2024-57916
https://www.cve.org/CVERecord?id=CVE-2024-56725
https://www.cve.org/CVERecord?id=CVE-2024-56694
https://www.cve.org/CVERecord?id=CVE-2024-56698
https://www.cve.org/CVERecord?id=CVE-2024-47809
https://www.cve.org/CVERecord?id=CVE-2024-57935
https://www.cve.org/CVERecord?id=CVE-2024-48881
https://www.cve.org/CVERecord?id=CVE-2024-56661
https://www.cve.org/CVERecord?id=CVE-2024-56708
https://www.cve.org/CVERecord?id=CVE-2024-56779
https://www.cve.org/CVERecord?id=CVE-2024-56727
https://www.cve.org/CVERecord?id=CVE-2024-56672
https://www.cve.org/CVERecord?id=CVE-2024-57910
https://www.cve.org/CVERecord?id=CVE-2024-56675
https://www.cve.org/CVERecord?id=CVE-2024-56780
https://www.cve.org/CVERecord?id=CVE-2024-56766
https://www.cve.org/CVERecord?id=CVE-2024-57938
https://www.cve.org/CVERecord?id=CVE-2024-57798
https://www.cve.org/CVERecord?id=CVE-2024-56629
https://www.cve.org/CVERecord?id=CVE-2024-53690
https://www.cve.org/CVERecord?id=CVE-2024-56658
https://www.cve.org/CVERecord?id=CVE-2024-56656
https://www.cve.org/CVERecord?id=CVE-2024-56625
https://www.cve.org/CVERecord?id=CVE-2024-56679
https://www.cve.org/CVERecord?id=CVE-2024-57802
https://www.cve.org/CVERecord?id=CVE-2024-57792
https://www.cve.org/CVERecord?id=CVE-2024-56590
https://www.cve.org/CVERecord?id=CVE-2024-57913
https://www.cve.org/CVERecord?id=CVE-2024-56548
https://www.cve.org/CVERecord?id=CVE-2024-55881
https://www.cve.org/CVERecord?id=CVE-2024-57911
https://www.cve.org/CVERecord?id=CVE-2024-56660
https://www.cve.org/CVERecord?id=CVE-2024-56700
https://www.cve.org/CVERecord?id=CVE-2024-56659
https://www.cve.org/CVERecord?id=CVE-2025-21653
https://www.cve.org/CVERecord?id=CVE-2024-56622
https://www.cve.org/CVERecord?id=CVE-2024-56602
https://www.cve.org/CVERecord?id=CVE-2024-56623
https://www.cve.org/CVERecord?id=CVE-2024-56769
https://www.cve.org/CVERecord?id=CVE-2024-56601
https://www.cve.org/CVERecord?id=CVE-2024-57874
https://www.cve.org/CVERecord?id=CVE-2024-53198
https://www.cve.org/CVERecord?id=CVE-2024-56635
Applikationen: Linux

Originalnachricht

--===============4099292061028594122==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0557-1
Release Date: 2025-02-14T15:26:54Z
Rating: important
References:

* bsc#1012628
* bsc#1194869
* bsc#1215199
* bsc#1216813
* bsc#1218470
* bsc#1220711
* bsc#1222803
* bsc#1224049
* bsc#1225897
* bsc#1226980
* bsc#1228592
* bsc#1229833
* bsc#1231016
* bsc#1231088
* bsc#1232087
* bsc#1232101
* bsc#1232158
* bsc#1232161
* bsc#1232421
* bsc#1232882
* bsc#1233055
* bsc#1233112
* bsc#1233221
* bsc#1233248
* bsc#1233259
* bsc#1233260
* bsc#1233488
* bsc#1233522
* bsc#1233638
* bsc#1233642
* bsc#1233778
* bsc#1234195
* bsc#1234619
* bsc#1234635
* bsc#1234683
* bsc#1234693
* bsc#1234726
* bsc#1234825
* bsc#1234863
* bsc#1234887
* bsc#1234888
* bsc#1234893
* bsc#1234898
* bsc#1234901
* bsc#1234906
* bsc#1234923
* bsc#1234931
* bsc#1234934
* bsc#1234947
* bsc#1234957
* bsc#1235000
* bsc#1235001
* bsc#1235011
* bsc#1235031
* bsc#1235032
* bsc#1235035
* bsc#1235037
* bsc#1235038
* bsc#1235039
* bsc#1235040
* bsc#1235042
* bsc#1235043
* bsc#1235046
* bsc#1235050
* bsc#1235051
* bsc#1235053
* bsc#1235054
* bsc#1235057
* bsc#1235059
* bsc#1235065
* bsc#1235070
* bsc#1235073
* bsc#1235100
* bsc#1235112
* bsc#1235115
* bsc#1235117
* bsc#1235122
* bsc#1235123
* bsc#1235125
* bsc#1235132
* bsc#1235133
* bsc#1235155
* bsc#1235160
* bsc#1235217
* bsc#1235219
* bsc#1235220
* bsc#1235222
* bsc#1235223
* bsc#1235224
* bsc#1235227
* bsc#1235230
* bsc#1235241
* bsc#1235244
* bsc#1235249
* bsc#1235251
* bsc#1235252
* bsc#1235389
* bsc#1235390
* bsc#1235391
* bsc#1235406
* bsc#1235410
* bsc#1235412
* bsc#1235413
* bsc#1235415
* bsc#1235416
* bsc#1235417
* bsc#1235418
* bsc#1235423
* bsc#1235424
* bsc#1235425
* bsc#1235426
* bsc#1235427
* bsc#1235428
* bsc#1235429
* bsc#1235430
* bsc#1235433
* bsc#1235437
* bsc#1235439
* bsc#1235441
* bsc#1235444
* bsc#1235445
* bsc#1235449
* bsc#1235451
* bsc#1235454
* bsc#1235458
* bsc#1235459
* bsc#1235464
* bsc#1235466
* bsc#1235473
* bsc#1235479
* bsc#1235480
* bsc#1235483
* bsc#1235486
* bsc#1235487
* bsc#1235488
* bsc#1235489
* bsc#1235491
* bsc#1235494
* bsc#1235495
* bsc#1235496
* bsc#1235497
* bsc#1235498
* bsc#1235500
* bsc#1235502
* bsc#1235503
* bsc#1235519
* bsc#1235520
* bsc#1235521
* bsc#1235523
* bsc#1235526
* bsc#1235528
* bsc#1235532
* bsc#1235533
* bsc#1235534
* bsc#1235537
* bsc#1235538
* bsc#1235545
* bsc#1235552
* bsc#1235555
* bsc#1235557
* bsc#1235563
* bsc#1235564
* bsc#1235565
* bsc#1235568
* bsc#1235570
* bsc#1235571
* bsc#1235577
* bsc#1235578
* bsc#1235582
* bsc#1235583
* bsc#1235584
* bsc#1235587
* bsc#1235611
* bsc#1235612
* bsc#1235616
* bsc#1235622
* bsc#1235627
* bsc#1235632
* bsc#1235635
* bsc#1235638
* bsc#1235641
* bsc#1235643
* bsc#1235645
* bsc#1235646
* bsc#1235647
* bsc#1235650
* bsc#1235653
* bsc#1235656
* bsc#1235657
* bsc#1235663
* bsc#1235686
* bsc#1235700
* bsc#1235705
* bsc#1235707
* bsc#1235708
* bsc#1235710
* bsc#1235714
* bsc#1235716
* bsc#1235720
* bsc#1235723
* bsc#1235727
* bsc#1235730
* bsc#1235737
* bsc#1235739
* bsc#1235745
* bsc#1235747
* bsc#1235750
* bsc#1235753
* bsc#1235759
* bsc#1235764
* bsc#1235768
* bsc#1235776
* bsc#1235777
* bsc#1235778
* bsc#1235779
* bsc#1235793
* bsc#1235798
* bsc#1235806
* bsc#1235808
* bsc#1235812
* bsc#1235814
* bsc#1235818
* bsc#1235842
* bsc#1235865
* bsc#1235874
* bsc#1235894
* bsc#1235902
* bsc#1235903
* bsc#1235906
* bsc#1235914
* bsc#1235918
* bsc#1235919
* bsc#1235920
* bsc#1235924
* bsc#1235940
* bsc#1235941
* bsc#1235946
* bsc#1235948
* bsc#1235952
* bsc#1235964
* bsc#1235965
* bsc#1235967
* bsc#1235969
* bsc#1235976
* bsc#1235977
* bsc#1236078
* bsc#1236080
* bsc#1236082
* bsc#1236088
* bsc#1236090
* bsc#1236091
* bsc#1236096
* bsc#1236097
* bsc#1236098
* bsc#1236101
* bsc#1236102
* bsc#1236104
* bsc#1236106
* bsc#1236120
* bsc#1236125
* bsc#1236127
* bsc#1236131
* bsc#1236138
* bsc#1236143
* bsc#1236144
* bsc#1236145
* bsc#1236160
* bsc#1236161
* bsc#1236163
* bsc#1236168
* bsc#1236178
* bsc#1236180
* bsc#1236181
* bsc#1236182
* bsc#1236190
* bsc#1236192
* bsc#1236198
* bsc#1236227
* bsc#1236245
* bsc#1236247
* bsc#1236248
* bsc#1236260
* bsc#1236262
* bsc#1236628
* bsc#1236680
* bsc#1236683
* bsc#1236685
* bsc#1236688
* bsc#1236694
* bsc#1236696
* bsc#1236698
* bsc#1236703
* bsc#1236732
* bsc#1236733
* bsc#1236757
* bsc#1236758
* bsc#1236760
* bsc#1236761
* jsc#PED-7242


Cross-References:

* CVE-2023-52923
* CVE-2024-36476
* CVE-2024-39282
* CVE-2024-43913
* CVE-2024-45828
* CVE-2024-46858
* CVE-2024-46896
* CVE-2024-47141
* CVE-2024-47143
* CVE-2024-47809
* CVE-2024-48873
* CVE-2024-48881
* CVE-2024-49569
* CVE-2024-49948
* CVE-2024-49951
* CVE-2024-49978
* CVE-2024-49998
* CVE-2024-50051
* CVE-2024-50106
* CVE-2024-50151
* CVE-2024-50199
* CVE-2024-50251
* CVE-2024-50258
* CVE-2024-50299
* CVE-2024-50304
* CVE-2024-52332
* CVE-2024-53091
* CVE-2024-53095
* CVE-2024-53164
* CVE-2024-53168
* CVE-2024-53170
* CVE-2024-53172
* CVE-2024-53175
* CVE-2024-53185
* CVE-2024-53187
* CVE-2024-53194
* CVE-2024-53195
* CVE-2024-53196
* CVE-2024-53197
* CVE-2024-53198
* CVE-2024-53203
* CVE-2024-53227
* CVE-2024-53230
* CVE-2024-53231
* CVE-2024-53232
* CVE-2024-53233
* CVE-2024-53236
* CVE-2024-53239
* CVE-2024-53685
* CVE-2024-53690
* CVE-2024-54680
* CVE-2024-55639
* CVE-2024-55881
* CVE-2024-55916
* CVE-2024-56369
* CVE-2024-56372
* CVE-2024-56531
* CVE-2024-56532
* CVE-2024-56533
* CVE-2024-56538
* CVE-2024-56543
* CVE-2024-56546
* CVE-2024-56548
* CVE-2024-56557
* CVE-2024-56558
* CVE-2024-56568
* CVE-2024-56569
* CVE-2024-56570
* CVE-2024-56571
* CVE-2024-56572
* CVE-2024-56573
* CVE-2024-56574
* CVE-2024-56575
* CVE-2024-56577
* CVE-2024-56578
* CVE-2024-56584
* CVE-2024-56587
* CVE-2024-56588
* CVE-2024-56589
* CVE-2024-56590
* CVE-2024-56592
* CVE-2024-56593
* CVE-2024-56594
* CVE-2024-56595
* CVE-2024-56596
* CVE-2024-56597
* CVE-2024-56598
* CVE-2024-5660
* CVE-2024-56600
* CVE-2024-56601
* CVE-2024-56602
* CVE-2024-56603
* CVE-2024-56606
* CVE-2024-56607
* CVE-2024-56608
* CVE-2024-56609
* CVE-2024-56610
* CVE-2024-56611
* CVE-2024-56614
* CVE-2024-56615
* CVE-2024-56616
* CVE-2024-56617
* CVE-2024-56619
* CVE-2024-56620
* CVE-2024-56622
* CVE-2024-56623
* CVE-2024-56625
* CVE-2024-56629
* CVE-2024-56630
* CVE-2024-56631
* CVE-2024-56632
* CVE-2024-56634
* CVE-2024-56635
* CVE-2024-56636
* CVE-2024-56637
* CVE-2024-56641
* CVE-2024-56642
* CVE-2024-56643
* CVE-2024-56644
* CVE-2024-56648
* CVE-2024-56649
* CVE-2024-56650
* CVE-2024-56651
* CVE-2024-56654
* CVE-2024-56656
* CVE-2024-56658
* CVE-2024-56659
* CVE-2024-56660
* CVE-2024-56661
* CVE-2024-56662
* CVE-2024-56663
* CVE-2024-56664
* CVE-2024-56665
* CVE-2024-56670
* CVE-2024-56672
* CVE-2024-56675
* CVE-2024-56677
* CVE-2024-56678
* CVE-2024-56679
* CVE-2024-56681
* CVE-2024-56683
* CVE-2024-56687
* CVE-2024-56688
* CVE-2024-56690
* CVE-2024-56691
* CVE-2024-56693
* CVE-2024-56694
* CVE-2024-56698
* CVE-2024-56700
* CVE-2024-56701
* CVE-2024-56704
* CVE-2024-56705
* CVE-2024-56707
* CVE-2024-56708
* CVE-2024-56709
* CVE-2024-56712
* CVE-2024-56715
* CVE-2024-56716
* CVE-2024-56722
* CVE-2024-56723
* CVE-2024-56724
* CVE-2024-56725
* CVE-2024-56726
* CVE-2024-56727
* CVE-2024-56728
* CVE-2024-56729
* CVE-2024-56739
* CVE-2024-56741
* CVE-2024-56745
* CVE-2024-56746
* CVE-2024-56747
* CVE-2024-56748
* CVE-2024-56759
* CVE-2024-56760
* CVE-2024-56763
* CVE-2024-56765
* CVE-2024-56766
* CVE-2024-56767
* CVE-2024-56769
* CVE-2024-56774
* CVE-2024-56775
* CVE-2024-56776
* CVE-2024-56777
* CVE-2024-56778
* CVE-2024-56779
* CVE-2024-56780
* CVE-2024-56787
* CVE-2024-57791
* CVE-2024-57792
* CVE-2024-57793
* CVE-2024-57795
* CVE-2024-57798
* CVE-2024-57801
* CVE-2024-57802
* CVE-2024-57804
* CVE-2024-57809
* CVE-2024-57838
* CVE-2024-57849
* CVE-2024-57850
* CVE-2024-57857
* CVE-2024-57874
* CVE-2024-57876
* CVE-2024-57882
* CVE-2024-57884
* CVE-2024-57887
* CVE-2024-57888
* CVE-2024-57890
* CVE-2024-57892
* CVE-2024-57893
* CVE-2024-57896
* CVE-2024-57897
* CVE-2024-57899
* CVE-2024-57903
* CVE-2024-57904
* CVE-2024-57906
* CVE-2024-57907
* CVE-2024-57908
* CVE-2024-57910
* CVE-2024-57911
* CVE-2024-57912
* CVE-2024-57913
* CVE-2024-57915
* CVE-2024-57916
* CVE-2024-57917
* CVE-2024-57922
* CVE-2024-57926
* CVE-2024-57929
* CVE-2024-57931
* CVE-2024-57932
* CVE-2024-57933
* CVE-2024-57935
* CVE-2024-57936
* CVE-2024-57938
* CVE-2024-57940
* CVE-2024-57946
* CVE-2025-21632
* CVE-2025-21645
* CVE-2025-21646
* CVE-2025-21649
* CVE-2025-21650
* CVE-2025-21651
* CVE-2025-21652
* CVE-2025-21653
* CVE-2025-21655
* CVE-2025-21656
* CVE-2025-21662
* CVE-2025-21663
* CVE-2025-21664
* CVE-2025-21666
* CVE-2025-21669
* CVE-2025-21670
* CVE-2025-21674
* CVE-2025-21675
* CVE-2025-21676
* CVE-2025-21678
* CVE-2025-21682


CVSS scores:

* CVE-2023-52923 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36476 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-36476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39282 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-39282 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43913 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43913 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-43913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45828 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45828 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46896 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47141 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47143 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47143 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48873 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-48873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48881 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-48881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-48881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49569 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49998 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50051 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50106 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50151 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50258 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52332 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53168 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53168 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53170 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53170 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53170 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53172 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53175 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53175 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53185 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53187 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53187 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-53187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53194 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53195 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-53195 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53196 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53196 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-53197 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-53198 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-53203 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53203 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53227 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53231 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53232 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53232 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53233 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53236 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53236 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53239 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53685 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53690 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-55639 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55639 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-55881 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55916 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56369 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56372 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56531 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56532 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56533 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56538 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56543 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56546 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56546 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56548 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56557 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56568 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56568 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56568 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56569 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56570 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56571 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-56571 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-56572 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56572 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56572 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56573 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56573 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56574 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56574 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56574 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56575 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56575 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56577 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56577 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56578 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56578 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56584 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56587 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56589 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56592 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56593 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56593 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56594 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56596 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56597 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56598 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56598 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-5660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56603 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56606 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56607 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56608 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56608 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56609 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56609 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56610 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56610 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56611 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56611 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56614 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56614 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56615 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56615 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56616 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56617 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56617 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56619 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56619 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56619 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56620 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56620 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56622 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56623 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56625 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56630 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56631 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56632 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56634 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56635 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56635 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56635 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56636 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56636 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56637 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56641 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56642 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56643 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56644 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56648 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56649 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56649 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56650 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56651 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56654 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56654 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56656 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56658 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56659 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56660 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56662 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56662 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
* CVE-2024-56662 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56663 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56663 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-56663 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56665 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56670 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56670 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56672 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56672 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56672 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56672 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56675 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56675 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56677 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56677 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56678 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56679 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56683 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56687 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56688 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56690 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56691 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56693 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56693 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56694 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56698 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56700 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56700 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56701 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56705 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56705 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56708 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56708 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56708 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56712 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56715 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56716 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56722 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56723 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56724 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56725 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56726 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56727 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56728 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56729 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56729 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56729 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56741 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56741 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56741 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56747 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56748 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56759 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56760 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56763 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56765 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56766 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56769 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56769 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56774 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56774 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56775 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56779 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56780 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56787 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57791 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57792 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57793 ( SUSE ): 6.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-57795 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57795 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57795 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57801 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57802 ( SUSE ): 2.1
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-57802 ( SUSE ): 4.6 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-57802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57804 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-57809 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57838 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57850 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57857 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57857 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57857 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57874 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57874 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57874 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-57876 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57882 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57884 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57887 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57890 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57890 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-57890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57893 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57897 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57899 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57899 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-57903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57904 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57906 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57906 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57907 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57908 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57908 ( SUSE ): 3.3 AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57910 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57910 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57910 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-57911 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57911 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-57912 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-57913 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57913 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-57915 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-57915 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-57915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57916 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57917 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57917 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57926 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57929 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57929 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57932 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57935 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57936 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57938 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57940 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57940 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57946 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21632 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21645 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21646 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21649 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21650 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21651 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21651 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21652 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21652 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21652 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21653 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-21653 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-21655 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21655 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21656 ( SUSE ): 1.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-21656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2025-21662 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21664 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21664 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21666 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21669 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21674 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21675 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21676 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21678 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21682 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21682 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21682 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6



An update that solves 256 vulnerabilities, contains one feature and has 42
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop
request (bsc#1235705).
* CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
* CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again
(bsc#1235727).
* CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init()
(bsc#1232161).
* CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed
(bsc#1232158).
* CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from
frag_list (bsc#1232101).
* CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087).
* CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request
(bsc#1233055).
* CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma
(bsc#1233112).
* CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before
calling skb_checksum() (bsc#1233248).
* CVE-2024-50258: net: fix crash when config small
gso_max_size/gso_ipv4_max_size (bsc#1233221).
* CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb()
(bsc#1233488).
* CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_find() (bsc#1233522).
* CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in
tls_sw_has_ctx_tx/rx (bsc#1233638).
* CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
* CVE-2024-53170: block: fix uaf for flush rq while iterating tags
(bsc#1234888).
* CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while
attaching
(bsc#1234898).
* CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns
(bsc#1234893).
* CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey()
(bsc#1234901).
* CVE-2024-53187: io_uring: check for overflows in io_pin_pages
(bsc#1234947).
* CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use
(bsc#1234957).
* CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction
(bsc#1234906).
* CVE-2024-53198: xen: Fix the issue of resource not being properly released
in xenbus_dev_probe() (bsc#1234923).
* CVE-2024-53203: usb: typec: fix potential array underflow in
ucsi_ccg_sync_control() (bsc#1235001).
* CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit()
(bsc#1235011).
* CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050).
* CVE-2024-53236: xsk: Free skb when TX metadata options are invalid
(bsc#1235000).
* CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720).
* CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device
tree
node (bsc#1235737).
* CVE-2024-55881: KVM: x86: Play nice with protected guests in
complete_hypercall_exit() (bsc#1235745).
* CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753).
* CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device
bound (bsc#1235032).
* CVE-2024-56569: ftrace: Fix regression with module command in
stack_trace_filter (bsc#1235031).
* CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function
(bsc#1235035).
* CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs
initialization (bsc#1235123).
* CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption
model (bsc#1235241).
* CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket()
(bsc#1235244).
* CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in
inet6_create() (bsc#1235217).
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235230).
* CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in
ieee802154_create() (bsc#1235521).
* CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in
can_create() (bsc#1235415).
* CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in
'dcn21_link_encoder_create' (bsc#1235487).
* CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock
(bsc#1235390).
* CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at
least one VMA in a MM (bsc#1235391).
* CVE-2024-56614: xsk: fix OOB map writes when deleting elements
(bsc#1235424).
* CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements
(bsc#1235426).
* CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done
from the primary CPU (bsc#1235429).
* CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is
enabled
(bsc#1235227).
* CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251).
* CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
(bsc#1235480).
* CVE-2024-56635: net: avoid potential UAF in default_operstate()
(bsc#1235519).
* CVE-2024-56636: geneve: do not assume mac header is set in
geneve_xmit_skb()
(bsc#1235520).
* CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a
module (bsc#1235523).
* CVE-2024-56641: net/smc: initialize close_work early to avoid warning
(bsc#1235526).
* CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv
(bsc#1235132).
* CVE-2024-56648: net: hsr: avoid potential out-of-bound access in
fill_frame_info() (bsc#1235451).
* CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not
support (bsc#1235449).
* CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check()
(bsc#1235430).
* CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X
chips (bsc#1235444).
* CVE-2024-56658: net: defer final 'struct net' free in netns
dismantle
(bsc#1235441).
* CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439).
* CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference
(bsc#1235437).
* CVE-2024-56664: bpf, sockmap: Fix race between element replace and close()
(bsc#1235249).
* CVE-2024-56665: bpf,perf: Fix invalid prog_array access in
perf_event_detach_bpf_prog (bsc#1235489).
* CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU
flavors
(bsc#1235555).
* CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_common.c (bsc#1235498).
* CVE-2024-56693: brd: defer automatic disk creation until module
initialization succeeds (bsc#1235418).
* CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS
(bsc#1235412).
* CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
* CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_dmac_flt.c (bsc#1235545).
* CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload
(bsc#1235564).
* CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error
path
(bsc#1235565).
* CVE-2024-56715: ionic: Fix netdev notifier unregister on failure
(bsc#1235612).
* CVE-2024-56716: netdevsim: prevent bad user input in
nsim_dev_health_break_write() (bsc#1235587).
* CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_dcbnl.c (bsc#1235578).
* CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c
(bsc#1235582).
* CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_flows.c (bsc#1235583).
* CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_ethtool.c (bsc#1235656).
* CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops
(bsc#1235503).
* CVE-2024-56747: scsi: qedi: Fix a possible memory leak in
qedi_alloc_and_init_sb() (bsc#1234934).
* CVE-2024-56748: scsi: qedf: Fix a possible memory leak in
qedf_alloc_and_init_sb() (bsc#1235627).
* CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing
is enabled (bsc#1235645).
* CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write
(bsc#1235638).
* CVE-2024-56774: btrfs: add a sanity check for btrfs root in
btrfs_search_slot() (bsc#1235653).
* CVE-2024-56775: drm/amd/display: Fix handling of plane refcount
(bsc#1235657).
* CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining
clc data (bsc#1235759).
* CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on
unrecoverable
errors (bsc#1235768).
* CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device
(bsc#1235906).
* CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without
loaded flag (bsc#1235940).
* CVE-2024-57802: netrom: check buffer length before accessing it
(bsc#1235941).
* CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is
switched
in sysfs (bsc#1235779).
* CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL
(bsc#1235793).
* CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings
(bsc#1235798).
* CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946).
* CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914).
* CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop
in throttle_direct_reclaim() (bsc#1235948).
* CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer
dqi_priv (bsc#1235964).
* CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner
kthread during unmount (bsc#1235965).
* CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967).
* CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap
(bsc#1236127).
* CVE-2024-57929: dm array: fix releasing a faulty array block twice in
dm_array_cursor_end (bsc#1236096).
* CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192).
* CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues
(bsc#1236190).
* CVE-2024-57933: gve: guard XSK operations on the existence of queues
(bsc#1236178).
* CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in
sctp_association_init() (bsc#1236182).
* CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend
(bsc#1236247).
* CVE-2025-21632: x86/fpu: Ensure shadow stack is active before
"getting"
registers (bsc#1236106).
* CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08
devices (bsc#1236143).
* CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out
of bounds issue (bsc#1236144).
* CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145).
* CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink()
(bsc#1236160).
* CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
(bsc#1236161).
* CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another
RCU period (bsc#1236163).
* CVE-2025-21662: net/mlx5: Fix variable not being completed when function
returns (bsc#1236198).
* CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device
tree (bsc#1236260).
* CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first
function (bsc#1236262).
* CVE-2025-21666: vsock: prevent null-ptr-deref in
vsock_*[has_data|has_space]
(bsc#1236680).
* CVE-2025-21669: vsock/virtio: discard packets if the transport changes
(bsc#1236683).
* CVE-2025-21670: vsock/bpf: return early if transport is not assigned
(bsc#1236685).
* CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling
IPsec tunnel (bsc#1236688).
* CVE-2025-21675: net/mlx5: Clear port select structure when fail to create
(bsc#1236694).
* CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error
(bsc#1236696).
* CVE-2025-21678: gtp: Destroy device along with udp socket's netns
dismantle
(bsc#1236698).
* CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing,
fix null-deref (bsc#1236703).

The following non-security bugs were fixed:

* ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A (stable-
fixes).
* ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11 (stable-
fixes).
* ACPI: PCC: Add PCC shared memory region command and status bitfields
(stable-fixes).
* ACPI: fan: cleanup resources in the error path of .probe() (git-fixes).
* ACPI: resource: Add Asus Vivobook X1504VAP to
irq1_level_low_skip_override[]
(stable-fixes).
* ACPI: resource: Add TongFang GM5HG0A to irq1_edge_low_force_override[]
(stable-fixes).
* ACPI: resource: acpi_dev_irq_override(): Check DMI match last (stable-
fixes).
* ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD audio
(stable-fixes).
* ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire A115-31
laptop (git-fixes).
* ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model (stable-fixes).
* ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA (stable-
fixes).
* ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE) (stable-
fixes).
* ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx (stable-fixes).
* ALSA: hda/realtek: Enable headset mic on Positivo C6400 (stable-fixes).
* ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130
(bsc#1235686).
* ALSA: hda: Fix headset detection failure due to unstable sort (git-fixes).
* ALSA: ump: Use guard() for locking (stable-fixes).
* ALSA: usb-audio: Add delay quirk for USB Audio Device (stable-fixes).
* ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro (stable-fixes).
* ASoC: Intel: avs: Fix theoretical infinite loop (git-fixes).
* ASoC: acp: Support microphone from Lenovo Go S (stable-fixes).
* ASoC: mediatek: disable buffer pre-allocation (stable-fixes).
* ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback (git-fixes).
* ASoC: rt722: add delay time to wait for the calibration procedure (stable-
fixes).
* ASoC: samsung: Add missing depends on I2C (git-fixes).
* ASoC: samsung: Add missing selects for MFD_WM8994 (stable-fixes).
* ASoC: sun4i-spdif: Add clock multiplier settings (git-fixes).
* ASoC: wm8994: Add depends on MFD core (stable-fixes).
* Align git commit ID abbreviation guidelines and checks (git-fixes).
* Bluetooth: Add support ITTIM PE50-M75C (stable-fixes).
* Bluetooth: L2CAP: accept zero as a special value for MTU auto-selection
(git-fixes).
* Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc (git-fixes).
* Bluetooth: MGMT: Fix Add Device to responding before completing
(git-fixes).
* Bluetooth: btnxpuart: Fix driver sending truncated data (git-fixes).
* Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming (git-fixes).
* Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925 (stable-fixes).
* Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925 (stable-fixes).
* Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925 (stable-fixes).
* Bluetooth: btusb: add callback function in btusb suspend/resume (stable-
fixes).
* Bluetooth: btusb: mediatek: add callback function in btusb_disconnect
(stable-fixes).
* Bluetooth: hci_sync: Fix not setting Random Address when required (git-
fixes).
* uvcvideo: drop fix due to regression (bsc#1235894)
* EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693).
* HID: core: Fix assumption that Resolution Multipliers must be in Logical
Collections (git-fixes).
* HID: fix generic desktop D-Pad controls (git-fixes).
* HID: hid-sensor-hub: do not use stale platform-data on remove (git-fixes).
* HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint
check (git-fixes).
* HID: multitouch: fix support for Goodix PID 0x01e9 (git-fixes).
* Input: atkbd - map F23 key to support default copilot shortcut (stable-
fixes).
* Input: bbnsm_pwrkey - add remove hook (git-fixes).
* Input: bbnsm_pwrkey - fix missed key press after suspend (git-fixes).
* Input: davinci-keyscan - remove leftover header (git-fixes).
* Input: xpad - add QH Electronics VID/PID (stable-fixes).
* Input: xpad - add support for Nacon Evol-X Xbox One Controller (stable-
fixes).
* Input: xpad - add support for Nacon Pro Compact (stable-fixes).
* Input: xpad - add support for wooting two he (arm) (stable-fixes).
* Input: xpad - add unofficial Xbox 360 wireless receiver clone (stable-
fixes).
* Input: xpad - improve name of 8BitDo controller 2dc8:3106 (stable-fixes).
* KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits (bsc#1234635).
* KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes
bsc#1235776).
* KVM: s390: Reject setting flic pfault attributes on ucontrol VMs (git-fixes
bsc#1235777).
* KVM: s390: vsie: fix virtual/physical address in unpin_scb() (git-fixes
bsc#1235778).
* Move upstreamed DRM patch into sorted section
* Move upstreamed NFS patch into sorted section
* Move upstreamed TPM patch into sorted section
* Move upstreamed lpfc patches into sorted section
* Move upstreamed ppc patch into sorted section
* Move upstreamed sound patch into sorted section
* NFC: nci: Add bounds checking in nci_hci_create_pipe() (git-fixes).
* NFSv4.2: fix COPY_NOTIFY xdr buf size calculation (git-fixes).
* NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes).
* PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (git-
fixes).
* PCI: dwc: Always stop link in the dw_pcie_suspend_noirq (git-fixes).
* PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() (git-
fixes).
* PCI: dwc: ep: Write BAR_MASK before iATU registers in pci_epc_set_bar()
(git-fixes).
* PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy()
(git-fixes).
* PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf() (git-
fixes).
* PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test (git-fixes).
* PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error (git-
fixes).
* PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset() (git-
fixes).
* PCI: imx6: Skip controller_id generation logic for i.MX7D (git-fixes).
* PCI: microchip: Set inbound address translation for coherent or
non-coherent
mode (git-fixes).
* PCI: rcar-ep: Fix incorrect variable used when calling
devm_request_mem_region() (git-fixes).
* PM: hibernate: Add error handling for syscore_suspend() (git-fixes).
* RDMA/bnxt_re: Add send queue size check for variable wqe (git-fixes)
* RDMA/bnxt_re: Fix MSN table size for variable wqe mode (git-fixes)
* RDMA/bnxt_re: Fix max SGEs for the Work Request (git-fixes)
* RDMA/bnxt_re: Fix the max WQE size for static WQE support (git-fixes)
* RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode (git-fixes)
* RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of error
(git-
fixes)
* RDMA/bnxt_re: Fix to export port num to ib_query_qp (git-fixes)
* RDMA/mlx4: Avoid false error about access to uninitialized gids array (git-
fixes)
* RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (git-
fixes)
* RDMA/mlx5: Fix implicit ODP use after free (git-fixes)
* RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes)
* RDMA/rxe: Fix mismatched max_msg_sz (git-fixes)
* RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]"
(git-fixes)
* RDMA/srp: Fix error handling in srp_add_port (git-fixes)
* USB: core: Disable LPM only for non-suspended ports (git-fixes).
* USB: serial: cp210x: add Phoenix Contact UPS Device (stable-fixes).
* USB: serial: option: add MeiG Smart SRM815 (stable-fixes).
* USB: serial: option: add Neoway N723-EA support (stable-fixes).
* USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (git-
fixes).
* USB: usblp: return error when setting unsupported protocol (git-fixes).
* Update patches.suse/nvme-tcp-Fix-I-O-queue-cpu-spreading-for-multiple-
co.patch (git-fixes bsc#1224049).
* VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
* VMCI: fix reference to ioctl-number.rst (git-fixes).
* afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY
(git-fixes).
* afs: Fix cleanup of immediately failed async calls (git-fixes).
* afs: Fix directory format encoding struct (git-fixes).
* afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call
(git-fixes).
* afs: Fix the maximum cell name length (git-fixes).
* arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu() (git-fixes)
* arm64: Filter out SVE hwcaps when FEAT_SVE isn't implemented
(git-fixes)
* arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes bsc#1236245).
* arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328 (git-
fixes)
* arm64: dts: rockchip: add hevc power domain clock to rk3328 (git-fixes).
* arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma (git-fixes)
* arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL (git-
fixes).
* arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes)
* arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes)
* arm64: tegra: Fix typo in Tegra234 dce-fabric compatible (git-fixes)
* ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf() (stable-
fixes).
* bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (git-fixes)
* btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235445).
* btrfs: fix use-after-free waiting for encoded read endios (bsc#1235445).
* bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table() (git-
fixes).
* ceph: improve error handling and short/overflow-read logic in
__ceph_sync_read() (bsc#1228592).
* cleanup: Add conditional guard support (stable-fixes).
* cleanup: Adjust scoped_guard() macros to avoid potential warning (stable-
fixes).
* cleanup: Remove address space of returned pointer (git-fixes).
* cpufreq: ACPI: Fix max-frequency computation (git-fixes).
* cpufreq: Do not unregister cpufreq cooling on CPU hotplug (git-fixes).
* cpufreq: amd-pstate: remove global header file (git-fixes).
* cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo()
(bsc#1234619).
* cpufreq: intel_pstate: Do not update global.turbo_disabled after
initialization (bsc#1234619).
* cpufreq: intel_pstate: Drop redundant locking from
intel_pstate_driver_cleanup() (bsc#1234619).
* cpufreq: intel_pstate: Fix unchecked HWP MSR access (bsc#1234619).
* cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into caller
(bsc#1234619).
* cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations
(bsc#1234619).
* cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock (git-fixes).
* cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE()
(bsc#1234619).
* cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo()
(bsc#1234619).
* cpufreq: intel_pstate: Refine computation of P-state for given frequency
(bsc#1234619).
* cpufreq: intel_pstate: Replace three global.turbo_disabled checks
(bsc#1234619).
* cpufreq: intel_pstate: Revise global turbo disable check (bsc#1234619).
* cpufreq: intel_pstate: Simplify spinlock locking (bsc#1234619).
* cpufreq: intel_pstate: Update the maximum CPU frequency consistently
(bsc#1234619).
* cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing (git-
fixes).
* cpufreq: intel_pstate: Use __ro_after_init for three variables
(bsc#1234619).
* cpufreq: intel_pstate: Wait for canceled delayed work to complete
(bsc#1234619).
* cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call
back (git-fixes).
* cpuidle: Avoid potential overflow in integer multiplication (git-fixes).
* cpupower: fix TSC MHz calculation (git-fixes).
* crypto: caam - use JobR's space to access page 0 regs (git-fixes).
* crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
(git-fixes).
* crypto: ecdsa - Avoid signed integer overflow on signature decoding
(stable-
fixes).
* crypto: ecdsa - Convert byte arrays with key coordinates to digits (stable-
fixes).
* crypto: ecdsa - Rename keylen to bufsize where necessary (stable-fixes).
* crypto: ecdsa - Use ecc_digits_from_bytes to convert signature (stable-
fixes).
* crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to
'async'
(git-fixes).
* crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto() (git-
fixes).
* crypto: qce - fix goto jump in error path (git-fixes).
* crypto: qce - fix priority to be less than ARMv8 CE (git-fixes).
* crypto: qce - unregister previously registered algos in error path (git-
fixes).
* devcoredump: cleanup some comments (git-fixes).
* dlm: fix possible lkb_resource null dereference (git-fixes).
* dmaengine: ti: edma: fix OF node reference leaks in edma_driver
(git-fixes).
* doc/README.SUSE: Point to the updated version of LKMPG
* docs: media: update location of the media patches (stable-fixes).
* docs: power: Fix footnote reference for Toshiba Satellite P10-554 (git-
fixes).
* driver core: class: Fix wild pointer dereferences in API
class_dev_iter_next() (git-fixes).
* drivers/card_reader/rtsx_usb: Restore interrupt based detection
(git-fixes).
* drm/amd/display: Add check for granularity in dml ceil/floor helpers
(stable-fixes).
* drm/amd/display: Fix DSC-re-computing (stable-fixes).
* drm/amd/display: Fix incorrect DSC recompute trigger (stable-fixes).
* drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes).
* drm/amd/display: increase MAX_SURFACES to the value supported by hw
(stable-
fixes).
* drm/amd/pm: Fix an error handling path in
vega10_enable_se_edc_force_stall_config() (git-fixes).
* drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes).
* drm/amdgpu: Fix potential NULL pointer dereference in
atomctrl_get_smc_sclk_range_table (git-fixes).
* drm/amdgpu: always sync the GFX pipe on ctx switch (stable-fixes).
* drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init
(git-fixes).
* drm/amdgpu: tear down ttm range manager for doorbell in amdgpu_ttm_fini()
(git-fixes).
* drm/amdkfd: Correct the migration DMA map direction (stable-fixes).
* drm/amdkfd: fixed page fault when enable MES shader debugger (git-fixes).
* drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE (git-fixes).
* drm/etnaviv: Fix page property being used for non writecombine buffers
(git-
fixes).
* drm/i915/fb: Relax clear color alignment to 64 bytes (stable-fixes).
* drm/mediatek: Add return value check when reading DPCD (git-fixes).
* drm/mediatek: Add support for 180-degree rotation in the display driver
(git-fixes).
* drm/mediatek: Fix YCbCr422 color format issue for DP (git-fixes).
* drm/mediatek: Fix mode valid issue for dp (git-fixes).
* drm/mediatek: Set private->all_drm_private[i]->drm to NULL if
mtk_drm_bind
returns err (git-fixes).
* drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188 (git-
fixes).
* drm/mediatek: stop selecting foreign drivers (git-fixes).
* drm/msm/dp: set safe_to_exit_level before printing it (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes).
* drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes).
* drm/msm: Check return value of of_dma_configure() (git-fixes).
* drm/msm: do not clean up priv->kms prematurely (git-fixes).
* drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes).
* drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event() (git-fixes).
* drm/rockchip: vop2: Check linear format for Cluster windows on rk3566/8
(git-fixes).
* drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset (git-
fixes).
* drm/rockchip: vop2: Fix the mixer alpha setup for layer 0 (git-fixes).
* drm/tidss: Clear the interrupt status for interrupts being disabled (git-
fixes).
* drm/tidss: Fix issue in irq handling causing irq-flood issue (git-fixes).
* drm/v3d: Assign job pointer to NULL before signaling the fence (git-fixes).
* drm/v3d: Ensure job pointer is set to NULL after job completion
(git-fixes).
* drm/v3d: Stop active perfmon if it is being destroyed (git-fixes).
* drm/vmwgfx: Add new keep_resv BO param (git-fixes).
* exfat: ensure that ctime is updated whenever the mtime is (git-fixes).
* exfat: fix the infinite loop in __exfat_free_cluster() (git-fixes).
* exfat: fix the infinite loop in exfat_readdir() (git-fixes).
* fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device() (git-
fixes).
* genirq: Make handle_enforce_irqctx() unconditionally available (git-fixes).
* genksyms: fix memory leak when the same symbol is added from source (git-
fixes).
* genksyms: fix memory leak when the same symbol is read from *.symref file
(git-fixes).
* gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (git-fixes).
* gpio: mxc: remove dead code after switch to DT-only (git-fixes).
* gpio: xilinx: Convert gpio_lock to raw spinlock (git-fixes).
* gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes).
* hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur
(git-fixes).
* hwmon: (drivetemp) Set scsi command timeout to 10s (stable-fixes).
* hwmon: (tmp513) Fix division of negative numbers (git-fixes).
* hyperv: Do not overlap the hvcall IO areas in get_vtl() (git-fixes).
* i2c: core: fix reference leak in i2c_register_adapter() (git-fixes).
* i2c: i801: Add support for Intel Arrow Lake-H (stable-fixes).
* i2c: i801: Add support for Intel Panther Lake (stable-fixes).
* i2c: mux: demux-pinctrl: check initial mux selection, too (git-fixes).
* i2c: rcar: fix NACK handling when being a target (git-fixes).
* i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros
(stable-
fixes).
* ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
* ieee802154: ca8210: Add missing check for kfifo_alloc() in ca8210_probe()
(git-fixes).
* iio: adc: ad7124: Disable all channels at probe time (git-fixes).
* iio: adc: ad_sigma_delta: Handle CS assertion as intended in
ad_sd_read_reg_raw() (git-fixes).
* iio: adc: at91: call input_free_device() on allocated iio_dev (git-fixes).
* iio: adc: rockchip_saradc: fix information leak in triggered buffer (git-
fixes).
* iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep() (git-fixes).
* iio: adc: ti-ads8688: fix information leak in triggered buffer (git-fixes).
* iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered
buffer (git-fixes).
* iio: gyro: fxas21002c: Fix missing data update in trigger handler (git-
fixes).
* iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page alignment
(git-
fixes).
* iio: imu: kmx61: fix information leak in triggered buffer (git-fixes).
* iio: inkern: call iio_device_put() only on mapped devices (git-fixes).
* iio: light: as73211: fix channel handling in only-color triggered buffer
(git-fixes).
* iio: light: vcnl4035: fix information leak in triggered buffer (git-fixes).
* iio: pressure: zpa2326: fix information leak in triggered buffer (git-
fixes).
* iio: test : check null return of kunit_kmalloc in iio_rescale_test_scale
(git-fixes).
* intel_th: core: fix kernel-doc warnings (git-fixes).
* ipmi: ipmb: Add check devm_kasprintf() returned value (git-fixes).
* ipmi: ssif_bmc: Fix new request loss when bmc ready for a response (git-
fixes).
* irqchip/gic-v3: Force propagation of the active state with a read-back
(stable-fixes).
* irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base
(stable-fixes).
* kABI workaround for struct auto_pin_cfg_item change (git-fixes).
* kconfig: fix file name in warnings when loading KCONFIG_DEFCONFIG_LIST
(git-
fixes).
* kheaders: Ignore silly-rename files (stable-fixes).
* ktest.pl: Avoid false positives with grub2 skip regex (stable-fixes).
* ktest.pl: Check kernelrelease return in get_version (git-fixes).
* ktest.pl: Fix typo "accesing" (git-fixes).
* ktest.pl: Fix typo in comment (git-fixes).
* ktest.pl: Remove unused declarations in run_bisect_test function (git-
fixes).
* ktest: force $buildonly = 1 for 'make_warnings_file' test type
(stable-
fixes).
* landlock: Handle weird files (git-fixes).
* latencytop: use correct kernel-doc format for func params (git-fixes).
* leds: lp8860: Write full EEPROM, not only half of it (git-fixes).
* leds: netxbig: Fix an OF node reference leak in netxbig_leds_get_of_pdata()
(git-fixes).
* lib/inflate.c: remove dead code (git-fixes).
* lib/stackdepot: print disabled message only if truly disabled (git-fixes).
* mac802154: check local interfaces before deleting sdata list
(stable-fixes).
* mailbox: pcc: Add support for platform notification handling
(stable-fixes).
* mailbox: pcc: Support shared interrupt for multiple subspaces (stable-
fixes).
* mailbox: tegra-hsp: Clear mailbox before using message (git-fixes).
* maple_tree: simplify split calculation (git-fixes).
* media: camif-core: Add check for clk_enable() (git-fixes).
* media: ccs: Clean up parsed CCS static data on parse failure (git-fixes).
* media: ccs: Fix CCS static data parsing for large block sizes (git-fixes).
* media: ccs: Fix cleanup order in ccs_probe() (git-fixes).
* media: dvb-usb-v2: af9035: fix ISO C90 compilation error on
af9035_i2c_master_xfer (git-fixes).
* media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes).
* media: firewire: firedtv-avc.c: replace BUG with proper, error return (git-
fixes).
* media: i2c: imx412: Add missing newline to prints (git-fixes).
* media: i2c: ov9282: Correct the exposure offset (git-fixes).
* media: imx-jpeg: Fix potential error pointer dereference in detach_pm()
(git-fixes).
* media: imx296: Add standby delay during probe (git-fixes).
* media: lmedm04: Handle errors for lme2510_int_read (git-fixes).
* media: marvell: Add check for clk_enable() (git-fixes).
* media: mc: fix endpoint iteration (git-fixes).
* media: mipi-csis: Add check for clk_enable() (git-fixes).
* media: nxp: imx8-isi: fix v4l2-compliance test errors (git-fixes).
* media: ov08x40: Fix hblank out of range issue (git-fixes).
* media: ov5640: fix get_light_freq on auto (git-fixes).
* media: rc: iguanair: handle timeouts (git-fixes).
* media: rkisp1: Fix unused value issue (git-fixes).
* media: uvcvideo: Fix crash during unbind if gpio unit is in use
(git-fixes).
* media: uvcvideo: Fix double free in error path (git-fixes).
* media: uvcvideo: Fix event flags in uvc_ctrl_send_events (git-fixes).
* media: uvcvideo: Force UVC version to 1.0a for 0408:4035 (stable-fixes).
* media: uvcvideo: Only save async fh if success (git-fixes).
* media: uvcvideo: Propagate buf->error to userspace (git-fixes).
* media: uvcvideo: Remove dangling pointers (git-fixes).
* media: uvcvideo: Remove redundant NULL assignment (git-fixes).
* media: uvcvideo: Support partial control reads (git-fixes).
* memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled (git-
fixes).
* memory-failure: use a folio in me_huge_page() (git-fixes).
* memory: tegra20-emc: fix an OF node reference bug in
tegra_emc_find_node_by_ram_code() (git-fixes).
* misc: fastrpc: Deregister device nodes properly in error scenarios (git-
fixes).
* misc: fastrpc: Fix copy buffer page size (git-fixes).
* misc: fastrpc: Fix registered buffer page address (git-fixes).
* misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling
(git-fixes).
* misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO set
config (git-fixes).
* misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (git-
fixes).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm,page_owner: do not remove __GFP_NOLOCKDEP in add_stack_record_to_list
(git-fixes).
* mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes
(mm/compaction)).
* mm/memory-failure: cast index to loff_t before shifting it (git-fixes).
* mm/memory-failure: check the mapcount of the precise page (git-fixes).
* mm/memory-failure: fix crash in split_huge_page_to_list from
soft_offline_page (git-fixes).
* mm/memory-failure: pass the folio and the page to collect_procs() (git-
fixes).
* mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu (git-
fixes).
* mm/memory_hotplug: add missing mem_hotplug_lock (git-fixes).
* mm/memory_hotplug: fix error handling in add_memory_resource() (git-fixes).
* mm/memory_hotplug: prevent accessing by index=-1 (git-fixes).
* mm/memory_hotplug: use pfn math in place of direct struct page manipulation
(git-fixes).
* mm/migrate: correct nr_failed in migrate_pages_sync() (git-fixes).
* mm/migrate: fix deadlock in migrate_pages_batch() on large folios (git-
fixes).
* mm/migrate: putback split folios when numa hint migration fails
(git-fixes).
* mm/migrate: split source folio if it is on deferred split list (git-fixes).
* mm/page_owner: remove free_ts from page_owner output (git-fixes).
* mm/rodata_test: use READ_ONCE() to read const variable (git-fixes).
* mm: convert DAX lock/unlock page to lock/unlock folio (git-fixes).
* mm: memory-failure: ensure moving HWPoison flag to the raw error pages
(git-
fixes).
* mm: memory-failure: fetch compound head after extra page refcnt is held
(git-fixes).
* mm: memory-failure: fix potential page refcnt leak in memory_failure()
(git-
fixes).
* mm: memory-failure: fix race window when trying to get hugetlb folio (git-
fixes).
* mm: memory-failure: remove unneeded PageHuge() check (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* modpost: fix the missed iteration for the max bit in do_input()
(git-fixes).
* mtd: onenand: Fix uninitialized retlen in do_otp_read() (git-fixes).
* mtd: spinand: Remove write_enable_op() in markbad() (git-fixes).
* net/rose: prevent integer overflows in rose_setsockopt() (git-fixes).
* net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
* net: mana: Cleanup "mana" debugfs dir after cleanup of all children
(bsc#1236760).
* net: mana: Enable debugfs files for MANA device (bsc#1236758).
* net: netvsc: Update default VMBus channels (bsc#1236757).
* net: phy: c45-tjaxx: add delay between MDIO write and read in soft_reset
(git-fixes).
* net: rose: fix timer races against user threads (git-fixes).
* net: usb: qmi_wwan: add Telit FE910C04 compositions (stable-fixes).
* net: usb: rtl8150: enable basic endpoint checking (git-fixes).
* net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init()
(git-fixes).
* net: wwan: t7xx: Fix FSM command timeout issue (git-fixes).
* netfilter: nf_tables: validate family when identifying table via handle
(bsc#1233778 ZDI-24-1454).
* nilfs2: fix possible int overflows in nilfs_fiemap() (git-fixes).
* nvme-tcp: Fix I/O queue cpu spreading for multiple controllers (git-fixes).
* nvme: Add error check for xa_store in nvme_get_effects_log (git-fixes).
* nvme: Add error path for xa_store in nvme_init_effects (git-fixes).
* nvme: fix bogus kzalloc() return check in nvme_init_effects_log() (git-
fixes).
* nvmet: propagate npwg topology (git-fixes).
* padata: add pd get/put refcnt helper (git-fixes).
* padata: avoid UAF for reorder_work (git-fixes).
* padata: fix UAF in padata_reorder (git-fixes).
* pinctrl: amd: Take suspend type into consideration which pins are non-wake
(git-fixes).
* pinctrl: samsung: fix fwnode refcount cleanup if
platform_get_irq_optional()
fails (git-fixes).
* platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled
it (git-fixes).
* platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1225897).
* platform/x86/intel/tpmi: Add defines to get version information
(bsc#1225897).
* pm:cpupower: Add missing powercap_set_enabled() stub function (git-fixes).
* power: ip5xxx_power: Fix return value on ADC read errors (git-fixes).
* powerpc/iommu: Move pSeries specific functions to pseries/iommu.c
(bsc#1220711 ltc#205755).
* powerpc/iommu: Only build sPAPR access functions on pSeries (bsc#1220711
ltc#205755).
* powerpc/powernv/pci: Remove MVE code (bsc#1220711 ltc#205755).
* powerpc/powernv/pci: Remove ioda1 support (bsc#1220711 ltc#205755).
* powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711 ltc#205755).
* powerpc/pseries/eeh: Fix get PE state translation (bsc#1215199).
* powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW
(bsc#1218470 ltc#204531).
* powerpc/pseries/vas: Add close() callback in vas_vm_ops struct
(bsc#1234825).
* pps: add an error check in parport_attach (git-fixes).
* pps: remove usage of the deprecated ida_simple_xx() API (stable-fixes).
* printk: Add is_printk_legacy_deferred() (bsc#1236733).
* printk: Defer legacy printing when holding printk_cpu_sync (bsc#1236733).
* pwm: stm32-lp: Add check for clk_enable() (git-fixes).
* pwm: stm32: Add check for clk_enable() (git-fixes).
* r8169: enable SG/TSO on selected chip versions per default (bsc#1235874).
* rcu-tasks: Pull sampling of ->percpu_dequeue_lim out of loop (git-fixes)
* rcu/tree: Defer setting of jiffies during stall reset (git-fixes)
* rcu: Dump memory object info if callback function is invalid (git-fixes)
* rcu: Eliminate rcu_gp_slow_unregister() false positive (git-fixes)
* rcuscale: Move rcu_scale_writer() (git-fixes)
* rdma/cxgb4: Prevent potential integer overflow on 32bit (git-fixes)
* regulator: core: Add missing newline character (git-fixes).
* regulator: of: Implement the unwind path of of_regulator_match() (git-
fixes).
* remoteproc: core: Fix ida_free call while not allocated (git-fixes).
* rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read (git-fixes).
* rtc: zynqmp: Fix optional clock name property (git-fixes).
* s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646)
* samples/landlock: Fix possible NULL dereference in parse_path()
(git-fixes).
* sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat
(bsc#1235865).
* sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat -kabi
(bsc#1235865).
* scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (git-
fixes).
* seccomp: Stub for !CONFIG_SECCOMP (stable-fixes).
* selftest: media_tests: fix trivial UAF typo (git-fixes).
* selftests/alsa: Fix circular dependency involving global-timer (stable-
fixes).
* selftests/landlock: Fix error message (git-fixes).
* selftests/mm/cow: modify the incorrect checking parameters (git-fixes).
* selftests/powerpc: Fix argument order to timer_sub() (git-fixes).
* selftests: harness: fix printing of mismatch values in __EXPECT() (git-
fixes).
* selftests: mptcp: avoid spurious errors on disconnect (git-fixes).
* selftests: tc-testing: reduce rshift value (stable-fixes).
* selftests: timers: clocksource-switch: Adapt progress to kselftest
framework
(git-fixes).
* selinux: Fix SCTP error inconsistency in selinux_socket_bind() (git-fixes).
* serial: 8250: Adjust the timeout for FIFO mode (git-fixes).
* serial: sh-sci: Do not probe the serial port if its slot in sci_ports[] is
in use (git-fixes).
* serial: sh-sci: Drop __initdata macro for port_cfg (git-fixes).
* ocfs2: temporarily disable upstream patch (bsc#1236138).
* soc: atmel: fix device_node release in atmel_soc_device_init() (git-fixes).
* soc: mediatek: mtk-devapc: Fix leaking IO map on error paths (git-fixes).
* soc: qcom: smem_state: fix missing of_node_put in error path (git-fixes).
* soc: qcom: socinfo: Avoid out of bounds read of serial number (git-fixes).
* sound: usb: enable DSD output for ddHiFi TC44C (stable-fixes).
* sound: usb: format: do not warn that raw DSD is unsupported (stable-fixes).
* spi: zynq-qspi: Add check for clk_enable() (git-fixes).
* srcu: Fix srcu_struct node grpmask overflow on 64-bit systems (git-fixes)
* srcu: Only accelerate on enqueue time (git-fixes)
* stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
* stackdepot: respect __GFP_NOLOCKDEP allocation flag (git-fixes).
* staging: iio: ad9832: Correct phase range check (git-fixes).
* staging: iio: ad9834: Correct phase range check (git-fixes).
* staging: media: imx: fix OF node leak in imx_media_add_of_subdevs() (git-
fixes).
* staging: media: max96712: fix kernel oops when removing module (git-fixes).
* thermal: of: fix OF node leak in of_thermal_zone_find() (git-fixes).
* thunderbolt: Add support for Intel Lunar Lake (stable-fixes).
* thunderbolt: Add support for Intel Panther Lake-M/P (stable-fixes).
* tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
* tools: Sync if_xdp.h uapi tooling header (git-fixes).
* tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259 bsc#1232421).
* tty: serial: 8250: Fix another runtime PM usage counter underflow (git-
fixes).
* tty: xilinx_uartps: split sysrq handling (git-fixes).
* ubifs: skip dumping tnc tree when zroot is null (git-fixes).
* uio: Fix return value of poll (git-fixes).
* uio: uio_dmem_genirq: check the return value of devm_kasprintf() (git-
fixes).
* usb-storage: Add max sectors quirk for Nokia 208 (stable-fixes).
* usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag (stable-fixes).
* usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove()
and in
the error path of .probe() (git-fixes).
* usb: dwc3-am62: Disable autosuspend during remove (git-fixes).
* usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk() (git-fixes).
* usb: dwc3: gadget: fix writing NYET threshold (git-fixes).
* usb: fix reference leak in usb_new_device() (git-fixes).
* usb: gadget: configfs: Ignore trailing LF for user strings to cdev (git-
fixes).
* usb: gadget: f_fs: Remove WARN_ON in functionfs_bind (git-fixes).
* usb: gadget: f_tcm: Decrement command ref count on cleanup (git-fixes).
* usb: gadget: f_tcm: Do not free command immediately (git-fixes).
* usb: gadget: f_tcm: Do not prepare BOT write request twice (git-fixes).
* usb: gadget: f_tcm: Fix Get/SetInterface return value (git-fixes).
* usb: gadget: f_tcm: Translate error to sense (git-fixes).
* usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint (git-fixes).
* usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints (git-fixes).
* usb: gadget: u_serial: Disable ep before setting port to null to fix the
crash caused by port being null (git-fixes).
* usb: host: xhci-plat: Assign shared_hcd->rsrc_start (git-fixes).
* usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control()
(bsc#1235001)
* usb: typec: tcpm/tcpci_maxim: fix error code in
max_contaminant_read_resistance_kohm() (git-fixes).
* usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to PD_T_SENDER_RESPONSE
(git-fixes).
* usbnet: ipheth: break up NCM header size computation (git-fixes).
* usbnet: ipheth: check that DPE points past NCM header (git-fixes).
* usbnet: ipheth: fix DPE OoB read (git-fixes).
* usbnet: ipheth: fix possible overflow in DPE length check (git-fixes).
* usbnet: ipheth: refactor NCM datagram loop (git-fixes).
* usbnet: ipheth: use static NDP16 location in URB (git-fixes).
* vfio/pci: Lock external INTx masking ops (bsc#1222803).
* virtio-mem: check if the config changed before fake offlining memory (git-
fixes).
* virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git-
fixes).
* virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub
Block
Mode (SBM) (git-fixes).
* virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes).
* vmscan,migrate: fix page count imbalance on node stats when demoting pages
(git-fixes).
* vsock/virtio: cancel close work in the destructor (git-fixes)
* vsock: Keep the binding until socket destruction (git-fixes)
* vsock: reset socket state when de-assigning the transport (git-fixes)
* watchdog: rzg2l_wdt: Power on the watchdog domain in the restart handler
(stable-fixes).
* watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset
(stable-fixes).
* watchdog: rzg2l_wdt: Remove reset de-assert from probe (stable-fixes).
* wifi: ath11k: Fix unexpected return buffer manager error for
WCN6750/WCN6855
(git-fixes).
* wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes).
* wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() (stable-
fixes).
* wifi: ath12k: fix tx power, max reg power update to firmware (git-fixes).
* wifi: brcmfmac: add missing header include for brcmf_dbg (git-fixes).
* wifi: cfg80211: adjust allocation of colocated AP data (git-fixes).
* wifi: iwlwifi: fw: read STEP table from correct UEFI var (git-fixes).
* wifi: mac80211: Add non-atomic station iterator (stable-fixes).
* wifi: mac80211: Fix common size calculation for ML element (git-fixes).
* wifi: mac80211: do not flush non-uploaded STAs (git-fixes).
* wifi: mac80211: export ieee80211_purge_tx_queue() for drivers (stable-
fixes).
* wifi: mac80211: fix mbss changed flags corruption on 32 bit systems
(stable-
fixes).
* wifi: mac80211: fix tid removal during mesh forwarding (git-fixes).
* wifi: mac80211: prohibit deactivating all links (git-fixes).
* wifi: mac80211: wake the queues in case of failure in resume
(stable-fixes).
* wifi: mt76: mt76u_vendor_request: Do not print error messages when -EPROTO
(git-fixes).
* wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC (git-fixes).
* wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on MT7916
(git-fixes).
* wifi: mt76: mt7915: firmware restart on devices with a second pcie link
(git-fixes).
* wifi: mt76: mt7915: fix overflows seen when writing limit attributes (git-
fixes).
* wifi: mt76: mt7915: fix register mapping (git-fixes).
* wifi: mt76: mt7921: fix using incorrect group cipher after disconnection
(git-fixes).
* wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (git-fixes).
* wifi: mt76: mt7996: add max mpdu len capability (git-fixes).
* wifi: mt76: mt7996: fix HE Phy capability (git-fixes).
* wifi: mt76: mt7996: fix definition of tx descriptor (git-fixes).
* wifi: mt76: mt7996: fix incorrect indexing of MIB FW event (git-fixes).
* wifi: mt76: mt7996: fix ldpc setting (git-fixes).
* wifi: mt76: mt7996: fix overflows seen when writing limit attributes (git-
fixes).
* wifi: mt76: mt7996: fix register mapping (git-fixes).
* wifi: mt76: mt7996: fix rx filter setting for bfee functionality (git-
fixes).
* wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU (git-
fixes).
* wifi: rtlwifi: destroy workqueue at rtl_deinit_core (git-fixes).
* wifi: rtlwifi: do not complete firmware loading needlessly (git-fixes).
* wifi: rtlwifi: fix init_sw_vars leak when probe fails (git-fixes).
* wifi: rtlwifi: fix memory leaks and invalid access at probe error path
(git-
fixes).
* wifi: rtlwifi: pci: wait for firmware loading before releasing memory (git-
fixes).
* wifi: rtlwifi: remove unused check_buddy_priv (git-fixes).
* wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last step
(git-fixes).
* wifi: rtlwifi: rtl8821ae: Fix media status report (git-fixes).
* wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite loop
(git-fixes).
* wifi: rtlwifi: usb: fix workqueue leak when probe fails (git-fixes).
* wifi: rtlwifi: wait for firmware loading before releasing memory (git-
fixes).
* wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb (stable-fixes).
* wifi: rtw89: mcc: consider time limits not divisible by 1024 (git-fixes).
* wifi: wcn36xx: fix channel survey memory allocation size (git-fixes).
* wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes).
* workqueue: Add rcu lock check at the end of work item execution
(bsc#1236732).
* x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0
(git-fixes).
* xfs: Add error handling for xfs_reflink_cancel_cow_range (git-fixes).
* xfs: Propagate errors from xfs_reflink_cancel_cow_range in
xfs_dax_write_iomap_end (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-557=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-557=1

* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-557=1

## Package List:

* openSUSE Leap 15.6 (x86_64)
* kernel-rt-devel-6.4.0-150600.10.26.1
* reiserfs-kmp-rt-6.4.0-150600.10.26.1
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* dlm-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt-debugsource-6.4.0-150600.10.26.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-devel-6.4.0-150600.10.26.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.26.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.26.1
* kernel-rt-extra-6.4.0-150600.10.26.1
* kernel-rt-livepatch-devel-6.4.0-150600.10.26.1
* kernel-syms-rt-6.4.0-150600.10.26.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.26.1
* cluster-md-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-vdso-6.4.0-150600.10.26.1
* kernel-rt-debuginfo-6.4.0-150600.10.26.1
* gfs2-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-optional-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-vdso-6.4.0-150600.10.26.1
* kselftests-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt-extra-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.26.1
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-optional-6.4.0-150600.10.26.1
* ocfs2-kmp-rt-6.4.0-150600.10.26.1
* openSUSE Leap 15.6 (noarch)
* kernel-source-rt-6.4.0-150600.10.26.1
* kernel-devel-rt-6.4.0-150600.10.26.1
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-6.4.0-150600.10.26.1
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-6_4_0-150600_10_26-rt-debuginfo-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_26-rt-1-150600.1.3.1
* kernel-livepatch-SLE15-SP6-RT_Update_8-debugsource-1-150600.1.3.1
* SUSE Real Time Module 15-SP6 (x86_64)
* kernel-rt-devel-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-debuginfo-6.4.0-150600.10.26.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt-devel-6.4.0-150600.10.26.1
* gfs2-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.26.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* dlm-kmp-rt-6.4.0-150600.10.26.1
* kernel-syms-rt-6.4.0-150600.10.26.1
* kernel-rt-debugsource-6.4.0-150600.10.26.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.26.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.26.1
* cluster-md-kmp-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-devel-6.4.0-150600.10.26.1
* ocfs2-kmp-rt-6.4.0-150600.10.26.1
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-source-rt-6.4.0-150600.10.26.1
* kernel-devel-rt-6.4.0-150600.10.26.1
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.26.1
* kernel-rt_debug-6.4.0-150600.10.26.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52923.html
* https://www.suse.com/security/cve/CVE-2024-36476.html
* https://www.suse.com/security/cve/CVE-2024-39282.html
* https://www.suse.com/security/cve/CVE-2024-43913.html
* https://www.suse.com/security/cve/CVE-2024-45828.html
* https://www.suse.com/security/cve/CVE-2024-46858.html
* https://www.suse.com/security/cve/CVE-2024-46896.html
* https://www.suse.com/security/cve/CVE-2024-47141.html
* https://www.suse.com/security/cve/CVE-2024-47143.html
* https://www.suse.com/security/cve/CVE-2024-47809.html
* https://www.suse.com/security/cve/CVE-2024-48873.html
* https://www.suse.com/security/cve/CVE-2024-48881.html
* https://www.suse.com/security/cve/CVE-2024-49569.html
* https://www.suse.com/security/cve/CVE-2024-49948.html
* https://www.suse.com/security/cve/CVE-2024-49951.html
* https://www.suse.com/security/cve/CVE-2024-49978.html
* https://www.suse.com/security/cve/CVE-2024-49998.html
* https://www.suse.com/security/cve/CVE-2024-50051.html
* https://www.suse.com/security/cve/CVE-2024-50106.html
* https://www.suse.com/security/cve/CVE-2024-50151.html
* https://www.suse.com/security/cve/CVE-2024-50199.html
* https://www.suse.com/security/cve/CVE-2024-50251.html
* https://www.suse.com/security/cve/CVE-2024-50258.html
* https://www.suse.com/security/cve/CVE-2024-50299.html
* https://www.suse.com/security/cve/CVE-2024-50304.html
* https://www.suse.com/security/cve/CVE-2024-52332.html
* https://www.suse.com/security/cve/CVE-2024-53091.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53164.html
* https://www.suse.com/security/cve/CVE-2024-53168.html
* https://www.suse.com/security/cve/CVE-2024-53170.html
* https://www.suse.com/security/cve/CVE-2024-53172.html
* https://www.suse.com/security/cve/CVE-2024-53175.html
* https://www.suse.com/security/cve/CVE-2024-53185.html
* https://www.suse.com/security/cve/CVE-2024-53187.html
* https://www.suse.com/security/cve/CVE-2024-53194.html
* https://www.suse.com/security/cve/CVE-2024-53195.html
* https://www.suse.com/security/cve/CVE-2024-53196.html
* https://www.suse.com/security/cve/CVE-2024-53197.html
* https://www.suse.com/security/cve/CVE-2024-53198.html
* https://www.suse.com/security/cve/CVE-2024-53203.html
* https://www.suse.com/security/cve/CVE-2024-53227.html
* https://www.suse.com/security/cve/CVE-2024-53230.html
* https://www.suse.com/security/cve/CVE-2024-53231.html
* https://www.suse.com/security/cve/CVE-2024-53232.html
* https://www.suse.com/security/cve/CVE-2024-53233.html
* https://www.suse.com/security/cve/CVE-2024-53236.html
* https://www.suse.com/security/cve/CVE-2024-53239.html
* https://www.suse.com/security/cve/CVE-2024-53685.html
* https://www.suse.com/security/cve/CVE-2024-53690.html
* https://www.suse.com/security/cve/CVE-2024-54680.html
* https://www.suse.com/security/cve/CVE-2024-55639.html
* https://www.suse.com/security/cve/CVE-2024-55881.html
* https://www.suse.com/security/cve/CVE-2024-55916.html
* https://www.suse.com/security/cve/CVE-2024-56369.html
* https://www.suse.com/security/cve/CVE-2024-56372.html
* https://www.suse.com/security/cve/CVE-2024-56531.html
* https://www.suse.com/security/cve/CVE-2024-56532.html
* https://www.suse.com/security/cve/CVE-2024-56533.html
* https://www.suse.com/security/cve/CVE-2024-56538.html
* https://www.suse.com/security/cve/CVE-2024-56543.html
* https://www.suse.com/security/cve/CVE-2024-56546.html
* https://www.suse.com/security/cve/CVE-2024-56548.html
* https://www.suse.com/security/cve/CVE-2024-56557.html
* https://www.suse.com/security/cve/CVE-2024-56558.html
* https://www.suse.com/security/cve/CVE-2024-56568.html
* https://www.suse.com/security/cve/CVE-2024-56569.html
* https://www.suse.com/security/cve/CVE-2024-56570.html
* https://www.suse.com/security/cve/CVE-2024-56571.html
* https://www.suse.com/security/cve/CVE-2024-56572.html
* https://www.suse.com/security/cve/CVE-2024-56573.html
* https://www.suse.com/security/cve/CVE-2024-56574.html
* https://www.suse.com/security/cve/CVE-2024-56575.html
* https://www.suse.com/security/cve/CVE-2024-56577.html
* https://www.suse.com/security/cve/CVE-2024-56578.html
* https://www.suse.com/security/cve/CVE-2024-56584.html
* https://www.suse.com/security/cve/CVE-2024-56587.html
* https://www.suse.com/security/cve/CVE-2024-56588.html
* https://www.suse.com/security/cve/CVE-2024-56589.html
* https://www.suse.com/security/cve/CVE-2024-56590.html
* https://www.suse.com/security/cve/CVE-2024-56592.html
* https://www.suse.com/security/cve/CVE-2024-56593.html
* https://www.suse.com/security/cve/CVE-2024-56594.html
* https://www.suse.com/security/cve/CVE-2024-56595.html
* https://www.suse.com/security/cve/CVE-2024-56596.html
* https://www.suse.com/security/cve/CVE-2024-56597.html
* https://www.suse.com/security/cve/CVE-2024-56598.html
* https://www.suse.com/security/cve/CVE-2024-5660.html
* https://www.suse.com/security/cve/CVE-2024-56600.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56602.html
* https://www.suse.com/security/cve/CVE-2024-56603.html
* https://www.suse.com/security/cve/CVE-2024-56606.html
* https://www.suse.com/security/cve/CVE-2024-56607.html
* https://www.suse.com/security/cve/CVE-2024-56608.html
* https://www.suse.com/security/cve/CVE-2024-56609.html
* https://www.suse.com/security/cve/CVE-2024-56610.html
* https://www.suse.com/security/cve/CVE-2024-56611.html
* https://www.suse.com/security/cve/CVE-2024-56614.html
* https://www.suse.com/security/cve/CVE-2024-56615.html
* https://www.suse.com/security/cve/CVE-2024-56616.html
* https://www.suse.com/security/cve/CVE-2024-56617.html
* https://www.suse.com/security/cve/CVE-2024-56619.html
* https://www.suse.com/security/cve/CVE-2024-56620.html
* https://www.suse.com/security/cve/CVE-2024-56622.html
* https://www.suse.com/security/cve/CVE-2024-56623.html
* https://www.suse.com/security/cve/CVE-2024-56625.html
* https://www.suse.com/security/cve/CVE-2024-56629.html
* https://www.suse.com/security/cve/CVE-2024-56630.html
* https://www.suse.com/security/cve/CVE-2024-56631.html
* https://www.suse.com/security/cve/CVE-2024-56632.html
* https://www.suse.com/security/cve/CVE-2024-56634.html
* https://www.suse.com/security/cve/CVE-2024-56635.html
* https://www.suse.com/security/cve/CVE-2024-56636.html
* https://www.suse.com/security/cve/CVE-2024-56637.html
* https://www.suse.com/security/cve/CVE-2024-56641.html
* https://www.suse.com/security/cve/CVE-2024-56642.html
* https://www.suse.com/security/cve/CVE-2024-56643.html
* https://www.suse.com/security/cve/CVE-2024-56644.html
* https://www.suse.com/security/cve/CVE-2024-56648.html
* https://www.suse.com/security/cve/CVE-2024-56649.html
* https://www.suse.com/security/cve/CVE-2024-56650.html
* https://www.suse.com/security/cve/CVE-2024-56651.html
* https://www.suse.com/security/cve/CVE-2024-56654.html
* https://www.suse.com/security/cve/CVE-2024-56656.html
* https://www.suse.com/security/cve/CVE-2024-56658.html
* https://www.suse.com/security/cve/CVE-2024-56659.html
* https://www.suse.com/security/cve/CVE-2024-56660.html
* https://www.suse.com/security/cve/CVE-2024-56661.html
* https://www.suse.com/security/cve/CVE-2024-56662.html
* https://www.suse.com/security/cve/CVE-2024-56663.html
* https://www.suse.com/security/cve/CVE-2024-56664.html
* https://www.suse.com/security/cve/CVE-2024-56665.html
* https://www.suse.com/security/cve/CVE-2024-56670.html
* https://www.suse.com/security/cve/CVE-2024-56672.html
* https://www.suse.com/security/cve/CVE-2024-56675.html
* https://www.suse.com/security/cve/CVE-2024-56677.html
* https://www.suse.com/security/cve/CVE-2024-56678.html
* https://www.suse.com/security/cve/CVE-2024-56679.html
* https://www.suse.com/security/cve/CVE-2024-56681.html
* https://www.suse.com/security/cve/CVE-2024-56683.html
* https://www.suse.com/security/cve/CVE-2024-56687.html
* https://www.suse.com/security/cve/CVE-2024-56688.html
* https://www.suse.com/security/cve/CVE-2024-56690.html
* https://www.suse.com/security/cve/CVE-2024-56691.html
* https://www.suse.com/security/cve/CVE-2024-56693.html
* https://www.suse.com/security/cve/CVE-2024-56694.html
* https://www.suse.com/security/cve/CVE-2024-56698.html
* https://www.suse.com/security/cve/CVE-2024-56700.html
* https://www.suse.com/security/cve/CVE-2024-56701.html
* https://www.suse.com/security/cve/CVE-2024-56704.html
* https://www.suse.com/security/cve/CVE-2024-56705.html
* https://www.suse.com/security/cve/CVE-2024-56707.html
* https://www.suse.com/security/cve/CVE-2024-56708.html
* https://www.suse.com/security/cve/CVE-2024-56709.html
* https://www.suse.com/security/cve/CVE-2024-56712.html
* https://www.suse.com/security/cve/CVE-2024-56715.html
* https://www.suse.com/security/cve/CVE-2024-56716.html
* https://www.suse.com/security/cve/CVE-2024-56722.html
* https://www.suse.com/security/cve/CVE-2024-56723.html
* https://www.suse.com/security/cve/CVE-2024-56724.html
* https://www.suse.com/security/cve/CVE-2024-56725.html
* https://www.suse.com/security/cve/CVE-2024-56726.html
* https://www.suse.com/security/cve/CVE-2024-56727.html
* https://www.suse.com/security/cve/CVE-2024-56728.html
* https://www.suse.com/security/cve/CVE-2024-56729.html
* https://www.suse.com/security/cve/CVE-2024-56739.html
* https://www.suse.com/security/cve/CVE-2024-56741.html
* https://www.suse.com/security/cve/CVE-2024-56745.html
* https://www.suse.com/security/cve/CVE-2024-56746.html
* https://www.suse.com/security/cve/CVE-2024-56747.html
* https://www.suse.com/security/cve/CVE-2024-56748.html
* https://www.suse.com/security/cve/CVE-2024-56759.html
* https://www.suse.com/security/cve/CVE-2024-56760.html
* https://www.suse.com/security/cve/CVE-2024-56763.html
* https://www.suse.com/security/cve/CVE-2024-56765.html
* https://www.suse.com/security/cve/CVE-2024-56766.html
* https://www.suse.com/security/cve/CVE-2024-56767.html
* https://www.suse.com/security/cve/CVE-2024-56769.html
* https://www.suse.com/security/cve/CVE-2024-56774.html
* https://www.suse.com/security/cve/CVE-2024-56775.html
* https://www.suse.com/security/cve/CVE-2024-56776.html
* https://www.suse.com/security/cve/CVE-2024-56777.html
* https://www.suse.com/security/cve/CVE-2024-56778.html
* https://www.suse.com/security/cve/CVE-2024-56779.html
* https://www.suse.com/security/cve/CVE-2024-56780.html
* https://www.suse.com/security/cve/CVE-2024-56787.html
* https://www.suse.com/security/cve/CVE-2024-57791.html
* https://www.suse.com/security/cve/CVE-2024-57792.html
* https://www.suse.com/security/cve/CVE-2024-57793.html
* https://www.suse.com/security/cve/CVE-2024-57795.html
* https://www.suse.com/security/cve/CVE-2024-57798.html
* https://www.suse.com/security/cve/CVE-2024-57801.html
* https://www.suse.com/security/cve/CVE-2024-57802.html
* https://www.suse.com/security/cve/CVE-2024-57804.html
* https://www.suse.com/security/cve/CVE-2024-57809.html
* https://www.suse.com/security/cve/CVE-2024-57838.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-57850.html
* https://www.suse.com/security/cve/CVE-2024-57857.html
* https://www.suse.com/security/cve/CVE-2024-57874.html
* https://www.suse.com/security/cve/CVE-2024-57876.html
* https://www.suse.com/security/cve/CVE-2024-57882.html
* https://www.suse.com/security/cve/CVE-2024-57884.html
* https://www.suse.com/security/cve/CVE-2024-57887.html
* https://www.suse.com/security/cve/CVE-2024-57888.html
* https://www.suse.com/security/cve/CVE-2024-57890.html
* https://www.suse.com/security/cve/CVE-2024-57892.html
* https://www.suse.com/security/cve/CVE-2024-57893.html
* https://www.suse.com/security/cve/CVE-2024-57896.html
* https://www.suse.com/security/cve/CVE-2024-57897.html
* https://www.suse.com/security/cve/CVE-2024-57899.html
* https://www.suse.com/security/cve/CVE-2024-57903.html
* https://www.suse.com/security/cve/CVE-2024-57904.html
* https://www.suse.com/security/cve/CVE-2024-57906.html
* https://www.suse.com/security/cve/CVE-2024-57907.html
* https://www.suse.com/security/cve/CVE-2024-57908.html
* https://www.suse.com/security/cve/CVE-2024-57910.html
* https://www.suse.com/security/cve/CVE-2024-57911.html
* https://www.suse.com/security/cve/CVE-2024-57912.html
* https://www.suse.com/security/cve/CVE-2024-57913.html
* https://www.suse.com/security/cve/CVE-2024-57915.html
* https://www.suse.com/security/cve/CVE-2024-57916.html
* https://www.suse.com/security/cve/CVE-2024-57917.html
* https://www.suse.com/security/cve/CVE-2024-57922.html
* https://www.suse.com/security/cve/CVE-2024-57926.html
* https://www.suse.com/security/cve/CVE-2024-57929.html
* https://www.suse.com/security/cve/CVE-2024-57931.html
* https://www.suse.com/security/cve/CVE-2024-57932.html
* https://www.suse.com/security/cve/CVE-2024-57933.html
* https://www.suse.com/security/cve/CVE-2024-57935.html
* https://www.suse.com/security/cve/CVE-2024-57936.html
* https://www.suse.com/security/cve/CVE-2024-57938.html
* https://www.suse.com/security/cve/CVE-2024-57940.html
* https://www.suse.com/security/cve/CVE-2024-57946.html
* https://www.suse.com/security/cve/CVE-2025-21632.html
* https://www.suse.com/security/cve/CVE-2025-21645.html
* https://www.suse.com/security/cve/CVE-2025-21646.html
* https://www.suse.com/security/cve/CVE-2025-21649.html
* https://www.suse.com/security/cve/CVE-2025-21650.html
* https://www.suse.com/security/cve/CVE-2025-21651.html
* https://www.suse.com/security/cve/CVE-2025-21652.html
* https://www.suse.com/security/cve/CVE-2025-21653.html
* https://www.suse.com/security/cve/CVE-2025-21655.html
* https://www.suse.com/security/cve/CVE-2025-21656.html
* https://www.suse.com/security/cve/CVE-2025-21662.html
* https://www.suse.com/security/cve/CVE-2025-21663.html
* https://www.suse.com/security/cve/CVE-2025-21664.html
* https://www.suse.com/security/cve/CVE-2025-21666.html
* https://www.suse.com/security/cve/CVE-2025-21669.html
* https://www.suse.com/security/cve/CVE-2025-21670.html
* https://www.suse.com/security/cve/CVE-2025-21674.html
* https://www.suse.com/security/cve/CVE-2025-21675.html
* https://www.suse.com/security/cve/CVE-2025-21676.html
* https://www.suse.com/security/cve/CVE-2025-21678.html
* https://www.suse.com/security/cve/CVE-2025-21682.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1216813
* https://bugzilla.suse.com/show_bug.cgi?id=1218470
* https://bugzilla.suse.com/show_bug.cgi?id=1220711
* https://bugzilla.suse.com/show_bug.cgi?id=1222803
* https://bugzilla.suse.com/show_bug.cgi?id=1224049
* https://bugzilla.suse.com/show_bug.cgi?id=1225897
* https://bugzilla.suse.com/show_bug.cgi?id=1226980
* https://bugzilla.suse.com/show_bug.cgi?id=1228592
* https://bugzilla.suse.com/show_bug.cgi?id=1229833
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
* https://bugzilla.suse.com/show_bug.cgi?id=1231088
* https://bugzilla.suse.com/show_bug.cgi?id=1232087
* https://bugzilla.suse.com/show_bug.cgi?id=1232101
* https://bugzilla.suse.com/show_bug.cgi?id=1232158
* https://bugzilla.suse.com/show_bug.cgi?id=1232161
* https://bugzilla.suse.com/show_bug.cgi?id=1232421
* https://bugzilla.suse.com/show_bug.cgi?id=1232882
* https://bugzilla.suse.com/show_bug.cgi?id=1233055
* https://bugzilla.suse.com/show_bug.cgi?id=1233112
* https://bugzilla.suse.com/show_bug.cgi?id=1233221
* https://bugzilla.suse.com/show_bug.cgi?id=1233248
* https://bugzilla.suse.com/show_bug.cgi?id=1233259
* https://bugzilla.suse.com/show_bug.cgi?id=1233260
* https://bugzilla.suse.com/show_bug.cgi?id=1233488
* https://bugzilla.suse.com/show_bug.cgi?id=1233522
* https://bugzilla.suse.com/show_bug.cgi?id=1233638
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233778
* https://bugzilla.suse.com/show_bug.cgi?id=1234195
* https://bugzilla.suse.com/show_bug.cgi?id=1234619
* https://bugzilla.suse.com/show_bug.cgi?id=1234635
* https://bugzilla.suse.com/show_bug.cgi?id=1234683
* https://bugzilla.suse.com/show_bug.cgi?id=1234693
* https://bugzilla.suse.com/show_bug.cgi?id=1234726
* https://bugzilla.suse.com/show_bug.cgi?id=1234825
* https://bugzilla.suse.com/show_bug.cgi?id=1234863
* https://bugzilla.suse.com/show_bug.cgi?id=1234887
* https://bugzilla.suse.com/show_bug.cgi?id=1234888
* https://bugzilla.suse.com/show_bug.cgi?id=1234893
* https://bugzilla.suse.com/show_bug.cgi?id=1234898
* https://bugzilla.suse.com/show_bug.cgi?id=1234901
* https://bugzilla.suse.com/show_bug.cgi?id=1234906
* https://bugzilla.suse.com/show_bug.cgi?id=1234923
* https://bugzilla.suse.com/show_bug.cgi?id=1234931
* https://bugzilla.suse.com/show_bug.cgi?id=1234934
* https://bugzilla.suse.com/show_bug.cgi?id=1234947
* https://bugzilla.suse.com/show_bug.cgi?id=1234957
* https://bugzilla.suse.com/show_bug.cgi?id=1235000
* https://bugzilla.suse.com/show_bug.cgi?id=1235001
* https://bugzilla.suse.com/show_bug.cgi?id=1235011
* https://bugzilla.suse.com/show_bug.cgi?id=1235031
* https://bugzilla.suse.com/show_bug.cgi?id=1235032
* https://bugzilla.suse.com/show_bug.cgi?id=1235035
* https://bugzilla.suse.com/show_bug.cgi?id=1235037
* https://bugzilla.suse.com/show_bug.cgi?id=1235038
* https://bugzilla.suse.com/show_bug.cgi?id=1235039
* https://bugzilla.suse.com/show_bug.cgi?id=1235040
* https://bugzilla.suse.com/show_bug.cgi?id=1235042
* https://bugzilla.suse.com/show_bug.cgi?id=1235043
* https://bugzilla.suse.com/show_bug.cgi?id=1235046
* https://bugzilla.suse.com/show_bug.cgi?id=1235050
* https://bugzilla.suse.com/show_bug.cgi?id=1235051
* https://bugzilla.suse.com/show_bug.cgi?id=1235053
* https://bugzilla.suse.com/show_bug.cgi?id=1235054
* https://bugzilla.suse.com/show_bug.cgi?id=1235057
* https://bugzilla.suse.com/show_bug.cgi?id=1235059
* https://bugzilla.suse.com/show_bug.cgi?id=1235065
* https://bugzilla.suse.com/show_bug.cgi?id=1235070
* https://bugzilla.suse.com/show_bug.cgi?id=1235073
* https://bugzilla.suse.com/show_bug.cgi?id=1235100
* https://bugzilla.suse.com/show_bug.cgi?id=1235112
* https://bugzilla.suse.com/show_bug.cgi?id=1235115
* https://bugzilla.suse.com/show_bug.cgi?id=1235117
* https://bugzilla.suse.com/show_bug.cgi?id=1235122
* https://bugzilla.suse.com/show_bug.cgi?id=1235123
* https://bugzilla.suse.com/show_bug.cgi?id=1235125
* https://bugzilla.suse.com/show_bug.cgi?id=1235132
* https://bugzilla.suse.com/show_bug.cgi?id=1235133
* https://bugzilla.suse.com/show_bug.cgi?id=1235155
* https://bugzilla.suse.com/show_bug.cgi?id=1235160
* https://bugzilla.suse.com/show_bug.cgi?id=1235217
* https://bugzilla.suse.com/show_bug.cgi?id=1235219
* https://bugzilla.suse.com/show_bug.cgi?id=1235220
* https://bugzilla.suse.com/show_bug.cgi?id=1235222
* https://bugzilla.suse.com/show_bug.cgi?id=1235223
* https://bugzilla.suse.com/show_bug.cgi?id=1235224
* https://bugzilla.suse.com/show_bug.cgi?id=1235227
* https://bugzilla.suse.com/show_bug.cgi?id=1235230
* https://bugzilla.suse.com/show_bug.cgi?id=1235241
* https://bugzilla.suse.com/show_bug.cgi?id=1235244
* https://bugzilla.suse.com/show_bug.cgi?id=1235249
* https://bugzilla.suse.com/show_bug.cgi?id=1235251
* https://bugzilla.suse.com/show_bug.cgi?id=1235252
* https://bugzilla.suse.com/show_bug.cgi?id=1235389
* https://bugzilla.suse.com/show_bug.cgi?id=1235390
* https://bugzilla.suse.com/show_bug.cgi?id=1235391
* https://bugzilla.suse.com/show_bug.cgi?id=1235406
* https://bugzilla.suse.com/show_bug.cgi?id=1235410
* https://bugzilla.suse.com/show_bug.cgi?id=1235412
* https://bugzilla.suse.com/show_bug.cgi?id=1235413
* https://bugzilla.suse.com/show_bug.cgi?id=1235415
* https://bugzilla.suse.com/show_bug.cgi?id=1235416
* https://bugzilla.suse.com/show_bug.cgi?id=1235417
* https://bugzilla.suse.com/show_bug.cgi?id=1235418
* https://bugzilla.suse.com/show_bug.cgi?id=1235423
* https://bugzilla.suse.com/show_bug.cgi?id=1235424
* https://bugzilla.suse.com/show_bug.cgi?id=1235425
* https://bugzilla.suse.com/show_bug.cgi?id=1235426
* https://bugzilla.suse.com/show_bug.cgi?id=1235427
* https://bugzilla.suse.com/show_bug.cgi?id=1235428
* https://bugzilla.suse.com/show_bug.cgi?id=1235429
* https://bugzilla.suse.com/show_bug.cgi?id=1235430
* https://bugzilla.suse.com/show_bug.cgi?id=1235433
* https://bugzilla.suse.com/show_bug.cgi?id=1235437
* https://bugzilla.suse.com/show_bug.cgi?id=1235439
* https://bugzilla.suse.com/show_bug.cgi?id=1235441
* https://bugzilla.suse.com/show_bug.cgi?id=1235444
* https://bugzilla.suse.com/show_bug.cgi?id=1235445
* https://bugzilla.suse.com/show_bug.cgi?id=1235449
* https://bugzilla.suse.com/show_bug.cgi?id=1235451
* https://bugzilla.suse.com/show_bug.cgi?id=1235454
* https://bugzilla.suse.com/show_bug.cgi?id=1235458
* https://bugzilla.suse.com/show_bug.cgi?id=1235459
* https://bugzilla.suse.com/show_bug.cgi?id=1235464
* https://bugzilla.suse.com/show_bug.cgi?id=1235466
* https://bugzilla.suse.com/show_bug.cgi?id=1235473
* https://bugzilla.suse.com/show_bug.cgi?id=1235479
* https://bugzilla.suse.com/show_bug.cgi?id=1235480
* https://bugzilla.suse.com/show_bug.cgi?id=1235483
* https://bugzilla.suse.com/show_bug.cgi?id=1235486
* https://bugzilla.suse.com/show_bug.cgi?id=1235487
* https://bugzilla.suse.com/show_bug.cgi?id=1235488
* https://bugzilla.suse.com/show_bug.cgi?id=1235489
* https://bugzilla.suse.com/show_bug.cgi?id=1235491
* https://bugzilla.suse.com/show_bug.cgi?id=1235494
* https://bugzilla.suse.com/show_bug.cgi?id=1235495
* https://bugzilla.suse.com/show_bug.cgi?id=1235496
* https://bugzilla.suse.com/show_bug.cgi?id=1235497
* https://bugzilla.suse.com/show_bug.cgi?id=1235498
* https://bugzilla.suse.com/show_bug.cgi?id=1235500
* https://bugzilla.suse.com/show_bug.cgi?id=1235502
* https://bugzilla.suse.com/show_bug.cgi?id=1235503
* https://bugzilla.suse.com/show_bug.cgi?id=1235519
* https://bugzilla.suse.com/show_bug.cgi?id=1235520
* https://bugzilla.suse.com/show_bug.cgi?id=1235521
* https://bugzilla.suse.com/show_bug.cgi?id=1235523
* https://bugzilla.suse.com/show_bug.cgi?id=1235526
* https://bugzilla.suse.com/show_bug.cgi?id=1235528
* https://bugzilla.suse.com/show_bug.cgi?id=1235532
* https://bugzilla.suse.com/show_bug.cgi?id=1235533
* https://bugzilla.suse.com/show_bug.cgi?id=1235534
* https://bugzilla.suse.com/show_bug.cgi?id=1235537
* https://bugzilla.suse.com/show_bug.cgi?id=1235538
* https://bugzilla.suse.com/show_bug.cgi?id=1235545
* https://bugzilla.suse.com/show_bug.cgi?id=1235552
* https://bugzilla.suse.com/show_bug.cgi?id=1235555
* https://bugzilla.suse.com/show_bug.cgi?id=1235557
* https://bugzilla.suse.com/show_bug.cgi?id=1235563
* https://bugzilla.suse.com/show_bug.cgi?id=1235564
* https://bugzilla.suse.com/show_bug.cgi?id=1235565
* https://bugzilla.suse.com/show_bug.cgi?id=1235568
* https://bugzilla.suse.com/show_bug.cgi?id=1235570
* https://bugzilla.suse.com/show_bug.cgi?id=1235571
* https://bugzilla.suse.com/show_bug.cgi?id=1235577
* https://bugzilla.suse.com/show_bug.cgi?id=1235578
* https://bugzilla.suse.com/show_bug.cgi?id=1235582
* https://bugzilla.suse.com/show_bug.cgi?id=1235583
* https://bugzilla.suse.com/show_bug.cgi?id=1235584
* https://bugzilla.suse.com/show_bug.cgi?id=1235587
* https://bugzilla.suse.com/show_bug.cgi?id=1235611
* https://bugzilla.suse.com/show_bug.cgi?id=1235612
* https://bugzilla.suse.com/show_bug.cgi?id=1235616
* https://bugzilla.suse.com/show_bug.cgi?id=1235622
* https://bugzilla.suse.com/show_bug.cgi?id=1235627
* https://bugzilla.suse.com/show_bug.cgi?id=1235632
* https://bugzilla.suse.com/show_bug.cgi?id=1235635
* https://bugzilla.suse.com/show_bug.cgi?id=1235638
* https://bugzilla.suse.com/show_bug.cgi?id=1235641
* https://bugzilla.suse.com/show_bug.cgi?id=1235643
* https://bugzilla.suse.com/show_bug.cgi?id=1235645
* https://bugzilla.suse.com/show_bug.cgi?id=1235646
* https://bugzilla.suse.com/show_bug.cgi?id=1235647
* https://bugzilla.suse.com/show_bug.cgi?id=1235650
* https://bugzilla.suse.com/show_bug.cgi?id=1235653
* https://bugzilla.suse.com/show_bug.cgi?id=1235656
* https://bugzilla.suse.com/show_bug.cgi?id=1235657
* https://bugzilla.suse.com/show_bug.cgi?id=1235663
* https://bugzilla.suse.com/show_bug.cgi?id=1235686
* https://bugzilla.suse.com/show_bug.cgi?id=1235700
* https://bugzilla.suse.com/show_bug.cgi?id=1235705
* https://bugzilla.suse.com/show_bug.cgi?id=1235707
* https://bugzilla.suse.com/show_bug.cgi?id=1235708
* https://bugzilla.suse.com/show_bug.cgi?id=1235710
* https://bugzilla.suse.com/show_bug.cgi?id=1235714
* https://bugzilla.suse.com/show_bug.cgi?id=1235716
* https://bugzilla.suse.com/show_bug.cgi?id=1235720
* https://bugzilla.suse.com/show_bug.cgi?id=1235723
* https://bugzilla.suse.com/show_bug.cgi?id=1235727
* https://bugzilla.suse.com/show_bug.cgi?id=1235730
* https://bugzilla.suse.com/show_bug.cgi?id=1235737
* https://bugzilla.suse.com/show_bug.cgi?id=1235739
* https://bugzilla.suse.com/show_bug.cgi?id=1235745
* https://bugzilla.suse.com/show_bug.cgi?id=1235747
* https://bugzilla.suse.com/show_bug.cgi?id=1235750
* https://bugzilla.suse.com/show_bug.cgi?id=1235753
* https://bugzilla.suse.com/show_bug.cgi?id=1235759
* https://bugzilla.suse.com/show_bug.cgi?id=1235764
* https://bugzilla.suse.com/show_bug.cgi?id=1235768
* https://bugzilla.suse.com/show_bug.cgi?id=1235776
* https://bugzilla.suse.com/show_bug.cgi?id=1235777
* https://bugzilla.suse.com/show_bug.cgi?id=1235778
* https://bugzilla.suse.com/show_bug.cgi?id=1235779
* https://bugzilla.suse.com/show_bug.cgi?id=1235793
* https://bugzilla.suse.com/show_bug.cgi?id=1235798
* https://bugzilla.suse.com/show_bug.cgi?id=1235806
* https://bugzilla.suse.com/show_bug.cgi?id=1235808
* https://bugzilla.suse.com/show_bug.cgi?id=1235812
* https://bugzilla.suse.com/show_bug.cgi?id=1235814
* https://bugzilla.suse.com/show_bug.cgi?id=1235818
* https://bugzilla.suse.com/show_bug.cgi?id=1235842
* https://bugzilla.suse.com/show_bug.cgi?id=1235865
* https://bugzilla.suse.com/show_bug.cgi?id=1235874
* https://bugzilla.suse.com/show_bug.cgi?id=1235894
* https://bugzilla.suse.com/show_bug.cgi?id=1235902
* https://bugzilla.suse.com/show_bug.cgi?id=1235903
* https://bugzilla.suse.com/show_bug.cgi?id=1235906
* https://bugzilla.suse.com/show_bug.cgi?id=1235914
* https://bugzilla.suse.com/show_bug.cgi?id=1235918
* https://bugzilla.suse.com/show_bug.cgi?id=1235919
* https://bugzilla.suse.com/show_bug.cgi?id=1235920
* https://bugzilla.suse.com/show_bug.cgi?id=1235924
* https://bugzilla.suse.com/show_bug.cgi?id=1235940
* https://bugzilla.suse.com/show_bug.cgi?id=1235941
* https://bugzilla.suse.com/show_bug.cgi?id=1235946
* https://bugzilla.suse.com/show_bug.cgi?id=1235948
* https://bugzilla.suse.com/show_bug.cgi?id=1235952
* https://bugzilla.suse.com/show_bug.cgi?id=1235964
* https://bugzilla.suse.com/show_bug.cgi?id=1235965
* https://bugzilla.suse.com/show_bug.cgi?id=1235967
* https://bugzilla.suse.com/show_bug.cgi?id=1235969
* https://bugzilla.suse.com/show_bug.cgi?id=1235976
* https://bugzilla.suse.com/show_bug.cgi?id=1235977
* https://bugzilla.suse.com/show_bug.cgi?id=1236078
* https://bugzilla.suse.com/show_bug.cgi?id=1236080
* https://bugzilla.suse.com/show_bug.cgi?id=1236082
* https://bugzilla.suse.com/show_bug.cgi?id=1236088
* https://bugzilla.suse.com/show_bug.cgi?id=1236090
* https://bugzilla.suse.com/show_bug.cgi?id=1236091
* https://bugzilla.suse.com/show_bug.cgi?id=1236096
* https://bugzilla.suse.com/show_bug.cgi?id=1236097
* https://bugzilla.suse.com/show_bug.cgi?id=1236098
* https://bugzilla.suse.com/show_bug.cgi?id=1236101
* https://bugzilla.suse.com/show_bug.cgi?id=1236102
* https://bugzilla.suse.com/show_bug.cgi?id=1236104
* https://bugzilla.suse.com/show_bug.cgi?id=1236106
* https://bugzilla.suse.com/show_bug.cgi?id=1236120
* https://bugzilla.suse.com/show_bug.cgi?id=1236125
* https://bugzilla.suse.com/show_bug.cgi?id=1236127
* https://bugzilla.suse.com/show_bug.cgi?id=1236131
* https://bugzilla.suse.com/show_bug.cgi?id=1236138
* https://bugzilla.suse.com/show_bug.cgi?id=1236143
* https://bugzilla.suse.com/show_bug.cgi?id=1236144
* https://bugzilla.suse.com/show_bug.cgi?id=1236145
* https://bugzilla.suse.com/show_bug.cgi?id=1236160
* https://bugzilla.suse.com/show_bug.cgi?id=1236161
* https://bugzilla.suse.com/show_bug.cgi?id=1236163
* https://bugzilla.suse.com/show_bug.cgi?id=1236168
* https://bugzilla.suse.com/show_bug.cgi?id=1236178
* https://bugzilla.suse.com/show_bug.cgi?id=1236180
* https://bugzilla.suse.com/show_bug.cgi?id=1236181
* https://bugzilla.suse.com/show_bug.cgi?id=1236182
* https://bugzilla.suse.com/show_bug.cgi?id=1236190
* https://bugzilla.suse.com/show_bug.cgi?id=1236192
* https://bugzilla.suse.com/show_bug.cgi?id=1236198
* https://bugzilla.suse.com/show_bug.cgi?id=1236227
* https://bugzilla.suse.com/show_bug.cgi?id=1236245
* https://bugzilla.suse.com/show_bug.cgi?id=1236247
* https://bugzilla.suse.com/show_bug.cgi?id=1236248
* https://bugzilla.suse.com/show_bug.cgi?id=1236260
* https://bugzilla.suse.com/show_bug.cgi?id=1236262
* https://bugzilla.suse.com/show_bug.cgi?id=1236628
* https://bugzilla.suse.com/show_bug.cgi?id=1236680
* https://bugzilla.suse.com/show_bug.cgi?id=1236683
* https://bugzilla.suse.com/show_bug.cgi?id=1236685
* https://bugzilla.suse.com/show_bug.cgi?id=1236688
* https://bugzilla.suse.com/show_bug.cgi?id=1236694
* https://bugzilla.suse.com/show_bug.cgi?id=1236696
* https://bugzilla.suse.com/show_bug.cgi?id=1236698
* https://bugzilla.suse.com/show_bug.cgi?id=1236703
* https://bugzilla.suse.com/show_bug.cgi?id=1236732
* https://bugzilla.suse.com/show_bug.cgi?id=1236733
* https://bugzilla.suse.com/show_bug.cgi?id=1236757
* https://bugzilla.suse.com/show_bug.cgi?id=1236758
* https://bugzilla.suse.com/show_bug.cgi?id=1236760
* https://bugzilla.suse.com/show_bug.cgi?id=1236761
* https://jira.suse.com/browse/PED-7242


--===============4099292061028594122==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:0557-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-02-14T15:26:54Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">bsc#1194869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216813">bsc#1216813</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218470">bsc#1218470</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220711">bsc#1220711</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222803">bsc#1222803</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224049">bsc#1224049</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225897">bsc#1225897</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226980">bsc#1226980</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228592">bsc#1228592</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229833">bsc#1229833</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231016">bsc#1231016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231088">bsc#1231088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232087">bsc#1232087</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232101">bsc#1232101</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232158">bsc#1232158</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232161">bsc#1232161</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232421">bsc#1232421</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232882">bsc#1232882</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233055">bsc#1233055</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233112">bsc#1233112</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233221">bsc#1233221</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233248">bsc#1233248</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233259">bsc#1233259</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233260">bsc#1233260</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233488">bsc#1233488</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233522">bsc#1233522</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233638">bsc#1233638</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233642">bsc#1233642</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233778">bsc#1233778</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234195">bsc#1234195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234619">bsc#1234619</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234635">bsc#1234635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234683">bsc#1234683</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234693">bsc#1234693</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234726">bsc#1234726</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234825">bsc#1234825</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234863">bsc#1234863</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234887">bsc#1234887</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234888">bsc#1234888</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234893">bsc#1234893</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234898">bsc#1234898</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234901">bsc#1234901</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234906">bsc#1234906</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234923">bsc#1234923</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234931">bsc#1234931</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234934">bsc#1234934</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234947">bsc#1234947</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234957">bsc#1234957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235000">bsc#1235000</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235001">bsc#1235001</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235011">bsc#1235011</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235031">bsc#1235031</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235032">bsc#1235032</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235035">bsc#1235035</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235037">bsc#1235037</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235038">bsc#1235038</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235039">bsc#1235039</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235040">bsc#1235040</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235042">bsc#1235042</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235043">bsc#1235043</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235046">bsc#1235046</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235050">bsc#1235050</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235051">bsc#1235051</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235053">bsc#1235053</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">bsc#1235054</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235057">bsc#1235057</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235059">bsc#1235059</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235065">bsc#1235065</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235070">bsc#1235070</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">bsc#1235073</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235100">bsc#1235100</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235112">bsc#1235112</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235115">bsc#1235115</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235117">bsc#1235117</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235122">bsc#1235122</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235123">bsc#1235123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235125">bsc#1235125</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235132">bsc#1235132</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235133">bsc#1235133</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235155">bsc#1235155</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235160">bsc#1235160</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235217">bsc#1235217</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235219">bsc#1235219</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235220">bsc#1235220</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235222">bsc#1235222</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235223">bsc#1235223</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235224">bsc#1235224</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235227">bsc#1235227</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235230">bsc#1235230</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235241">bsc#1235241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235244">bsc#1235244</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235249">bsc#1235249</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235251">bsc#1235251</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235252">bsc#1235252</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235389">bsc#1235389</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235390">bsc#1235390</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235391">bsc#1235391</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235406">bsc#1235406</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235410">bsc#1235410</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235412">bsc#1235412</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235413">bsc#1235413</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235415">bsc#1235415</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235416">bsc#1235416</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235417">bsc#1235417</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235418">bsc#1235418</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235423">bsc#1235423</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235424">bsc#1235424</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235425">bsc#1235425</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235426">bsc#1235426</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235427">bsc#1235427</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235428">bsc#1235428</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235429">bsc#1235429</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235430">bsc#1235430</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235433">bsc#1235433</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235437">bsc#1235437</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235439">bsc#1235439</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235441">bsc#1235441</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235444">bsc#1235444</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235445">bsc#1235445</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235449">bsc#1235449</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235451">bsc#1235451</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235454">bsc#1235454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235458">bsc#1235458</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235459">bsc#1235459</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235464">bsc#1235464</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235466">bsc#1235466</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235473">bsc#1235473</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235479">bsc#1235479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235480">bsc#1235480</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235483">bsc#1235483</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235486">bsc#1235486</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235487">bsc#1235487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235488">bsc#1235488</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235489">bsc#1235489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235491">bsc#1235491</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235494">bsc#1235494</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235495">bsc#1235495</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235496">bsc#1235496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235497">bsc#1235497</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235498">bsc#1235498</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235500">bsc#1235500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235502">bsc#1235502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235503">bsc#1235503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235519">bsc#1235519</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235520">bsc#1235520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235521">bsc#1235521</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235523">bsc#1235523</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235526">bsc#1235526</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235528">bsc#1235528</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235532">bsc#1235532</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235533">bsc#1235533</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235534">bsc#1235534</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235537">bsc#1235537</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235538">bsc#1235538</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235545">bsc#1235545</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235552">bsc#1235552</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235555">bsc#1235555</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235557">bsc#1235557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235563">bsc#1235563</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235564">bsc#1235564</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235565">bsc#1235565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235568">bsc#1235568</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235570">bsc#1235570</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235571">bsc#1235571</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235577">bsc#1235577</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235578">bsc#1235578</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235582">bsc#1235582</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235583">bsc#1235583</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235584">bsc#1235584</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235587">bsc#1235587</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235611">bsc#1235611</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235612">bsc#1235612</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235616">bsc#1235616</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235622">bsc#1235622</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235627">bsc#1235627</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235632">bsc#1235632</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235635">bsc#1235635</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235638">bsc#1235638</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235641">bsc#1235641</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235643">bsc#1235643</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235645">bsc#1235645</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235646">bsc#1235646</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235647">bsc#1235647</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235650">bsc#1235650</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235653">bsc#1235653</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235656">bsc#1235656</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235657">bsc#1235657</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235663">bsc#1235663</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235686">bsc#1235686</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235700">bsc#1235700</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235705">bsc#1235705</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235707">bsc#1235707</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235708">bsc#1235708</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235710">bsc#1235710</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235714">bsc#1235714</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235716">bsc#1235716</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235720">bsc#1235720</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235723">bsc#1235723</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235727">bsc#1235727</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235730">bsc#1235730</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235737">bsc#1235737</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235739">bsc#1235739</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235745">bsc#1235745</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235747">bsc#1235747</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235750">bsc#1235750</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235753">bsc#1235753</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235759">bsc#1235759</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235764">bsc#1235764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235768">bsc#1235768</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235776">bsc#1235776</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235777">bsc#1235777</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235778">bsc#1235778</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235779">bsc#1235779</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235793">bsc#1235793</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235798">bsc#1235798</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235806">bsc#1235806</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235808">bsc#1235808</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235812">bsc#1235812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235814">bsc#1235814</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235818">bsc#1235818</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235842">bsc#1235842</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235865">bsc#1235865</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235874">bsc#1235874</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235894">bsc#1235894</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235902">bsc#1235902</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235903">bsc#1235903</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235906">bsc#1235906</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235914">bsc#1235914</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235918">bsc#1235918</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235919">bsc#1235919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235920">bsc#1235920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235924">bsc#1235924</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235940">bsc#1235940</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235941">bsc#1235941</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235946">bsc#1235946</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235948">bsc#1235948</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235952">bsc#1235952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235964">bsc#1235964</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235965">bsc#1235965</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235967">bsc#1235967</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235969">bsc#1235969</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235976">bsc#1235976</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235977">bsc#1235977</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236078">bsc#1236078</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236080">bsc#1236080</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236082">bsc#1236082</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236088">bsc#1236088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236090">bsc#1236090</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236091">bsc#1236091</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236096">bsc#1236096</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236097">bsc#1236097</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236098">bsc#1236098</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236101">bsc#1236101</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236102">bsc#1236102</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236104">bsc#1236104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236106">bsc#1236106</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236120">bsc#1236120</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236125">bsc#1236125</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236127">bsc#1236127</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236131">bsc#1236131</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236138">bsc#1236138</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236143">bsc#1236143</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236144">bsc#1236144</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236145">bsc#1236145</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236160">bsc#1236160</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236161">bsc#1236161</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236163">bsc#1236163</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236168">bsc#1236168</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236178">bsc#1236178</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236180">bsc#1236180</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236181">bsc#1236181</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236182">bsc#1236182</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236190">bsc#1236190</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236192">bsc#1236192</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236198">bsc#1236198</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236227">bsc#1236227</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236245">bsc#1236245</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236247">bsc#1236247</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236248">bsc#1236248</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236260">bsc#1236260</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236262">bsc#1236262</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236628">bsc#1236628</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236680">bsc#1236680</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236683">bsc#1236683</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236685">bsc#1236685</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236688">bsc#1236688</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236694">bsc#1236694</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236696">bsc#1236696</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236698">bsc#1236698</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236703">bsc#1236703</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236732">bsc#1236732</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236733">bsc#1236733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236757">bsc#1236757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236758">bsc#1236758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236760">bsc#1236760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236761">bsc#1236761</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-7242">jsc#PED-7242</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52923.html">CVE-2023-52923</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36476.html">CVE-2024-36476</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-39282.html">CVE-2024-39282</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43913.html">CVE-2024-43913</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45828.html">CVE-2024-45828</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46858.html">CVE-2024-46858</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46896.html">CVE-2024-46896</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47141.html">CVE-2024-47141</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47143.html">CVE-2024-47143</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47809.html">CVE-2024-47809</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-48873.html">CVE-2024-48873</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-48881.html">CVE-2024-48881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49569.html">CVE-2024-49569</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49948.html">CVE-2024-49948</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49951.html">CVE-2024-49951</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49978.html">CVE-2024-49978</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49998.html">CVE-2024-49998</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50051.html">CVE-2024-50051</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50106.html">CVE-2024-50106</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50151.html">CVE-2024-50151</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50199.html">CVE-2024-50199</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50251.html">CVE-2024-50251</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50258.html">CVE-2024-50258</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50299.html">CVE-2024-50299</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50304.html">CVE-2024-50304</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-52332.html">CVE-2024-52332</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53091.html">CVE-2024-53091</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53095.html">CVE-2024-53095</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53164.html">CVE-2024-53164</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53168.html">CVE-2024-53168</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53170.html">CVE-2024-53170</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53172.html">CVE-2024-53172</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53175.html">CVE-2024-53175</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53185.html">CVE-2024-53185</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53187.html">CVE-2024-53187</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53194.html">CVE-2024-53194</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53195.html">CVE-2024-53195</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53196.html">CVE-2024-53196</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53197.html">CVE-2024-53197</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53198.html">CVE-2024-53198</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53203.html">CVE-2024-53203</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53227.html">CVE-2024-53227</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53230.html">CVE-2024-53230</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53231.html">CVE-2024-53231</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53232.html">CVE-2024-53232</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53233.html">CVE-2024-53233</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53236.html">CVE-2024-53236</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53239.html">CVE-2024-53239</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53685.html">CVE-2024-53685</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53690.html">CVE-2024-53690</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-54680.html">CVE-2024-54680</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-55639.html">CVE-2024-55639</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-55881.html">CVE-2024-55881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-55916.html">CVE-2024-55916</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56369.html">CVE-2024-56369</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56372.html">CVE-2024-56372</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56531.html">CVE-2024-56531</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56532.html">CVE-2024-56532</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56533.html">CVE-2024-56533</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56538.html">CVE-2024-56538</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56543.html">CVE-2024-56543</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56546.html">CVE-2024-56546</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56548.html">CVE-2024-56548</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56557.html">CVE-2024-56557</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56558.html">CVE-2024-56558</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56568.html">CVE-2024-56568</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56569.html">CVE-2024-56569</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56570.html">CVE-2024-56570</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56571.html">CVE-2024-56571</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56572.html">CVE-2024-56572</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56573.html">CVE-2024-56573</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56574.html">CVE-2024-56574</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56575.html">CVE-2024-56575</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56577.html">CVE-2024-56577</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56578.html">CVE-2024-56578</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56584.html">CVE-2024-56584</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56587.html">CVE-2024-56587</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56588.html">CVE-2024-56588</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56589.html">CVE-2024-56589</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56590.html">CVE-2024-56590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56592.html">CVE-2024-56592</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56593.html">CVE-2024-56593</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56594.html">CVE-2024-56594</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56595.html">CVE-2024-56595</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56596.html">CVE-2024-56596</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56597.html">CVE-2024-56597</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56598.html">CVE-2024-56598</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-5660.html">CVE-2024-5660</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56600.html">CVE-2024-56600</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56601.html">CVE-2024-56601</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56602.html">CVE-2024-56602</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56603.html">CVE-2024-56603</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56606.html">CVE-2024-56606</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56607.html">CVE-2024-56607</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56608.html">CVE-2024-56608</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56609.html">CVE-2024-56609</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56610.html">CVE-2024-56610</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56611.html">CVE-2024-56611</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56614.html">CVE-2024-56614</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56615.html">CVE-2024-56615</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56616.html">CVE-2024-56616</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56617.html">CVE-2024-56617</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56619.html">CVE-2024-56619</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56620.html">CVE-2024-56620</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56622.html">CVE-2024-56622</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56623.html">CVE-2024-56623</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56625.html">CVE-2024-56625</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56629.html">CVE-2024-56629</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56630.html">CVE-2024-56630</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56631.html">CVE-2024-56631</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56632.html">CVE-2024-56632</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56634.html">CVE-2024-56634</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56635.html">CVE-2024-56635</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56636.html">CVE-2024-56636</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56637.html">CVE-2024-56637</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56641.html">CVE-2024-56641</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56642.html">CVE-2024-56642</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56643.html">CVE-2024-56643</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56644.html">CVE-2024-56644</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56648.html">CVE-2024-56648</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56649.html">CVE-2024-56649</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56650.html">CVE-2024-56650</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56651.html">CVE-2024-56651</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56654.html">CVE-2024-56654</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56656.html">CVE-2024-56656</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56658.html">CVE-2024-56658</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56659.html">CVE-2024-56659</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56660.html">CVE-2024-56660</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56661.html">CVE-2024-56661</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56662.html">CVE-2024-56662</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56663.html">CVE-2024-56663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56664.html">CVE-2024-56664</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56665.html">CVE-2024-56665</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56670.html">CVE-2024-56670</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56672.html">CVE-2024-56672</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56675.html">CVE-2024-56675</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56677.html">CVE-2024-56677</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56678.html">CVE-2024-56678</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56679.html">CVE-2024-56679</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56681.html">CVE-2024-56681</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56683.html">CVE-2024-56683</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56687.html">CVE-2024-56687</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56688.html">CVE-2024-56688</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56690.html">CVE-2024-56690</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56691.html">CVE-2024-56691</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56693.html">CVE-2024-56693</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56694.html">CVE-2024-56694</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56698.html">CVE-2024-56698</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56700.html">CVE-2024-56700</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56701.html">CVE-2024-56701</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56704.html">CVE-2024-56704</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56705.html">CVE-2024-56705</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56707.html">CVE-2024-56707</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56708.html">CVE-2024-56708</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56709.html">CVE-2024-56709</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56712.html">CVE-2024-56712</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56715.html">CVE-2024-56715</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56716.html">CVE-2024-56716</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56722.html">CVE-2024-56722</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56723.html">CVE-2024-56723</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56724.html">CVE-2024-56724</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56725.html">CVE-2024-56725</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56726.html">CVE-2024-56726</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56727.html">CVE-2024-56727</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56728.html">CVE-2024-56728</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56729.html">CVE-2024-56729</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56739.html">CVE-2024-56739</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56741.html">CVE-2024-56741</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56745.html">CVE-2024-56745</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56746.html">CVE-2024-56746</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56747.html">CVE-2024-56747</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56748.html">CVE-2024-56748</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56759.html">CVE-2024-56759</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56760.html">CVE-2024-56760</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56763.html">CVE-2024-56763</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56765.html">CVE-2024-56765</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56766.html">CVE-2024-56766</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56767.html">CVE-2024-56767</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56769.html">CVE-2024-56769</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56774.html">CVE-2024-56774</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56775.html">CVE-2024-56775</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56776.html">CVE-2024-56776</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56777.html">CVE-2024-56777</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56778.html">CVE-2024-56778</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56779.html">CVE-2024-56779</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56780.html">CVE-2024-56780</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56787.html">CVE-2024-56787</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57791.html">CVE-2024-57791</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57792.html">CVE-2024-57792</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57793.html">CVE-2024-57793</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57795.html">CVE-2024-57795</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57798.html">CVE-2024-57798</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57801.html">CVE-2024-57801</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57802.html">CVE-2024-57802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57804.html">CVE-2024-57804</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57809.html">CVE-2024-57809</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57838.html">CVE-2024-57838</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57849.html">CVE-2024-57849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57850.html">CVE-2024-57850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57857.html">CVE-2024-57857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57874.html">CVE-2024-57874</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57876.html">CVE-2024-57876</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57882.html">CVE-2024-57882</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57884.html">CVE-2024-57884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57887.html">CVE-2024-57887</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57888.html">CVE-2024-57888</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57890.html">CVE-2024-57890</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57892.html">CVE-2024-57892</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57893.html">CVE-2024-57893</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57896.html">CVE-2024-57896</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57897.html">CVE-2024-57897</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57899.html">CVE-2024-57899</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57903.html">CVE-2024-57903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57904.html">CVE-2024-57904</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57906.html">CVE-2024-57906</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57907.html">CVE-2024-57907</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57908.html">CVE-2024-57908</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57910.html">CVE-2024-57910</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57911.html">CVE-2024-57911</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57912.html">CVE-2024-57912</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57913.html">CVE-2024-57913</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57915.html">CVE-2024-57915</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57916.html">CVE-2024-57916</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57917.html">CVE-2024-57917</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57922.html">CVE-2024-57922</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57926.html">CVE-2024-57926</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57929.html">CVE-2024-57929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57931.html">CVE-2024-57931</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57932.html">CVE-2024-57932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57933.html">CVE-2024-57933</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57935.html">CVE-2024-57935</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57936.html">CVE-2024-57936</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57938.html">CVE-2024-57938</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57940.html">CVE-2024-57940</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57946.html">CVE-2024-57946</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21632.html">CVE-2025-21632</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21645.html">CVE-2025-21645</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21646.html">CVE-2025-21646</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21649.html">CVE-2025-21649</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21650.html">CVE-2025-21650</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21651.html">CVE-2025-21651</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21652.html">CVE-2025-21652</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21653.html">CVE-2025-21653</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21655.html">CVE-2025-21655</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21656.html">CVE-2025-21656</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21662.html">CVE-2025-21662</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21663.html">CVE-2025-21663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21664.html">CVE-2025-21664</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21666.html">CVE-2025-21666</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21669.html">CVE-2025-21669</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21670.html">CVE-2025-21670</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21674.html">CVE-2025-21674</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21675.html">CVE-2025-21675</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21676.html">CVE-2025-21676</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21678.html">CVE-2025-21678</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21682.html">CVE-2025-21682</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36476</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36476</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-36476</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39282</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-39282</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43913</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43913</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43913</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45828</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45828</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45828</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46858</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46858</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46896</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46896</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47141</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47141</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47143</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47143</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47143</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47809</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47809</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47809</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-48873</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-48873</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-48873</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-48881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-48881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-48881</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49569</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49569</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49948</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49951</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49951</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49978</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49978</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49998</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49998</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50051</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50051</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50051</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50051</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50106</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50106</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50106</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50151</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50151</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50151</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50199</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50251</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50251</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50251</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50258</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50258</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50258</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50299</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50299</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50304</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50304</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-52332</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-52332</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53091</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53091</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53095</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53095</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53164</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53164</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53168</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53168</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53168</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53168</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53170</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53170</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53170</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53170</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53172</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53172</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53175</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53175</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53175</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53185</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53185</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53185</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53185</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53187</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53187</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53187</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53194</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53194</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53194</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53195</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53195</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53196</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53196</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53197</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53197</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53198</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53198</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53203</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53203</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53203</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53227</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53227</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53227</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53227</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53230</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53230</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53231</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53231</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53231</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53232</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53232</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53233</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53233</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53236</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53685</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53685</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54680</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54680</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54680</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54680</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-55639</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-55639</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-55881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-55881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-55916</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-55916</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-55916</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56369</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56369</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56369</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56372</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56372</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56531</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56531</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56532</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56532</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56533</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56533</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56538</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56538</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56538</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56538</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56543</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56543</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56546</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56546</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56557</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56557</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56558</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56558</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56558</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56568</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56568</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56568</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56569</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56569</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56569</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56570</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56570</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56571</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56571</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56572</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56572</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56572</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56573</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56573</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56574</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56574</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56574</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56575</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56575</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56575</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56577</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56577</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56577</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56578</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56578</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56578</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56584</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56584</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56587</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56587</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56587</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56588</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56588</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56588</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56589</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56589</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56592</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56592</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56593</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56593</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56593</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56594</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56594</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56595</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56595</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56595</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56596</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56596</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56596</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56597</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56597</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56598</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56598</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56598</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-5660</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56600</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56600</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56600</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56600</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56601</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56601</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56601</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56601</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56602</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56602</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56602</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56602</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56603</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56603</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56603</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56603</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56606</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56606</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56606</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56606</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56607</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56607</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56608</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56608</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56608</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56609</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56609</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56610</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56610</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56611</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56611</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56611</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56614</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56614</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56614</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56615</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56615</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56615</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56616</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56616</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56617</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56617</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56617</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56619</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56619</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56619</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56620</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56620</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56620</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56622</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56622</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56622</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56623</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56623</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56623</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56625</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56625</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56629</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56629</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56629</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56630</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56630</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56631</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56631</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56631</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56631</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56632</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56632</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56632</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56634</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56634</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56634</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56635</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56635</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56636</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56636</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56637</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56637</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56641</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56641</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56642</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56642</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56642</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56642</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56643</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56643</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56643</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56644</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56644</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56648</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56648</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56648</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56649</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56649</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56649</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56650</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56651</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56651</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56654</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56654</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56654</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56656</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56656</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56656</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56658</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56658</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56658</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56659</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56659</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56659</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56660</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56660</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56660</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56661</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56661</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56661</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56662</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56662</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56662</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56663</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56664</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56664</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56664</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56665</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56670</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56672</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56672</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56672</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56672</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56675</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56675</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56677</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56677</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56678</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56678</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56678</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56679</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56683</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56683</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56687</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56687</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56687</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56688</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56691</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56691</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56693</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56694</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56694</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56694</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56698</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56698</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56698</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56700</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56700</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56704</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56704</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56704</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56705</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56705</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56707</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56707</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56708</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56708</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56708</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56709</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56709</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56712</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56712</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56712</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56715</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56715</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56715</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56716</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56716</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56716</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56722</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56722</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56722</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56723</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56723</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56723</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56724</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56724</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56724</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56725</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56725</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56725</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56726</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56726</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56726</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56727</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56727</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56727</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56728</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56728</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56728</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56729</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56729</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56729</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56739</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56739</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56739</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56741</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56741</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56741</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56745</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56745</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56745</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56746</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56746</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56746</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56747</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56747</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56747</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56748</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56748</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56748</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56759</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56759</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56759</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56759</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56760</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56760</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56760</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56763</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56763</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56763</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56765</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56765</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56765</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56765</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56766</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56766</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56766</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56767</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56767</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56767</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56769</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56769</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56769</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56774</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56774</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56774</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56775</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56775</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56775</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56776</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56776</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56776</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56777</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56777</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56777</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56778</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56778</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56778</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56779</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56779</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56779</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56780</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56780</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56780</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56787</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56787</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56787</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57791</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57791</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57792</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57792</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57793</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.2</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57793</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57795</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57795</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57795</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57798</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57798</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57798</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57801</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57801</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57801</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57801</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57802</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57809</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57809</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57838</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57838</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57857</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57874</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57874</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57874</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57876</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57876</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57882</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57882</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57882</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57887</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57887</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57887</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57887</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57888</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57888</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57890</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57890</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57890</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57892</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57892</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57892</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57892</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57893</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57896</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57896</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57896</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57896</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57897</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57899</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57907</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57908</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57910</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57911</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57911</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57912</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57913</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57913</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57915</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57915</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57915</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57916</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57916</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57917</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57917</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57922</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57926</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57926</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57933</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57933</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57933</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57936</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57936</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57938</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57938</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57940</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57940</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57940</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57946</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57946</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21632</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21632</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21645</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21645</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21646</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21646</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21649</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21649</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21649</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21652</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21652</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21652</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21652</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21653</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21653</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21655</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21655</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21656</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">1.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21656</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21662</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21662</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21664</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21664</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21666</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21666</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21666</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21669</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21670</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21674</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21674</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21674</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21675</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21676</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21676</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21676</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21678</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21678</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21682</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21682</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21682</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.6</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 15-SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP6</li>

<li class="list-group-item">SUSE Real
Time Module 15-SP6</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 256 vulnerabilities, contains one feature
and has 42 security fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring
stop request (bsc#1235705).</li>
<li>CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync
(bsc#1231088).</li>
<li>CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR
again (bsc#1235727).</li>
<li>CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init()
(bsc#1232161).</li>
<li>CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on
mgmt_index_removed (bsc#1232158).</li>
<li>CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull
from frag_list (bsc#1232101).</li>
<li>CVE-2024-49998: net: dsa: improve shutdown sequence
(bsc#1232087).</li>
<li>CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL
request (bsc#1233055).</li>
<li>CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma
(bsc#1233112).</li>
<li>CVE-2024-50251: netfilter: nft_payload: sanitize offset and length
before calling skb_checksum() (bsc#1233248).</li>
<li>CVE-2024-50258: net: fix crash when config small
gso_max_size/gso_ipv4_max_size (bsc#1233221).</li>
<li>CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb()
(bsc#1233488).</li>
<li>CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_find() (bsc#1233522).</li>
<li>CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in
tls_sw_has_ctx_tx/rx (bsc#1233638).</li>
<li>CVE-2024-53164: net: sched: fix ordering of qlen adjustment
(bsc#1234863).</li>
<li>CVE-2024-53170: block: fix uaf for flush rq while iterating tags
(bsc#1234888).</li>
<li>CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while
attaching (bsc#1234898).</li>
<li>CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in
create_ipc_ns (bsc#1234893).</li>
<li>CVE-2024-53185: smb: client: fix NULL ptr deref in
crypto_aead_setkey() (bsc#1234901).</li>
<li>CVE-2024-53187: io_uring: check for overflows in io_pin_pages
(bsc#1234947).</li>
<li>CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use
(bsc#1234957).</li>
<li>CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction
(bsc#1234906).</li>
<li>CVE-2024-53198: xen: Fix the issue of resource not being properly
released in xenbus_dev_probe() (bsc#1234923).</li>
<li>CVE-2024-53203: usb: typec: fix potential array underflow in
ucsi_ccg_sync_control() (bsc#1235001).</li>
<li>CVE-2024-53227: scsi: bfa: Fix use-after-free in
bfad_im_module_exit() (bsc#1235011).</li>
<li>CVE-2024-53232: iommu/s390: Implement blocking domain
(bsc#1235050).</li>
<li>CVE-2024-53236: xsk: Free skb when TX metadata options are invalid
(bsc#1235000).</li>
<li>CVE-2024-53685: ceph: give up on paths longer than PATH_MAX
(bsc#1235720).</li>
<li>CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a
device tree node (bsc#1235737).</li>
<li>CVE-2024-55881: KVM: x86: Play nice with protected guests in
complete_hypercall_exit() (bsc#1235745).</li>
<li>CVE-2024-56372: net: tun: fix tun_napi_alloc_frags()
(bsc#1235753).</li>
<li>CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu
device bound (bsc#1235032).</li>
<li>CVE-2024-56569: ftrace: Fix regression with module command in
stack_trace_filter (bsc#1235031).</li>
<li>CVE-2024-56570: ovl: Filter invalid inodes with missing lookup
function (bsc#1235035).</li>
<li>CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs
initialization (bsc#1235123).</li>
<li>CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced
preemption model (bsc#1235241).</li>
<li>CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket()
(bsc#1235244).</li>
<li>CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in
inet6_create() (bsc#1235217).</li>
<li>CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235230).</li>
<li>CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer
in ieee802154_create() (bsc#1235521).</li>
<li>CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in
can_create() (bsc#1235415).</li>
<li>CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in
&#x27;dcn21_link_encoder_create&#x27; (bsc#1235487).</li>
<li>CVE-2024-56610: kcsan: Turn report_filterlist_lock into a
raw_spinlock (bsc#1235390).</li>
<li>CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is
at least one VMA in a MM (bsc#1235391).</li>
<li>CVE-2024-56614: xsk: fix OOB map writes when deleting elements
(bsc#1235424).</li>
<li>CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements
(bsc#1235426).</li>
<li>CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not
done from the primary CPU (bsc#1235429).</li>
<li>CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is
enabled (bsc#1235227).</li>
<li>CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero
(bsc#1235251).</li>
<li>CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in
sg_release() (bsc#1235480).</li>
<li>CVE-2024-56635: net: avoid potential UAF in default_operstate()
(bsc#1235519).</li>
<li>CVE-2024-56636: geneve: do not assume mac header is set in
geneve_xmit_skb() (bsc#1235520).</li>
<li>CVE-2024-56637: netfilter: ipset: Hold module reference while
requesting a module (bsc#1235523).</li>
<li>CVE-2024-56641: net/smc: initialize close_work early to avoid warning
(bsc#1235526).</li>
<li>CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv
(bsc#1235132).</li>
<li>CVE-2024-56648: net: hsr: avoid potential out-of-bound access in
fill_frame_info() (bsc#1235451).</li>
<li>CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs
do not support (bsc#1235449).</li>
<li>CVE-2024-56650: netfilter: x_tables: fix LED ID check in
led_tg_check() (bsc#1235430).</li>
<li>CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on
5760X chips (bsc#1235444).</li>
<li>CVE-2024-56658: net: defer final &#x27;struct net&#x27; free
in netns dismantle (bsc#1235441).</li>
<li>CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN
(bsc#1235439).</li>
<li>CVE-2024-56660: net/mlx5: DR, prevent potential error pointer
dereference (bsc#1235437).</li>
<li>CVE-2024-56664: bpf, sockmap: Fix race between element replace and
close() (bsc#1235249).</li>
<li>CVE-2024-56665: bpf,perf: Fix invalid prog_array access in
perf_event_detach_bpf_prog (bsc#1235489).</li>
<li>CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU
flavors (bsc#1235555).</li>
<li>CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_common.c (bsc#1235498).</li>
<li>CVE-2024-56693: brd: defer automatic disk creation until module
initialization succeeds (bsc#1235418).</li>
<li>CVE-2024-56694: bpf: fix recursive lock when verdict program return
SK_PASS (bsc#1235412).</li>
<li>CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).</li>
<li>CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_dmac_flt.c (bsc#1235545).</li>
<li>CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload
(bsc#1235564).</li>
<li>CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf()
error path (bsc#1235565).</li>
<li>CVE-2024-56715: ionic: Fix netdev notifier unregister on failure
(bsc#1235612).</li>
<li>CVE-2024-56716: netdevsim: prevent bad user input in
nsim_dev_health_break_write() (bsc#1235587).</li>
<li>CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_dcbnl.c (bsc#1235578).</li>
<li>CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in
cn10k.c (bsc#1235582).</li>
<li>CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_flows.c (bsc#1235583).</li>
<li>CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in
otx2_ethtool.c (bsc#1235656).</li>
<li>CVE-2024-56729: smb: Initialize cfid-&gt;tcon before performing
network ops (bsc#1235503).</li>
<li>CVE-2024-56747: scsi: qedi: Fix a possible memory leak in
qedi_alloc_and_init_sb() (bsc#1234934).</li>
<li>CVE-2024-56748: scsi: qedf: Fix a possible memory leak in
qedf_alloc_and_init_sb() (bsc#1235627).</li>
<li>CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and
tracing is enabled (bsc#1235645).</li>
<li>CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write
(bsc#1235638).</li>
<li>CVE-2024-56774: btrfs: add a sanity check for btrfs root in
btrfs_search_slot() (bsc#1235653).</li>
<li>CVE-2024-56775: drm/amd/display: Fix handling of plane refcount
(bsc#1235657).</li>
<li>CVE-2024-57791: net/smc: check return value of sock_recvmsg when
draining clc data (bsc#1235759).</li>
<li>CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on
unrecoverable errors (bsc#1235768).</li>
<li>CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device
(bsc#1235906).</li>
<li>CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep
without loaded flag (bsc#1235940).</li>
<li>CVE-2024-57802: netrom: check buffer length before accessing it
(bsc#1235941).</li>
<li>CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is
switched in sysfs (bsc#1235779).</li>
<li>CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL
(bsc#1235793).</li>
<li>CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot
warnings (bsc#1235798).</li>
<li>CVE-2024-57857: RDMA/siw: Remove direct link to net_device
(bsc#1235946).</li>
<li>CVE-2024-57882: mptcp: fix TCP options overflow.
(bsc#1235914).</li>
<li>CVE-2024-57884: mm: vmscan: account for free pages to prevent
infinite Loop in throttle_direct_reclaim() (bsc#1235948).</li>
<li>CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling
pointer dqi_priv (bsc#1235964).</li>
<li>CVE-2024-57896: btrfs: flush delalloc workers queue before stopping
cleaner kthread during unmount (bsc#1235965).</li>
<li>CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets
(bsc#1235967).</li>
<li>CVE-2024-57917: topology: Keep the cpumask unchanged when printing
cpumap (bsc#1236127).</li>
<li>CVE-2024-57929: dm array: fix releasing a faulty array block twice in
dm_array_cursor_end (bsc#1236096).</li>
<li>CVE-2024-57931: selinux: ignore unknown extended permissions
(bsc#1236192).</li>
<li>CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues
(bsc#1236190).</li>
<li>CVE-2024-57933: gve: guard XSK operations on the existence of queues
(bsc#1236178).</li>
<li>CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in
sctp_association_init() (bsc#1236182).</li>
<li>CVE-2024-57946: virtio-blk: do not keep queue frozen during system
suspend (bsc#1236247).</li>
<li>CVE-2025-21632: x86/fpu: Ensure shadow stack is active before
&quot;getting&quot; registers (bsc#1236106).</li>
<li>CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on
HIP08 devices (bsc#1236143).</li>
<li>CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar
space out of bounds issue (bsc#1236144).</li>
<li>CVE-2025-21651: net: hns3: do not auto enable misc vector
(bsc#1236145).</li>
<li>CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink()
(bsc#1236160).</li>
<li>CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT
attribute (bsc#1236161).</li>
<li>CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers
another RCU period (bsc#1236163).</li>
<li>CVE-2025-21662: net/mlx5: Fix variable not being completed when
function returns (bsc#1236198).</li>
<li>CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from
device tree (bsc#1236260).</li>
<li>CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first
function (bsc#1236262).</li>
<li>CVE-2025-21666: vsock: prevent null-ptr-deref in
vsock_*[has_data|has_space] (bsc#1236680).</li>
<li>CVE-2025-21669: vsock/virtio: discard packets if the transport
changes (bsc#1236683).</li>
<li>CVE-2025-21670: vsock/bpf: return early if transport is not assigned
(bsc#1236685).</li>
<li>CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while
enabling IPsec tunnel (bsc#1236688).</li>
<li>CVE-2025-21675: net/mlx5: Clear port select structure when fail to
create (bsc#1236694).</li>
<li>CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error
(bsc#1236696).</li>
<li>CVE-2025-21678: gtp: Destroy device along with udp socket&#x27;s
netns dismantle (bsc#1236698).</li>
<li>CVE-2025-21682: eth: bnxt: always recalculate features after XDP
clearing, fix null-deref (bsc#1236703).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI/IORT: Add PMCG platform information for HiSilicon HIP09A
(stable-fixes).</li>
<li>ACPI/IORT: Add PMCG platform information for HiSilicon HIP10/11
(stable-fixes).</li>
<li>ACPI: PCC: Add PCC shared memory region command and status bitfields
(stable-fixes).</li>
<li>ACPI: fan: cleanup resources in the error path of .probe()
(git-fixes).</li>
<li>ACPI: resource: Add Asus Vivobook X1504VAP to
irq1_level_low_skip_override[] (stable-fixes).</li>
<li>ACPI: resource: Add TongFang GM5HG0A to
irq1_edge_low_force_override[] (stable-fixes).</li>
<li>ACPI: resource: acpi_dev_irq_override(): Check DMI match last
(stable-fixes).</li>
<li>ALSA: hda/realtek - Add support for ASUS Zen AIO 27 Z272SD_A272SD
audio (stable-fixes).</li>
<li>ALSA: hda/realtek - Fixed headphone distorted sound on Acer Aspire
A115-31 laptop (git-fixes).</li>
<li>ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for Galaxy Book2 Pro (NP950XEE)
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable Mute LED on HP Laptop 14s-fq1xxx
(stable-fixes).</li>
<li>ALSA: hda/realtek: Enable headset mic on Positivo C6400
(stable-fixes).</li>
<li>ALSA: hda/realtek: Workaround for resume on Dell Venue 11 Pro 7130
(bsc#1235686).</li>
<li>ALSA: hda: Fix headset detection failure due to unstable sort
(git-fixes).</li>
<li>ALSA: ump: Use guard() for locking (stable-fixes).</li>
<li>ALSA: usb-audio: Add delay quirk for USB Audio Device
(stable-fixes).</li>
<li>ALSA: usb-audio: Add delay quirk for iBasso DC07 Pro
(stable-fixes).</li>
<li>ASoC: Intel: avs: Fix theoretical infinite loop
(git-fixes).</li>
<li>ASoC: acp: Support microphone from Lenovo Go S
(stable-fixes).</li>
<li>ASoC: mediatek: disable buffer pre-allocation
(stable-fixes).</li>
<li>ASoC: rockchip: i2s_tdm: Re-add the set_sysclk callback
(git-fixes).</li>
<li>ASoC: rt722: add delay time to wait for the calibration procedure
(stable-fixes).</li>
<li>ASoC: samsung: Add missing depends on I2C (git-fixes).</li>
<li>ASoC: samsung: Add missing selects for MFD_WM8994
(stable-fixes).</li>
<li>ASoC: sun4i-spdif: Add clock multiplier settings
(git-fixes).</li>
<li>ASoC: wm8994: Add depends on MFD core (stable-fixes).</li>
<li>Align git commit ID abbreviation guidelines and checks
(git-fixes).</li>
<li>Bluetooth: Add support ITTIM PE50-M75C (stable-fixes).</li>
<li>Bluetooth: L2CAP: accept zero as a special value for MTU
auto-selection (git-fixes).</li>
<li>Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
(git-fixes).</li>
<li>Bluetooth: MGMT: Fix Add Device to responding before completing
(git-fixes).</li>
<li>Bluetooth: btnxpuart: Fix driver sending truncated data
(git-fixes).</li>
<li>Bluetooth: btnxpuart: Fix glitches seen in dual A2DP streaming
(git-fixes).</li>
<li>Bluetooth: btusb: Add USB HW IDs for MT7921/MT7922/MT7925
(stable-fixes).</li>
<li>Bluetooth: btusb: Add new VID/PID 0489/e111 for MT7925
(stable-fixes).</li>
<li>Bluetooth: btusb: Add new VID/PID 13d3/3602 for MT7925
(stable-fixes).</li>
<li>Bluetooth: btusb: add callback function in btusb suspend/resume
(stable-fixes).</li>
<li>Bluetooth: btusb: mediatek: add callback function in btusb_disconnect
(stable-fixes).</li>
<li>Bluetooth: hci_sync: Fix not setting Random Address when required
(git-fixes).</li>
<li>uvcvideo: drop fix due to regression (bsc#1235894)</li>
<li>EDAC/{i10nm,skx,skx_common}: Support UV systems
(bsc#1234693).</li>
<li>HID: core: Fix assumption that Resolution Multipliers must be in
Logical Collections (git-fixes).</li>
<li>HID: fix generic desktop D-Pad controls (git-fixes).</li>
<li>HID: hid-sensor-hub: do not use stale platform-data on remove
(git-fixes).</li>
<li>HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding
endpoint check (git-fixes).</li>
<li>HID: multitouch: fix support for Goodix PID 0x01e9
(git-fixes).</li>
<li>Input: atkbd - map F23 key to support default copilot shortcut
(stable-fixes).</li>
<li>Input: bbnsm_pwrkey - add remove hook (git-fixes).</li>
<li>Input: bbnsm_pwrkey - fix missed key press after suspend
(git-fixes).</li>
<li>Input: davinci-keyscan - remove leftover header
(git-fixes).</li>
<li>Input: xpad - add QH Electronics VID/PID (stable-fixes).</li>
<li>Input: xpad - add support for Nacon Evol-X Xbox One Controller
(stable-fixes).</li>
<li>Input: xpad - add support for Nacon Pro Compact
(stable-fixes).</li>
<li>Input: xpad - add support for wooting two he (arm)
(stable-fixes).</li>
<li>Input: xpad - add unofficial Xbox 360 wireless receiver clone
(stable-fixes).</li>
<li>Input: xpad - improve name of 8BitDo controller 2dc8:3106
(stable-fixes).</li>
<li>KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
(bsc#1234635).</li>
<li>KVM: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs (git-fixes
bsc#1235776).</li>
<li>KVM: s390: Reject setting flic pfault attributes on ucontrol VMs
(git-fixes bsc#1235777).</li>
<li>KVM: s390: vsie: fix virtual/physical address in unpin_scb()
(git-fixes bsc#1235778).</li>
<li>Move upstreamed DRM patch into sorted section</li>
<li>Move upstreamed NFS patch into sorted section</li>
<li>Move upstreamed TPM patch into sorted section</li>
<li>Move upstreamed lpfc patches into sorted section</li>
<li>Move upstreamed ppc patch into sorted section</li>
<li>Move upstreamed sound patch into sorted section</li>
<li>NFC: nci: Add bounds checking in nci_hci_create_pipe()
(git-fixes).</li>
<li>NFSv4.2: fix COPY_NOTIFY xdr buf size calculation
(git-fixes).</li>
<li>NFSv4.2: mark OFFLOAD_CANCEL MOVEABLE (git-fixes).</li>
<li>PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1
(git-fixes).</li>
<li>PCI: dwc: Always stop link in the dw_pcie_suspend_noirq
(git-fixes).</li>
<li>PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar()
(git-fixes).</li>
<li>PCI: dwc: ep: Write BAR_MASK before iATU registers in
pci_epc_set_bar() (git-fixes).</li>
<li>PCI: endpoint: Destroy the EPC device in devm_pci_epc_destroy()
(git-fixes).</li>
<li>PCI: endpoint: Finish virtual EP removal in pci_epf_remove_vepf()
(git-fixes).</li>
<li>PCI: endpoint: pci-epf-test: Fix check for DMA MEMCPY test
(git-fixes).</li>
<li>PCI: endpoint: pci-epf-test: Set dma_chan_rx pointer to NULL on error
(git-fixes).</li>
<li>PCI: imx6: Deassert apps_reset in imx_pcie_deassert_core_reset()
(git-fixes).</li>
<li>PCI: imx6: Skip controller_id generation logic for i.MX7D
(git-fixes).</li>
<li>PCI: microchip: Set inbound address translation for coherent or
non-coherent mode (git-fixes).</li>
<li>PCI: rcar-ep: Fix incorrect variable used when calling
devm_request_mem_region() (git-fixes).</li>
<li>PM: hibernate: Add error handling for syscore_suspend()
(git-fixes).</li>
<li>RDMA/bnxt_re: Add send queue size check for variable wqe
(git-fixes)</li>
<li>RDMA/bnxt_re: Fix MSN table size for variable wqe mode
(git-fixes)</li>
<li>RDMA/bnxt_re: Fix max SGEs for the Work Request
(git-fixes)</li>
<li>RDMA/bnxt_re: Fix the max WQE size for static WQE support
(git-fixes)</li>
<li>RDMA/bnxt_re: Fix the max WQEs used in Static WQE mode
(git-fixes)</li>
<li>RDMA/bnxt_re: Fix to drop reference to the mmap entry in case of
error (git-fixes)</li>
<li>RDMA/bnxt_re: Fix to export port num to ib_query_qp
(git-fixes)</li>
<li>RDMA/mlx4: Avoid false error about access to uninitialized gids array
(git-fixes)</li>
<li>RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error
(git-fixes)</li>
<li>RDMA/mlx5: Fix implicit ODP use after free (git-fixes)</li>
<li>RDMA/mlx5: Fix indirect mkey ODP page count (git-fixes)</li>
<li>RDMA/rxe: Fix mismatched max_msg_sz (git-fixes)</li>
<li>RDMA/rxe: Fix the warning &quot;__rxe_cleanup+0x12c/0x170
[rdma_rxe]&quot; (git-fixes)</li>
<li>RDMA/srp: Fix error handling in srp_add_port (git-fixes)</li>
<li>USB: core: Disable LPM only for non-suspended ports
(git-fixes).</li>
<li>USB: serial: cp210x: add Phoenix Contact UPS Device
(stable-fixes).</li>
<li>USB: serial: option: add MeiG Smart SRM815 (stable-fixes).</li>
<li>USB: serial: option: add Neoway N723-EA support
(stable-fixes).</li>
<li>USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
(git-fixes).</li>
<li>USB: usblp: return error when setting unsupported protocol
(git-fixes).</li>
<li>Update
patches.suse/nvme-tcp-Fix-I-O-queue-cpu-spreading-for-multiple-co.patch (git-fixes bsc#1224049).</li>
<li>VFS: use system_unbound_wq for delayed_mntput
(bsc#1234683).</li>
<li>VMCI: fix reference to ioctl-number.rst (git-fixes).</li>
<li>afs: Fix EEXIST error returned from afs_rmdir() to be ENOTEMPTY
(git-fixes).</li>
<li>afs: Fix cleanup of immediately failed async calls
(git-fixes).</li>
<li>afs: Fix directory format encoding struct (git-fixes).</li>
<li>afs: Fix the fallback handling for the YFS.RemoveFile2 RPC call
(git-fixes).</li>
<li>afs: Fix the maximum cell name length (git-fixes).</li>
<li>arm64/sme: Move storage of reg_smidr to __cpuinfo_store_cpu()
(git-fixes)</li>
<li>arm64: Filter out SVE hwcaps when FEAT_SVE isn&#x27;t implemented
(git-fixes)</li>
<li>arm64: Kconfig: Make SME depend on BROKEN for now (git-fixes
bsc#1236245).</li>
<li>arm64: dts: rockchip: Add sdmmc/sdio/emmc reset controls for RK3328
(git-fixes)</li>
<li>arm64: dts: rockchip: add hevc power domain clock to rk3328
(git-fixes).</li>
<li>arm64: dts: rockchip: increase gmac rx_delay on rk3399-puma
(git-fixes)</li>
<li>arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
(git-fixes).</li>
<li>arm64: tegra: Disable Tegra234 sce-fabric node (git-fixes)</li>
<li>arm64: tegra: Fix Tegra234 PCIe interrupt-map (git-fixes)</li>
<li>arm64: tegra: Fix typo in Tegra234 dce-fabric compatible
(git-fixes)</li>
<li>ata: libata-core: Set ATA_QCFLAG_RTF_FILLED in fill_result_tf()
(stable-fixes).</li>
<li>bnxt_en: Fix GSO type for HW GRO packets on 5750X chips
(git-fixes)</li>
<li>btrfs: fix use-after-free in btrfs_encoded_read_endio()
(bsc#1235445).</li>
<li>btrfs: fix use-after-free waiting for encoded read endios
(bsc#1235445).</li>
<li>bus: mhi: host: Free mhi_buf vector inside mhi_alloc_bhie_table()
(git-fixes).</li>
<li>ceph: improve error handling and short/overflow-read logic in
__ceph_sync_read() (bsc#1228592).</li>
<li>cleanup: Add conditional guard support (stable-fixes).</li>
<li>cleanup: Adjust scoped_guard() macros to avoid potential warning
(stable-fixes).</li>
<li>cleanup: Remove address space of returned pointer
(git-fixes).</li>
<li>cpufreq: ACPI: Fix max-frequency computation (git-fixes).</li>
<li>cpufreq: Do not unregister cpufreq cooling on CPU hotplug
(git-fixes).</li>
<li>cpufreq: amd-pstate: remove global header file
(git-fixes).</li>
<li>cpufreq: intel_pstate: Check turbo_is_disabled() in store_no_turbo()
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Do not update global.turbo_disabled after
initialization (bsc#1234619).</li>
<li>cpufreq: intel_pstate: Drop redundant locking from
intel_pstate_driver_cleanup() (bsc#1234619).</li>
<li>cpufreq: intel_pstate: Fix unchecked HWP MSR access
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Fold intel_pstate_max_within_limits() into
caller (bsc#1234619).</li>
<li>cpufreq: intel_pstate: Get rid of unnecessary READ_ONCE() annotations
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Make hwp_notify_lock a raw spinlock
(git-fixes).</li>
<li>cpufreq: intel_pstate: Read global.no_turbo under READ_ONCE()
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Rearrange show_no_turbo() and store_no_turbo()
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Refine computation of P-state for given
frequency (bsc#1234619).</li>
<li>cpufreq: intel_pstate: Replace three global.turbo_disabled checks
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Revise global turbo disable check
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Simplify spinlock locking
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Update the maximum CPU frequency consistently
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Use HWP to initialize ITMT if CPPC is missing
(git-fixes).</li>
<li>cpufreq: intel_pstate: Use __ro_after_init for three variables
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: Wait for canceled delayed work to complete
(bsc#1234619).</li>
<li>cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf
call back (git-fixes).</li>
<li>cpuidle: Avoid potential overflow in integer multiplication
(git-fixes).</li>
<li>cpupower: fix TSC MHz calculation (git-fixes).</li>
<li>crypto: caam - use JobR&#x27;s space to access page 0 regs
(git-fixes).</li>
<li>crypto: ecc - Prevent ecc_digits_from_bytes from reading too many
bytes (git-fixes).</li>
<li>crypto: ecdsa - Avoid signed integer overflow on signature decoding
(stable-fixes).</li>
<li>crypto: ecdsa - Convert byte arrays with key coordinates to digits
(stable-fixes).</li>
<li>crypto: ecdsa - Rename keylen to bufsize where necessary
(stable-fixes).</li>
<li>crypto: ecdsa - Use ecc_digits_from_bytes to convert signature
(stable-fixes).</li>
<li>crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to
&#x27;async&#x27; (git-fixes).</li>
<li>crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto()
(git-fixes).</li>
<li>crypto: qce - fix goto jump in error path (git-fixes).</li>
<li>crypto: qce - fix priority to be less than ARMv8 CE
(git-fixes).</li>
<li>crypto: qce - unregister previously registered algos in error path
(git-fixes).</li>
<li>devcoredump: cleanup some comments (git-fixes).</li>
<li>dlm: fix possible lkb_resource null dereference
(git-fixes).</li>
<li>dmaengine: ti: edma: fix OF node reference leaks in edma_driver
(git-fixes).</li>
<li>doc/README.SUSE: Point to the updated version of LKMPG</li>
<li>docs: media: update location of the media patches
(stable-fixes).</li>
<li>docs: power: Fix footnote reference for Toshiba Satellite P10-554
(git-fixes).</li>
<li>driver core: class: Fix wild pointer dereferences in API
class_dev_iter_next() (git-fixes).</li>
<li>drivers/card_reader/rtsx_usb: Restore interrupt based detection
(git-fixes).</li>
<li>drm/amd/display: Add check for granularity in dml ceil/floor helpers
(stable-fixes).</li>
<li>drm/amd/display: Fix DSC-re-computing (stable-fixes).</li>
<li>drm/amd/display: Fix incorrect DSC recompute trigger
(stable-fixes).</li>
<li>drm/amd/display: Use HW lock mgr for PSR1 (stable-fixes).</li>
<li>drm/amd/display: increase MAX_SURFACES to the value supported by hw
(stable-fixes).</li>
<li>drm/amd/pm: Fix an error handling path in
vega10_enable_se_edc_force_stall_config() (git-fixes).</li>
<li>drm/amdgpu/vcn: reset fw_shared under SRIOV (git-fixes).</li>
<li>drm/amdgpu: Fix potential NULL pointer dereference in
atomctrl_get_smc_sclk_range_table (git-fixes).</li>
<li>drm/amdgpu: always sync the GFX pipe on ctx switch
(stable-fixes).</li>
<li>drm/amdgpu: simplify return statement in amdgpu_ras_eeprom_init
(git-fixes).</li>
<li>drm/amdgpu: tear down ttm range manager for doorbell in
amdgpu_ttm_fini() (git-fixes).</li>
<li>drm/amdkfd: Correct the migration DMA map direction
(stable-fixes).</li>
<li>drm/amdkfd: fixed page fault when enable MES shader debugger
(git-fixes).</li>
<li>drm/bridge: it6505: Change definition of AUX_FIFO_MAX_SIZE
(git-fixes).</li>
<li>drm/etnaviv: Fix page property being used for non writecombine
buffers (git-fixes).</li>
<li>drm/i915/fb: Relax clear color alignment to 64 bytes
(stable-fixes).</li>
<li>drm/mediatek: Add return value check when reading DPCD
(git-fixes).</li>
<li>drm/mediatek: Add support for 180-degree rotation in the display
driver (git-fixes).</li>
<li>drm/mediatek: Fix YCbCr422 color format issue for DP
(git-fixes).</li>
<li>drm/mediatek: Fix mode valid issue for dp (git-fixes).</li>
<li>drm/mediatek: Set private-&gt;all_drm_private[i]-&gt;drm to
NULL if mtk_drm_bind returns err (git-fixes).</li>
<li>drm/mediatek: mtk_dsi: Add registers to pdata to fix MT8186/MT8188
(git-fixes).</li>
<li>drm/mediatek: stop selecting foreign drivers (git-fixes).</li>
<li>drm/msm/dp: set safe_to_exit_level before printing it
(git-fixes).</li>
<li>drm/msm/dpu: link DSPP_2/_3 blocks on SC8180X (git-fixes).</li>
<li>drm/msm/dpu: link DSPP_2/_3 blocks on SM8150 (git-fixes).</li>
<li>drm/msm/dpu: link DSPP_2/_3 blocks on SM8250 (git-fixes).</li>
<li>drm/msm/dpu: link DSPP_2/_3 blocks on SM8350 (git-fixes).</li>
<li>drm/msm/dpu: link DSPP_2/_3 blocks on SM8550 (git-fixes).</li>
<li>drm/msm: Check return value of of_dma_configure()
(git-fixes).</li>
<li>drm/msm: do not clean up priv-&gt;kms prematurely
(git-fixes).</li>
<li>drm/rcar-du: dsi: Fix PHY lock bit check (git-fixes).</li>
<li>drm/rockchip: cdn-dp: Use drm_connector_helper_hpd_irq_event()
(git-fixes).</li>
<li>drm/rockchip: vop2: Check linear format for Cluster windows on
rk3566/8 (git-fixes).</li>
<li>drm/rockchip: vop2: Fix cluster windows alpha ctrl regsiters offset
(git-fixes).</li>
<li>drm/rockchip: vop2: Fix the mixer alpha setup for layer 0
(git-fixes).</li>
<li>drm/tidss: Clear the interrupt status for interrupts being disabled
(git-fixes).</li>
<li>drm/tidss: Fix issue in irq handling causing irq-flood issue
(git-fixes).</li>
<li>drm/v3d: Assign job pointer to NULL before signaling the fence
(git-fixes).</li>
<li>drm/v3d: Ensure job pointer is set to NULL after job completion
(git-fixes).</li>
<li>drm/v3d: Stop active perfmon if it is being destroyed
(git-fixes).</li>
<li>drm/vmwgfx: Add new keep_resv BO param (git-fixes).</li>
<li>exfat: ensure that ctime is updated whenever the mtime is
(git-fixes).</li>
<li>exfat: fix the infinite loop in __exfat_free_cluster()
(git-fixes).</li>
<li>exfat: fix the infinite loop in exfat_readdir()
(git-fixes).</li>
<li>fbdev: omapfb: Fix an OF node leak in dss_of_port_get_parent_device()
(git-fixes).</li>
<li>genirq: Make handle_enforce_irqctx() unconditionally available
(git-fixes).</li>
<li>genksyms: fix memory leak when the same symbol is added from source
(git-fixes).</li>
<li>genksyms: fix memory leak when the same symbol is read from *.symref
file (git-fixes).</li>
<li>gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
(git-fixes).</li>
<li>gpio: mxc: remove dead code after switch to DT-only
(git-fixes).</li>
<li>gpio: xilinx: Convert gpio_lock to raw spinlock
(git-fixes).</li>
<li>gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp()
(git-fixes).</li>
<li>hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors
occur (git-fixes).</li>
<li>hwmon: (drivetemp) Set scsi command timeout to 10s
(stable-fixes).</li>
<li>hwmon: (tmp513) Fix division of negative numbers
(git-fixes).</li>
<li>hyperv: Do not overlap the hvcall IO areas in get_vtl()
(git-fixes).</li>
<li>i2c: core: fix reference leak in i2c_register_adapter()
(git-fixes).</li>
<li>i2c: i801: Add support for Intel Arrow Lake-H
(stable-fixes).</li>
<li>i2c: i801: Add support for Intel Panther Lake
(stable-fixes).</li>
<li>i2c: mux: demux-pinctrl: check initial mux selection, too
(git-fixes).</li>
<li>i2c: rcar: fix NACK handling when being a target
(git-fixes).</li>
<li>i2c: xgene-slimpro: Migrate to use generic PCC shmem related macros
(stable-fixes).</li>
<li>ibmvnic: Free any outstanding tx skbs during scrq reset
(bsc#1226980).</li>
<li>ieee802154: ca8210: Add missing check for kfifo_alloc() in
ca8210_probe() (git-fixes).</li>
<li>iio: adc: ad7124: Disable all channels at probe time
(git-fixes).</li>
<li>iio: adc: ad_sigma_delta: Handle CS assertion as intended in
ad_sd_read_reg_raw() (git-fixes).</li>
<li>iio: adc: at91: call input_free_device() on allocated iio_dev
(git-fixes).</li>
<li>iio: adc: rockchip_saradc: fix information leak in triggered buffer
(git-fixes).</li>
<li>iio: adc: ti-ads124s08: Use gpiod_set_value_cansleep()
(git-fixes).</li>
<li>iio: adc: ti-ads8688: fix information leak in triggered buffer
(git-fixes).</li>
<li>iio: dummy: iio_simply_dummy_buffer: fix information leak in
triggered buffer (git-fixes).</li>
<li>iio: gyro: fxas21002c: Fix missing data update in trigger handler
(git-fixes).</li>
<li>iio: iio-mux: kzalloc instead of devm_kzalloc to ensure page
alignment (git-fixes).</li>
<li>iio: imu: kmx61: fix information leak in triggered buffer
(git-fixes).</li>
<li>iio: inkern: call iio_device_put() only on mapped devices
(git-fixes).</li>
<li>iio: light: as73211: fix channel handling in only-color triggered
buffer (git-fixes).</li>
<li>iio: light: vcnl4035: fix information leak in triggered buffer
(git-fixes).</li>
<li>iio: pressure: zpa2326: fix information leak in triggered buffer
(git-fixes).</li>
<li>iio: test : check null return of kunit_kmalloc in
iio_rescale_test_scale (git-fixes).</li>
<li>intel_th: core: fix kernel-doc warnings (git-fixes).</li>
<li>ipmi: ipmb: Add check devm_kasprintf() returned value
(git-fixes).</li>
<li>ipmi: ssif_bmc: Fix new request loss when bmc ready for a response
(git-fixes).</li>
<li>irqchip/gic-v3: Force propagation of the active state with a
read-back (stable-fixes).</li>
<li>irqchip/gic: Correct declaration of *percpu_base pointer in union
gic_base (stable-fixes).</li>
<li>kABI workaround for struct auto_pin_cfg_item change
(git-fixes).</li>
<li>kconfig: fix file name in warnings when loading
KCONFIG_DEFCONFIG_LIST (git-fixes).</li>
<li>kheaders: Ignore silly-rename files (stable-fixes).</li>
<li>ktest.pl: Avoid false positives with grub2 skip regex
(stable-fixes).</li>
<li>ktest.pl: Check kernelrelease return in get_version
(git-fixes).</li>
<li>ktest.pl: Fix typo &quot;accesing&quot;
(git-fixes).</li>
<li>ktest.pl: Fix typo in comment (git-fixes).</li>
<li>ktest.pl: Remove unused declarations in run_bisect_test function
(git-fixes).</li>
<li>ktest: force $buildonly = 1 for
&#x27;make_warnings_file&#x27; test type (stable-fixes).</li>
<li>landlock: Handle weird files (git-fixes).</li>
<li>latencytop: use correct kernel-doc format for func params
(git-fixes).</li>
<li>leds: lp8860: Write full EEPROM, not only half of it
(git-fixes).</li>
<li>leds: netxbig: Fix an OF node reference leak in
netxbig_leds_get_of_pdata() (git-fixes).</li>
<li>lib/inflate.c: remove dead code (git-fixes).</li>
<li>lib/stackdepot: print disabled message only if truly disabled
(git-fixes).</li>
<li>mac802154: check local interfaces before deleting sdata list
(stable-fixes).</li>
<li>mailbox: pcc: Add support for platform notification handling
(stable-fixes).</li>
<li>mailbox: pcc: Support shared interrupt for multiple subspaces
(stable-fixes).</li>
<li>mailbox: tegra-hsp: Clear mailbox before using message
(git-fixes).</li>
<li>maple_tree: simplify split calculation (git-fixes).</li>
<li>media: camif-core: Add check for clk_enable() (git-fixes).</li>
<li>media: ccs: Clean up parsed CCS static data on parse failure
(git-fixes).</li>
<li>media: ccs: Fix CCS static data parsing for large block sizes
(git-fixes).</li>
<li>media: ccs: Fix cleanup order in ccs_probe() (git-fixes).</li>
<li>media: dvb-usb-v2: af9035: fix ISO C90 compilation error on
af9035_i2c_master_xfer (git-fixes).</li>
<li>media: dvb: mb86a16: check the return value of mb86a16_read()
(git-fixes).</li>
<li>media: firewire: firedtv-avc.c: replace BUG with proper, error return
(git-fixes).</li>
<li>media: i2c: imx412: Add missing newline to prints
(git-fixes).</li>
<li>media: i2c: ov9282: Correct the exposure offset
(git-fixes).</li>
<li>media: imx-jpeg: Fix potential error pointer dereference in
detach_pm() (git-fixes).</li>
<li>media: imx296: Add standby delay during probe (git-fixes).</li>
<li>media: lmedm04: Handle errors for lme2510_int_read
(git-fixes).</li>
<li>media: marvell: Add check for clk_enable() (git-fixes).</li>
<li>media: mc: fix endpoint iteration (git-fixes).</li>
<li>media: mipi-csis: Add check for clk_enable() (git-fixes).</li>
<li>media: nxp: imx8-isi: fix v4l2-compliance test errors
(git-fixes).</li>
<li>media: ov08x40: Fix hblank out of range issue (git-fixes).</li>
<li>media: ov5640: fix get_light_freq on auto (git-fixes).</li>
<li>media: rc: iguanair: handle timeouts (git-fixes).</li>
<li>media: rkisp1: Fix unused value issue (git-fixes).</li>
<li>media: uvcvideo: Fix crash during unbind if gpio unit is in use
(git-fixes).</li>
<li>media: uvcvideo: Fix double free in error path
(git-fixes).</li>
<li>media: uvcvideo: Fix event flags in uvc_ctrl_send_events
(git-fixes).</li>
<li>media: uvcvideo: Force UVC version to 1.0a for 0408:4035
(stable-fixes).</li>
<li>media: uvcvideo: Only save async fh if success
(git-fixes).</li>
<li>media: uvcvideo: Propagate buf-&gt;error to userspace
(git-fixes).</li>
<li>media: uvcvideo: Remove dangling pointers (git-fixes).</li>
<li>media: uvcvideo: Remove redundant NULL assignment
(git-fixes).</li>
<li>media: uvcvideo: Support partial control reads
(git-fixes).</li>
<li>memory tiering: count PGPROMOTE_SUCCESS when mem tiering is enabled
(git-fixes).</li>
<li>memory-failure: use a folio in me_huge_page() (git-fixes).</li>
<li>memory: tegra20-emc: fix an OF node reference bug in
tegra_emc_find_node_by_ram_code() (git-fixes).</li>
<li>misc: fastrpc: Deregister device nodes properly in error scenarios
(git-fixes).</li>
<li>misc: fastrpc: Fix copy buffer page size (git-fixes).</li>
<li>misc: fastrpc: Fix registered buffer page address
(git-fixes).</li>
<li>misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ
handling (git-fixes).</li>
<li>misc: microchip: pci1xxxx: Resolve return code mismatch during GPIO
set config (git-fixes).</li>
<li>misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors
(git-fixes).</li>
<li>mm, kmsan: fix infinite recursion due to RCU critical section
(git-fixes).</li>
<li>mm,page_owner: do not remove __GFP_NOLOCKDEP in
add_stack_record_to_list (git-fixes).</li>
<li>mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes
(mm/compaction)).</li>
<li>mm/memory-failure: cast index to loff_t before shifting it
(git-fixes).</li>
<li>mm/memory-failure: check the mapcount of the precise page
(git-fixes).</li>
<li>mm/memory-failure: fix crash in split_huge_page_to_list from
soft_offline_page (git-fixes).</li>
<li>mm/memory-failure: pass the folio and the page to collect_procs()
(git-fixes).</li>
<li>mm/memory-failure: use raw_spinlock_t in struct memory_failure_cpu
(git-fixes).</li>
<li>mm/memory_hotplug: add missing mem_hotplug_lock
(git-fixes).</li>
<li>mm/memory_hotplug: fix error handling in add_memory_resource()
(git-fixes).</li>
<li>mm/memory_hotplug: prevent accessing by index=-1
(git-fixes).</li>
<li>mm/memory_hotplug: use pfn math in place of direct struct page
manipulation (git-fixes).</li>
<li>mm/migrate: correct nr_failed in migrate_pages_sync()
(git-fixes).</li>
<li>mm/migrate: fix deadlock in migrate_pages_batch() on large folios
(git-fixes).</li>
<li>mm/migrate: putback split folios when numa hint migration fails
(git-fixes).</li>
<li>mm/migrate: split source folio if it is on deferred split list
(git-fixes).</li>
<li>mm/page_owner: remove free_ts from page_owner output
(git-fixes).</li>
<li>mm/rodata_test: use READ_ONCE() to read const variable
(git-fixes).</li>
<li>mm: convert DAX lock/unlock page to lock/unlock folio
(git-fixes).</li>
<li>mm: memory-failure: ensure moving HWPoison flag to the raw error
pages (git-fixes).</li>
<li>mm: memory-failure: fetch compound head after extra page refcnt is
held (git-fixes).</li>
<li>mm: memory-failure: fix potential page refcnt leak in
memory_failure() (git-fixes).</li>
<li>mm: memory-failure: fix race window when trying to get hugetlb folio
(git-fixes).</li>
<li>mm: memory-failure: remove unneeded PageHuge() check
(git-fixes).</li>
<li>mm: prevent derefencing NULL ptr in pfn_section_valid()
(git-fixes).</li>
<li>modpost: fix the missed iteration for the max bit in do_input()
(git-fixes).</li>
<li>mtd: onenand: Fix uninitialized retlen in do_otp_read()
(git-fixes).</li>
<li>mtd: spinand: Remove write_enable_op() in markbad()
(git-fixes).</li>
<li>net/rose: prevent integer overflows in rose_setsockopt()
(git-fixes).</li>
<li>net: mana: Add get_link and get_link_ksettings in ethtool
(bsc#1236761).</li>
<li>net: mana: Cleanup &quot;mana&quot; debugfs dir after cleanup
of all children (bsc#1236760).</li>
<li>net: mana: Enable debugfs files for MANA device
(bsc#1236758).</li>
<li>net: netvsc: Update default VMBus channels (bsc#1236757).</li>
<li>net: phy: c45-tjaxx: add delay between MDIO write and read in
soft_reset (git-fixes).</li>
<li>net: rose: fix timer races against user threads
(git-fixes).</li>
<li>net: usb: qmi_wwan: add Telit FE910C04 compositions
(stable-fixes).</li>
<li>net: usb: rtl8150: enable basic endpoint checking
(git-fixes).</li>
<li>net: wwan: iosm: Properly check for valid exec stage in
ipc_mmio_init() (git-fixes).</li>
<li>net: wwan: t7xx: Fix FSM command timeout issue
(git-fixes).</li>
<li>netfilter: nf_tables: validate family when identifying table via
handle (bsc#1233778 ZDI-24-1454).</li>
<li>nilfs2: fix possible int overflows in nilfs_fiemap()
(git-fixes).</li>
<li>nvme-tcp: Fix I/O queue cpu spreading for multiple controllers
(git-fixes).</li>
<li>nvme: Add error check for xa_store in nvme_get_effects_log
(git-fixes).</li>
<li>nvme: Add error path for xa_store in nvme_init_effects
(git-fixes).</li>
<li>nvme: fix bogus kzalloc() return check in nvme_init_effects_log()
(git-fixes).</li>
<li>nvmet: propagate npwg topology (git-fixes).</li>
<li>padata: add pd get/put refcnt helper (git-fixes).</li>
<li>padata: avoid UAF for reorder_work (git-fixes).</li>
<li>padata: fix UAF in padata_reorder (git-fixes).</li>
<li>pinctrl: amd: Take suspend type into consideration which pins are
non-wake (git-fixes).</li>
<li>pinctrl: samsung: fix fwnode refcount cleanup if
platform_get_irq_optional() fails (git-fixes).</li>
<li>platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually
enabled it (git-fixes).</li>
<li>platform/x86/intel-uncore-freq: Ignore minor version change
(bsc#1225897).</li>
<li>platform/x86/intel/tpmi: Add defines to get version information
(bsc#1225897).</li>
<li>pm:cpupower: Add missing powercap_set_enabled() stub function
(git-fixes).</li>
<li>power: ip5xxx_power: Fix return value on ADC read errors
(git-fixes).</li>
<li>powerpc/iommu: Move pSeries specific functions to pseries/iommu.c
(bsc#1220711 ltc#205755).</li>
<li>powerpc/iommu: Only build sPAPR access functions on pSeries
(bsc#1220711 ltc#205755).</li>
<li>powerpc/powernv/pci: Remove MVE code (bsc#1220711
ltc#205755).</li>
<li>powerpc/powernv/pci: Remove ioda1 support (bsc#1220711
ltc#205755).</li>
<li>powerpc/powernv/pci: Remove last IODA1 defines (bsc#1220711
ltc#205755).</li>
<li>powerpc/pseries/eeh: Fix get PE state translation
(bsc#1215199).</li>
<li>powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW
(bsc#1218470 ltc#204531).</li>
<li>powerpc/pseries/vas: Add close() callback in vas_vm_ops struct
(bsc#1234825).</li>
<li>pps: add an error check in parport_attach (git-fixes).</li>
<li>pps: remove usage of the deprecated ida_simple_xx() API
(stable-fixes).</li>
<li>printk: Add is_printk_legacy_deferred() (bsc#1236733).</li>
<li>printk: Defer legacy printing when holding printk_cpu_sync
(bsc#1236733).</li>
<li>pwm: stm32-lp: Add check for clk_enable() (git-fixes).</li>
<li>pwm: stm32: Add check for clk_enable() (git-fixes).</li>
<li>r8169: enable SG/TSO on selected chip versions per default
(bsc#1235874).</li>
<li>rcu-tasks: Pull sampling of -&gt;percpu_dequeue_lim out of loop
(git-fixes)</li>
<li>rcu/tree: Defer setting of jiffies during stall reset
(git-fixes)</li>
<li>rcu: Dump memory object info if callback function is invalid
(git-fixes)</li>
<li>rcu: Eliminate rcu_gp_slow_unregister() false positive
(git-fixes)</li>
<li>rcuscale: Move rcu_scale_writer() (git-fixes)</li>
<li>rdma/cxgb4: Prevent potential integer overflow on 32bit
(git-fixes)</li>
<li>regulator: core: Add missing newline character
(git-fixes).</li>
<li>regulator: of: Implement the unwind path of of_regulator_match()
(git-fixes).</li>
<li>remoteproc: core: Fix ida_free call while not allocated
(git-fixes).</li>
<li>rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
(git-fixes).</li>
<li>rtc: zynqmp: Fix optional clock name property (git-fixes).</li>
<li>s390x config: IOMMU_DEFAULT_DMA_LAZY=y (bsc#1235646)</li>
<li>samples/landlock: Fix possible NULL dereference in parse_path()
(git-fixes).</li>
<li>sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat
(bsc#1235865).</li>
<li>sched/fair: Fix value reported by hot tasks pulled in /proc/schedstat
-kabi (bsc#1235865).</li>
<li>scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
(git-fixes).</li>
<li>seccomp: Stub for !CONFIG_SECCOMP (stable-fixes).</li>
<li>selftest: media_tests: fix trivial UAF typo (git-fixes).</li>
<li>selftests/alsa: Fix circular dependency involving global-timer
(stable-fixes).</li>
<li>selftests/landlock: Fix error message (git-fixes).</li>
<li>selftests/mm/cow: modify the incorrect checking parameters
(git-fixes).</li>
<li>selftests/powerpc: Fix argument order to timer_sub()
(git-fixes).</li>
<li>selftests: harness: fix printing of mismatch values in __EXPECT()
(git-fixes).</li>
<li>selftests: mptcp: avoid spurious errors on disconnect
(git-fixes).</li>
<li>selftests: tc-testing: reduce rshift value (stable-fixes).</li>
<li>selftests: timers: clocksource-switch: Adapt progress to kselftest
framework (git-fixes).</li>
<li>selinux: Fix SCTP error inconsistency in selinux_socket_bind()
(git-fixes).</li>
<li>serial: 8250: Adjust the timeout for FIFO mode
(git-fixes).</li>
<li>serial: sh-sci: Do not probe the serial port if its slot in
sci_ports[] is in use (git-fixes).</li>
<li>serial: sh-sci: Drop __initdata macro for port_cfg
(git-fixes).</li>
<li>ocfs2: temporarily disable upstream patch (bsc#1236138).</li>
<li>soc: atmel: fix device_node release in atmel_soc_device_init()
(git-fixes).</li>
<li>soc: mediatek: mtk-devapc: Fix leaking IO map on error paths
(git-fixes).</li>
<li>soc: qcom: smem_state: fix missing of_node_put in error path
(git-fixes).</li>
<li>soc: qcom: socinfo: Avoid out of bounds read of serial number
(git-fixes).</li>
<li>sound: usb: enable DSD output for ddHiFi TC44C
(stable-fixes).</li>
<li>sound: usb: format: do not warn that raw DSD is unsupported
(stable-fixes).</li>
<li>spi: zynq-qspi: Add check for clk_enable() (git-fixes).</li>
<li>srcu: Fix srcu_struct node grpmask overflow on 64-bit systems
(git-fixes)</li>
<li>srcu: Only accelerate on enqueue time (git-fixes)</li>
<li>stackdepot: rename pool_index to pool_index_plus_1
(git-fixes).</li>
<li>stackdepot: respect __GFP_NOLOCKDEP allocation flag
(git-fixes).</li>
<li>staging: iio: ad9832: Correct phase range check
(git-fixes).</li>
<li>staging: iio: ad9834: Correct phase range check
(git-fixes).</li>
<li>staging: media: imx: fix OF node leak in imx_media_add_of_subdevs()
(git-fixes).</li>
<li>staging: media: max96712: fix kernel oops when removing module
(git-fixes).</li>
<li>thermal: of: fix OF node leak in of_thermal_zone_find()
(git-fixes).</li>
<li>thunderbolt: Add support for Intel Lunar Lake
(stable-fixes).</li>
<li>thunderbolt: Add support for Intel Panther Lake-M/P
(stable-fixes).</li>
<li>tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).</li>
<li>tools: Sync if_xdp.h uapi tooling header (git-fixes).</li>
<li>tpm: Map the ACPI provided event log (bsc#1233260 bsc#1233259
bsc#1232421).</li>
<li>tty: serial: 8250: Fix another runtime PM usage counter underflow
(git-fixes).</li>
<li>tty: xilinx_uartps: split sysrq handling (git-fixes).</li>
<li>ubifs: skip dumping tnc tree when zroot is null
(git-fixes).</li>
<li>uio: Fix return value of poll (git-fixes).</li>
<li>uio: uio_dmem_genirq: check the return value of devm_kasprintf()
(git-fixes).</li>
<li>usb-storage: Add max sectors quirk for Nokia 208
(stable-fixes).</li>
<li>usb: chipidea: add CI_HDRC_FORCE_VBUS_ACTIVE_ALWAYS flag
(stable-fixes).</li>
<li>usb: chipidea: ci_hdrc_imx: decrement device&#x27;s refcount in
.remove() and in the error path of .probe() (git-fixes).</li>
<li>usb: dwc3-am62: Disable autosuspend during remove
(git-fixes).</li>
<li>usb: dwc3-am62: Fix an OF node leak in phy_syscon_pll_refclk()
(git-fixes).</li>
<li>usb: dwc3: gadget: fix writing NYET threshold (git-fixes).</li>
<li>usb: fix reference leak in usb_new_device() (git-fixes).</li>
<li>usb: gadget: configfs: Ignore trailing LF for user strings to cdev
(git-fixes).</li>
<li>usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
(git-fixes).</li>
<li>usb: gadget: f_tcm: Decrement command ref count on cleanup
(git-fixes).</li>
<li>usb: gadget: f_tcm: Do not free command immediately
(git-fixes).</li>
<li>usb: gadget: f_tcm: Do not prepare BOT write request twice
(git-fixes).</li>
<li>usb: gadget: f_tcm: Fix Get/SetInterface return value
(git-fixes).</li>
<li>usb: gadget: f_tcm: Translate error to sense (git-fixes).</li>
<li>usb: gadget: f_tcm: ep_autoconfig with fullspeed endpoint
(git-fixes).</li>
<li>usb: gadget: f_uac2: Fix incorrect setting of bNumEndpoints
(git-fixes).</li>
<li>usb: gadget: u_serial: Disable ep before setting port to null to fix
the crash caused by port being null (git-fixes).</li>
<li>usb: host: xhci-plat: Assign shared_hcd-&gt;rsrc_start
(git-fixes).</li>
<li>usb: typec: fix pm usage counter imbalance in ucsi_ccg_sync_control()
(bsc#1235001)</li>
<li>usb: typec: tcpm/tcpci_maxim: fix error code in
max_contaminant_read_resistance_kohm() (git-fixes).</li>
<li>usb: typec: tcpm: set SRC_SEND_CAPABILITIES timeout to
PD_T_SENDER_RESPONSE (git-fixes).</li>
<li>usbnet: ipheth: break up NCM header size computation
(git-fixes).</li>
<li>usbnet: ipheth: check that DPE points past NCM header
(git-fixes).</li>
<li>usbnet: ipheth: fix DPE OoB read (git-fixes).</li>
<li>usbnet: ipheth: fix possible overflow in DPE length check
(git-fixes).</li>
<li>usbnet: ipheth: refactor NCM datagram loop (git-fixes).</li>
<li>usbnet: ipheth: use static NDP16 location in URB
(git-fixes).</li>
<li>vfio/pci: Lock external INTx masking ops (bsc#1222803).</li>
<li>virtio-mem: check if the config changed before fake offlining memory
(git-fixes).</li>
<li>virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY
(git-fixes).</li>
<li>virtio-mem: keep retrying on offline_and_remove_memory() errors in
Sub Block Mode (SBM) (git-fixes).</li>
<li>virtio-mem: remove unsafe unplug in Big Block Mode (BBM)
(git-fixes).</li>
<li>vmscan,migrate: fix page count imbalance on node stats when demoting
pages (git-fixes).</li>
<li>vsock/virtio: cancel close work in the destructor
(git-fixes)</li>
<li>vsock: Keep the binding until socket destruction
(git-fixes)</li>
<li>vsock: reset socket state when de-assigning the transport
(git-fixes)</li>
<li>watchdog: rzg2l_wdt: Power on the watchdog domain in the restart
handler (stable-fixes).</li>
<li>watchdog: rzg2l_wdt: Rely on the reset driver for doing proper reset
(stable-fixes).</li>
<li>watchdog: rzg2l_wdt: Remove reset de-assert from probe
(stable-fixes).</li>
<li>wifi: ath11k: Fix unexpected return buffer manager error for
WCN6750/WCN6855 (git-fixes).</li>
<li>wifi: ath11k: cleanup struct ath11k_mon_data (git-fixes).</li>
<li>wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask()
(stable-fixes).</li>
<li>wifi: ath12k: fix tx power, max reg power update to firmware
(git-fixes).</li>
<li>wifi: brcmfmac: add missing header include for brcmf_dbg
(git-fixes).</li>
<li>wifi: cfg80211: adjust allocation of colocated AP data
(git-fixes).</li>
<li>wifi: iwlwifi: fw: read STEP table from correct UEFI var
(git-fixes).</li>
<li>wifi: mac80211: Add non-atomic station iterator
(stable-fixes).</li>
<li>wifi: mac80211: Fix common size calculation for ML element
(git-fixes).</li>
<li>wifi: mac80211: do not flush non-uploaded STAs
(git-fixes).</li>
<li>wifi: mac80211: export ieee80211_purge_tx_queue() for drivers
(stable-fixes).</li>
<li>wifi: mac80211: fix mbss changed flags corruption on 32 bit systems
(stable-fixes).</li>
<li>wifi: mac80211: fix tid removal during mesh forwarding
(git-fixes).</li>
<li>wifi: mac80211: prohibit deactivating all links
(git-fixes).</li>
<li>wifi: mac80211: wake the queues in case of failure in resume
(stable-fixes).</li>
<li>wifi: mt76: mt76u_vendor_request: Do not print error messages when
-EPROTO (git-fixes).</li>
<li>wifi: mt76: mt7915: Fix mesh scan on MT7916 DBDC
(git-fixes).</li>
<li>wifi: mt76: mt7915: add module param to select 5 GHz or 6 GHz on
MT7916 (git-fixes).</li>
<li>wifi: mt76: mt7915: firmware restart on devices with a second pcie
link (git-fixes).</li>
<li>wifi: mt76: mt7915: fix overflows seen when writing limit attributes
(git-fixes).</li>
<li>wifi: mt76: mt7915: fix register mapping (git-fixes).</li>
<li>wifi: mt76: mt7921: fix using incorrect group cipher after
disconnection (git-fixes).</li>
<li>wifi: mt76: mt7925: fix off by one in mt7925_load_clc()
(git-fixes).</li>
<li>wifi: mt76: mt7996: add max mpdu len capability
(git-fixes).</li>
<li>wifi: mt76: mt7996: fix HE Phy capability (git-fixes).</li>
<li>wifi: mt76: mt7996: fix definition of tx descriptor
(git-fixes).</li>
<li>wifi: mt76: mt7996: fix incorrect indexing of MIB FW event
(git-fixes).</li>
<li>wifi: mt76: mt7996: fix ldpc setting (git-fixes).</li>
<li>wifi: mt76: mt7996: fix overflows seen when writing limit attributes
(git-fixes).</li>
<li>wifi: mt76: mt7996: fix register mapping (git-fixes).</li>
<li>wifi: mt76: mt7996: fix rx filter setting for bfee functionality
(git-fixes).</li>
<li>wifi: mt76: mt7996: fix the capability of reception of EHT MU PPDU
(git-fixes).</li>
<li>wifi: rtlwifi: destroy workqueue at rtl_deinit_core
(git-fixes).</li>
<li>wifi: rtlwifi: do not complete firmware loading needlessly
(git-fixes).</li>
<li>wifi: rtlwifi: fix init_sw_vars leak when probe fails
(git-fixes).</li>
<li>wifi: rtlwifi: fix memory leaks and invalid access at probe error
path (git-fixes).</li>
<li>wifi: rtlwifi: pci: wait for firmware loading before releasing memory
(git-fixes).</li>
<li>wifi: rtlwifi: remove unused check_buddy_priv (git-fixes).</li>
<li>wifi: rtlwifi: rtl8192se: rise completion of firmware loading as last
step (git-fixes).</li>
<li>wifi: rtlwifi: rtl8821ae: Fix media status report
(git-fixes).</li>
<li>wifi: rtlwifi: rtl8821ae: phy: restore removed code to fix infinite
loop (git-fixes).</li>
<li>wifi: rtlwifi: usb: fix workqueue leak when probe fails
(git-fixes).</li>
<li>wifi: rtlwifi: wait for firmware loading before releasing memory
(git-fixes).</li>
<li>wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb
(stable-fixes).</li>
<li>wifi: rtw89: mcc: consider time limits not divisible by 1024
(git-fixes).</li>
<li>wifi: wcn36xx: fix channel survey memory allocation size
(git-fixes).</li>
<li>wifi: wlcore: fix unbalanced pm_runtime calls (git-fixes).</li>
<li>workqueue: Add rcu lock check at the end of work item execution
(bsc#1236732).</li>
<li>x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH
dom0 (git-fixes).</li>
<li>xfs: Add error handling for xfs_reflink_cancel_cow_range
(git-fixes).</li>
<li>xfs: Propagate errors from xfs_reflink_cancel_cow_range in
xfs_dax_write_iomap_end (git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.6


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.6-2025-557=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Live-Patching-15-SP6-2025-557=1</code>



</li>

<li class="list-group-item">
SUSE Real Time Module 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-RT-15-SP6-2025-557=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.6 (x86_64)
<ul>


<li>kernel-rt-devel-6.4.0-150600.10.26.1</li>


<li>reiserfs-kmp-rt-6.4.0-150600.10.26.1</li>


<li>reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>gfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>dlm-kmp-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt-debugsource-6.4.0-150600.10.26.1</li>


<li>cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-devel-6.4.0-150600.10.26.1</li>


<li>kernel-rt-devel-debuginfo-6.4.0-150600.10.26.1</li>


<li>ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-debugsource-6.4.0-150600.10.26.1</li>


<li>kernel-rt-extra-6.4.0-150600.10.26.1</li>


<li>kernel-rt-livepatch-devel-6.4.0-150600.10.26.1</li>


<li>kernel-syms-rt-6.4.0-150600.10.26.1</li>


<li>dlm-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.26.1</li>


<li>cluster-md-kmp-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-vdso-6.4.0-150600.10.26.1</li>


<li>kernel-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>gfs2-kmp-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt-vdso-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt-optional-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt-vdso-6.4.0-150600.10.26.1</li>


<li>kselftests-kmp-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt-extra-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-debuginfo-6.4.0-150600.10.26.1</li>


<li>kselftests-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt-optional-6.4.0-150600.10.26.1</li>


<li>ocfs2-kmp-rt-6.4.0-150600.10.26.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (noarch)
<ul>


<li>kernel-source-rt-6.4.0-150600.10.26.1</li>


<li>kernel-devel-rt-6.4.0-150600.10.26.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (nosrc x86_64)
<ul>

<li>kernel-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-6.4.0-150600.10.26.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
<ul>


<li>kernel-livepatch-6_4_0-150600_10_26-rt-debuginfo-1-150600.1.3.1</li>


<li>kernel-livepatch-6_4_0-150600_10_26-rt-1-150600.1.3.1</li>


<li>kernel-livepatch-SLE15-SP6-RT_Update_8-debugsource-1-150600.1.3.1</li>

</ul>
</li>



<li>
SUSE Real Time Module 15-SP6 (x86_64)
<ul>


<li>kernel-rt-devel-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt-devel-6.4.0-150600.10.26.1</li>


<li>gfs2-kmp-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-debugsource-6.4.0-150600.10.26.1</li>


<li>gfs2-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>dlm-kmp-rt-6.4.0-150600.10.26.1</li>


<li>kernel-syms-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt-debugsource-6.4.0-150600.10.26.1</li>


<li>cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>dlm-kmp-rt-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-debuginfo-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.26.1</li>


<li>cluster-md-kmp-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-devel-6.4.0-150600.10.26.1</li>


<li>ocfs2-kmp-rt-6.4.0-150600.10.26.1</li>

</ul>
</li>

<li>
SUSE Real Time Module 15-SP6 (noarch)
<ul>


<li>kernel-source-rt-6.4.0-150600.10.26.1</li>


<li>kernel-devel-rt-6.4.0-150600.10.26.1</li>

</ul>
</li>

<li>
SUSE Real Time Module 15-SP6 (nosrc x86_64)
<ul>

<li>kernel-rt-6.4.0-150600.10.26.1</li>


<li>kernel-rt_debug-6.4.0-150600.10.26.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52923.html">https://www.suse.com/security/cve/CVE-2023-52923.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36476.html">https://www.suse.com/security/cve/CVE-2024-36476.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-39282.html">https://www.suse.com/security/cve/CVE-2024-39282.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43913.html">https://www.suse.com/security/cve/CVE-2024-43913.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45828.html">https://www.suse.com/security/cve/CVE-2024-45828.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46858.html">https://www.suse.com/security/cve/CVE-2024-46858.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46896.html">https://www.suse.com/security/cve/CVE-2024-46896.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47141.html">https://www.suse.com/security/cve/CVE-2024-47141.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47143.html">https://www.suse.com/security/cve/CVE-2024-47143.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47809.html">https://www.suse.com/security/cve/CVE-2024-47809.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-48873.html">https://www.suse.com/security/cve/CVE-2024-48873.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-48881.html">https://www.suse.com/security/cve/CVE-2024-48881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49569.html">https://www.suse.com/security/cve/CVE-2024-49569.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49948.html">https://www.suse.com/security/cve/CVE-2024-49948.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49951.html">https://www.suse.com/security/cve/CVE-2024-49951.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49978.html">https://www.suse.com/security/cve/CVE-2024-49978.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49998.html">https://www.suse.com/security/cve/CVE-2024-49998.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50051.html">https://www.suse.com/security/cve/CVE-2024-50051.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50106.html">https://www.suse.com/security/cve/CVE-2024-50106.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50151.html">https://www.suse.com/security/cve/CVE-2024-50151.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50199.html">https://www.suse.com/security/cve/CVE-2024-50199.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50251.html">https://www.suse.com/security/cve/CVE-2024-50251.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50258.html">https://www.suse.com/security/cve/CVE-2024-50258.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50299.html">https://www.suse.com/security/cve/CVE-2024-50299.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50304.html">https://www.suse.com/security/cve/CVE-2024-50304.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-52332.html">https://www.suse.com/security/cve/CVE-2024-52332.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53091.html">https://www.suse.com/security/cve/CVE-2024-53091.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53095.html">https://www.suse.com/security/cve/CVE-2024-53095.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53164.html">https://www.suse.com/security/cve/CVE-2024-53164.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53168.html">https://www.suse.com/security/cve/CVE-2024-53168.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53170.html">https://www.suse.com/security/cve/CVE-2024-53170.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53172.html">https://www.suse.com/security/cve/CVE-2024-53172.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53175.html">https://www.suse.com/security/cve/CVE-2024-53175.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53185.html">https://www.suse.com/security/cve/CVE-2024-53185.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53187.html">https://www.suse.com/security/cve/CVE-2024-53187.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53194.html">https://www.suse.com/security/cve/CVE-2024-53194.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53195.html">https://www.suse.com/security/cve/CVE-2024-53195.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53196.html">https://www.suse.com/security/cve/CVE-2024-53196.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53197.html">https://www.suse.com/security/cve/CVE-2024-53197.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53198.html">https://www.suse.com/security/cve/CVE-2024-53198.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53203.html">https://www.suse.com/security/cve/CVE-2024-53203.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53227.html">https://www.suse.com/security/cve/CVE-2024-53227.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53230.html">https://www.suse.com/security/cve/CVE-2024-53230.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53231.html">https://www.suse.com/security/cve/CVE-2024-53231.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53232.html">https://www.suse.com/security/cve/CVE-2024-53232.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53233.html">https://www.suse.com/security/cve/CVE-2024-53233.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53236.html">https://www.suse.com/security/cve/CVE-2024-53236.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53239.html">https://www.suse.com/security/cve/CVE-2024-53239.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53685.html">https://www.suse.com/security/cve/CVE-2024-53685.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53690.html">https://www.suse.com/security/cve/CVE-2024-53690.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-54680.html">https://www.suse.com/security/cve/CVE-2024-54680.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-55639.html">https://www.suse.com/security/cve/CVE-2024-55639.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-55881.html">https://www.suse.com/security/cve/CVE-2024-55881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-55916.html">https://www.suse.com/security/cve/CVE-2024-55916.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56369.html">https://www.suse.com/security/cve/CVE-2024-56369.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56372.html">https://www.suse.com/security/cve/CVE-2024-56372.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56531.html">https://www.suse.com/security/cve/CVE-2024-56531.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56532.html">https://www.suse.com/security/cve/CVE-2024-56532.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56533.html">https://www.suse.com/security/cve/CVE-2024-56533.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56538.html">https://www.suse.com/security/cve/CVE-2024-56538.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56543.html">https://www.suse.com/security/cve/CVE-2024-56543.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56546.html">https://www.suse.com/security/cve/CVE-2024-56546.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56548.html">https://www.suse.com/security/cve/CVE-2024-56548.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56557.html">https://www.suse.com/security/cve/CVE-2024-56557.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56558.html">https://www.suse.com/security/cve/CVE-2024-56558.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56568.html">https://www.suse.com/security/cve/CVE-2024-56568.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56569.html">https://www.suse.com/security/cve/CVE-2024-56569.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56570.html">https://www.suse.com/security/cve/CVE-2024-56570.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56571.html">https://www.suse.com/security/cve/CVE-2024-56571.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56572.html">https://www.suse.com/security/cve/CVE-2024-56572.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56573.html">https://www.suse.com/security/cve/CVE-2024-56573.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56574.html">https://www.suse.com/security/cve/CVE-2024-56574.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56575.html">https://www.suse.com/security/cve/CVE-2024-56575.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56577.html">https://www.suse.com/security/cve/CVE-2024-56577.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56578.html">https://www.suse.com/security/cve/CVE-2024-56578.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56584.html">https://www.suse.com/security/cve/CVE-2024-56584.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56587.html">https://www.suse.com/security/cve/CVE-2024-56587.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56588.html">https://www.suse.com/security/cve/CVE-2024-56588.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56589.html">https://www.suse.com/security/cve/CVE-2024-56589.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56590.html">https://www.suse.com/security/cve/CVE-2024-56590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56592.html">https://www.suse.com/security/cve/CVE-2024-56592.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56593.html">https://www.suse.com/security/cve/CVE-2024-56593.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56594.html">https://www.suse.com/security/cve/CVE-2024-56594.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56595.html">https://www.suse.com/security/cve/CVE-2024-56595.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56596.html">https://www.suse.com/security/cve/CVE-2024-56596.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56597.html">https://www.suse.com/security/cve/CVE-2024-56597.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56598.html">https://www.suse.com/security/cve/CVE-2024-56598.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-5660.html">https://www.suse.com/security/cve/CVE-2024-5660.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56600.html">https://www.suse.com/security/cve/CVE-2024-56600.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56601.html">https://www.suse.com/security/cve/CVE-2024-56601.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56602.html">https://www.suse.com/security/cve/CVE-2024-56602.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56603.html">https://www.suse.com/security/cve/CVE-2024-56603.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56606.html">https://www.suse.com/security/cve/CVE-2024-56606.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56607.html">https://www.suse.com/security/cve/CVE-2024-56607.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56608.html">https://www.suse.com/security/cve/CVE-2024-56608.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56609.html">https://www.suse.com/security/cve/CVE-2024-56609.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56610.html">https://www.suse.com/security/cve/CVE-2024-56610.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56611.html">https://www.suse.com/security/cve/CVE-2024-56611.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56614.html">https://www.suse.com/security/cve/CVE-2024-56614.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56615.html">https://www.suse.com/security/cve/CVE-2024-56615.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56616.html">https://www.suse.com/security/cve/CVE-2024-56616.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56617.html">https://www.suse.com/security/cve/CVE-2024-56617.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56619.html">https://www.suse.com/security/cve/CVE-2024-56619.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56620.html">https://www.suse.com/security/cve/CVE-2024-56620.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56622.html">https://www.suse.com/security/cve/CVE-2024-56622.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56623.html">https://www.suse.com/security/cve/CVE-2024-56623.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56625.html">https://www.suse.com/security/cve/CVE-2024-56625.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56629.html">https://www.suse.com/security/cve/CVE-2024-56629.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56630.html">https://www.suse.com/security/cve/CVE-2024-56630.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56631.html">https://www.suse.com/security/cve/CVE-2024-56631.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56632.html">https://www.suse.com/security/cve/CVE-2024-56632.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56634.html">https://www.suse.com/security/cve/CVE-2024-56634.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56635.html">https://www.suse.com/security/cve/CVE-2024-56635.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56636.html">https://www.suse.com/security/cve/CVE-2024-56636.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56637.html">https://www.suse.com/security/cve/CVE-2024-56637.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56641.html">https://www.suse.com/security/cve/CVE-2024-56641.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56642.html">https://www.suse.com/security/cve/CVE-2024-56642.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56643.html">https://www.suse.com/security/cve/CVE-2024-56643.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56644.html">https://www.suse.com/security/cve/CVE-2024-56644.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56648.html">https://www.suse.com/security/cve/CVE-2024-56648.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56649.html">https://www.suse.com/security/cve/CVE-2024-56649.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56650.html">https://www.suse.com/security/cve/CVE-2024-56650.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56651.html">https://www.suse.com/security/cve/CVE-2024-56651.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56654.html">https://www.suse.com/security/cve/CVE-2024-56654.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56656.html">https://www.suse.com/security/cve/CVE-2024-56656.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56658.html">https://www.suse.com/security/cve/CVE-2024-56658.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56659.html">https://www.suse.com/security/cve/CVE-2024-56659.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56660.html">https://www.suse.com/security/cve/CVE-2024-56660.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56661.html">https://www.suse.com/security/cve/CVE-2024-56661.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56662.html">https://www.suse.com/security/cve/CVE-2024-56662.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56663.html">https://www.suse.com/security/cve/CVE-2024-56663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56664.html">https://www.suse.com/security/cve/CVE-2024-56664.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56665.html">https://www.suse.com/security/cve/CVE-2024-56665.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56670.html">https://www.suse.com/security/cve/CVE-2024-56670.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56672.html">https://www.suse.com/security/cve/CVE-2024-56672.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56675.html">https://www.suse.com/security/cve/CVE-2024-56675.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56677.html">https://www.suse.com/security/cve/CVE-2024-56677.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56678.html">https://www.suse.com/security/cve/CVE-2024-56678.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56679.html">https://www.suse.com/security/cve/CVE-2024-56679.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56681.html">https://www.suse.com/security/cve/CVE-2024-56681.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56683.html">https://www.suse.com/security/cve/CVE-2024-56683.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56687.html">https://www.suse.com/security/cve/CVE-2024-56687.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56688.html">https://www.suse.com/security/cve/CVE-2024-56688.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56690.html">https://www.suse.com/security/cve/CVE-2024-56690.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56691.html">https://www.suse.com/security/cve/CVE-2024-56691.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56693.html">https://www.suse.com/security/cve/CVE-2024-56693.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56694.html">https://www.suse.com/security/cve/CVE-2024-56694.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56698.html">https://www.suse.com/security/cve/CVE-2024-56698.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56700.html">https://www.suse.com/security/cve/CVE-2024-56700.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56701.html">https://www.suse.com/security/cve/CVE-2024-56701.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56704.html">https://www.suse.com/security/cve/CVE-2024-56704.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56705.html">https://www.suse.com/security/cve/CVE-2024-56705.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56707.html">https://www.suse.com/security/cve/CVE-2024-56707.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56708.html">https://www.suse.com/security/cve/CVE-2024-56708.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56709.html">https://www.suse.com/security/cve/CVE-2024-56709.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56712.html">https://www.suse.com/security/cve/CVE-2024-56712.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56715.html">https://www.suse.com/security/cve/CVE-2024-56715.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56716.html">https://www.suse.com/security/cve/CVE-2024-56716.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56722.html">https://www.suse.com/security/cve/CVE-2024-56722.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56723.html">https://www.suse.com/security/cve/CVE-2024-56723.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56724.html">https://www.suse.com/security/cve/CVE-2024-56724.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56725.html">https://www.suse.com/security/cve/CVE-2024-56725.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56726.html">https://www.suse.com/security/cve/CVE-2024-56726.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56727.html">https://www.suse.com/security/cve/CVE-2024-56727.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56728.html">https://www.suse.com/security/cve/CVE-2024-56728.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56729.html">https://www.suse.com/security/cve/CVE-2024-56729.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56739.html">https://www.suse.com/security/cve/CVE-2024-56739.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56741.html">https://www.suse.com/security/cve/CVE-2024-56741.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56745.html">https://www.suse.com/security/cve/CVE-2024-56745.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56746.html">https://www.suse.com/security/cve/CVE-2024-56746.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56747.html">https://www.suse.com/security/cve/CVE-2024-56747.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56748.html">https://www.suse.com/security/cve/CVE-2024-56748.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56759.html">https://www.suse.com/security/cve/CVE-2024-56759.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56760.html">https://www.suse.com/security/cve/CVE-2024-56760.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56763.html">https://www.suse.com/security/cve/CVE-2024-56763.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56765.html">https://www.suse.com/security/cve/CVE-2024-56765.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56766.html">https://www.suse.com/security/cve/CVE-2024-56766.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56767.html">https://www.suse.com/security/cve/CVE-2024-56767.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56769.html">https://www.suse.com/security/cve/CVE-2024-56769.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56774.html">https://www.suse.com/security/cve/CVE-2024-56774.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56775.html">https://www.suse.com/security/cve/CVE-2024-56775.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56776.html">https://www.suse.com/security/cve/CVE-2024-56776.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56777.html">https://www.suse.com/security/cve/CVE-2024-56777.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56778.html">https://www.suse.com/security/cve/CVE-2024-56778.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56779.html">https://www.suse.com/security/cve/CVE-2024-56779.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56780.html">https://www.suse.com/security/cve/CVE-2024-56780.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56787.html">https://www.suse.com/security/cve/CVE-2024-56787.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57791.html">https://www.suse.com/security/cve/CVE-2024-57791.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57792.html">https://www.suse.com/security/cve/CVE-2024-57792.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57793.html">https://www.suse.com/security/cve/CVE-2024-57793.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57795.html">https://www.suse.com/security/cve/CVE-2024-57795.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57798.html">https://www.suse.com/security/cve/CVE-2024-57798.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57801.html">https://www.suse.com/security/cve/CVE-2024-57801.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57802.html">https://www.suse.com/security/cve/CVE-2024-57802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57804.html">https://www.suse.com/security/cve/CVE-2024-57804.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57809.html">https://www.suse.com/security/cve/CVE-2024-57809.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57838.html">https://www.suse.com/security/cve/CVE-2024-57838.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57849.html">https://www.suse.com/security/cve/CVE-2024-57849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57850.html">https://www.suse.com/security/cve/CVE-2024-57850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57857.html">https://www.suse.com/security/cve/CVE-2024-57857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57874.html">https://www.suse.com/security/cve/CVE-2024-57874.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57876.html">https://www.suse.com/security/cve/CVE-2024-57876.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57882.html">https://www.suse.com/security/cve/CVE-2024-57882.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57884.html">https://www.suse.com/security/cve/CVE-2024-57884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57887.html">https://www.suse.com/security/cve/CVE-2024-57887.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57888.html">https://www.suse.com/security/cve/CVE-2024-57888.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57890.html">https://www.suse.com/security/cve/CVE-2024-57890.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57892.html">https://www.suse.com/security/cve/CVE-2024-57892.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57893.html">https://www.suse.com/security/cve/CVE-2024-57893.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57896.html">https://www.suse.com/security/cve/CVE-2024-57896.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57897.html">https://www.suse.com/security/cve/CVE-2024-57897.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57899.html">https://www.suse.com/security/cve/CVE-2024-57899.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57903.html">https://www.suse.com/security/cve/CVE-2024-57903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57904.html">https://www.suse.com/security/cve/CVE-2024-57904.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57906.html">https://www.suse.com/security/cve/CVE-2024-57906.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57907.html">https://www.suse.com/security/cve/CVE-2024-57907.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57908.html">https://www.suse.com/security/cve/CVE-2024-57908.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57910.html">https://www.suse.com/security/cve/CVE-2024-57910.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57911.html">https://www.suse.com/security/cve/CVE-2024-57911.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57912.html">https://www.suse.com/security/cve/CVE-2024-57912.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57913.html">https://www.suse.com/security/cve/CVE-2024-57913.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57915.html">https://www.suse.com/security/cve/CVE-2024-57915.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57916.html">https://www.suse.com/security/cve/CVE-2024-57916.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57917.html">https://www.suse.com/security/cve/CVE-2024-57917.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57922.html">https://www.suse.com/security/cve/CVE-2024-57922.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57926.html">https://www.suse.com/security/cve/CVE-2024-57926.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57929.html">https://www.suse.com/security/cve/CVE-2024-57929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57931.html">https://www.suse.com/security/cve/CVE-2024-57931.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57932.html">https://www.suse.com/security/cve/CVE-2024-57932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57933.html">https://www.suse.com/security/cve/CVE-2024-57933.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57935.html">https://www.suse.com/security/cve/CVE-2024-57935.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57936.html">https://www.suse.com/security/cve/CVE-2024-57936.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57938.html">https://www.suse.com/security/cve/CVE-2024-57938.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57940.html">https://www.suse.com/security/cve/CVE-2024-57940.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57946.html">https://www.suse.com/security/cve/CVE-2024-57946.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21632.html">https://www.suse.com/security/cve/CVE-2025-21632.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21645.html">https://www.suse.com/security/cve/CVE-2025-21645.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21646.html">https://www.suse.com/security/cve/CVE-2025-21646.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21649.html">https://www.suse.com/security/cve/CVE-2025-21649.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21650.html">https://www.suse.com/security/cve/CVE-2025-21650.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21651.html">https://www.suse.com/security/cve/CVE-2025-21651.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21652.html">https://www.suse.com/security/cve/CVE-2025-21652.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21653.html">https://www.suse.com/security/cve/CVE-2025-21653.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21655.html">https://www.suse.com/security/cve/CVE-2025-21655.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21656.html">https://www.suse.com/security/cve/CVE-2025-21656.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21662.html">https://www.suse.com/security/cve/CVE-2025-21662.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21663.html">https://www.suse.com/security/cve/CVE-2025-21663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21664.html">https://www.suse.com/security/cve/CVE-2025-21664.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21666.html">https://www.suse.com/security/cve/CVE-2025-21666.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21669.html">https://www.suse.com/security/cve/CVE-2025-21669.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21670.html">https://www.suse.com/security/cve/CVE-2025-21670.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21674.html">https://www.suse.com/security/cve/CVE-2025-21674.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21675.html">https://www.suse.com/security/cve/CVE-2025-21675.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21676.html">https://www.suse.com/security/cve/CVE-2025-21676.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21678.html">https://www.suse.com/security/cve/CVE-2025-21678.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21682.html">https://www.suse.com/security/cve/CVE-2025-21682.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216813">https://bugzilla.suse.com/show_bug.cgi?id=1216813</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218470">https://bugzilla.suse.com/show_bug.cgi?id=1218470</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220711">https://bugzilla.suse.com/show_bug.cgi?id=1220711</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222803">https://bugzilla.suse.com/show_bug.cgi?id=1222803</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224049">https://bugzilla.suse.com/show_bug.cgi?id=1224049</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225897">https://bugzilla.suse.com/show_bug.cgi?id=1225897</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226980">https://bugzilla.suse.com/show_bug.cgi?id=1226980</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228592">https://bugzilla.suse.com/show_bug.cgi?id=1228592</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229833">https://bugzilla.suse.com/show_bug.cgi?id=1229833</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231016">https://bugzilla.suse.com/show_bug.cgi?id=1231016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231088">https://bugzilla.suse.com/show_bug.cgi?id=1231088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232087">https://bugzilla.suse.com/show_bug.cgi?id=1232087</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232101">https://bugzilla.suse.com/show_bug.cgi?id=1232101</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232158">https://bugzilla.suse.com/show_bug.cgi?id=1232158</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232161">https://bugzilla.suse.com/show_bug.cgi?id=1232161</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232421">https://bugzilla.suse.com/show_bug.cgi?id=1232421</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232882">https://bugzilla.suse.com/show_bug.cgi?id=1232882</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233055">https://bugzilla.suse.com/show_bug.cgi?id=1233055</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233112">https://bugzilla.suse.com/show_bug.cgi?id=1233112</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233221">https://bugzilla.suse.com/show_bug.cgi?id=1233221</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233248">https://bugzilla.suse.com/show_bug.cgi?id=1233248</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233259">https://bugzilla.suse.com/show_bug.cgi?id=1233259</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233260">https://bugzilla.suse.com/show_bug.cgi?id=1233260</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233488">https://bugzilla.suse.com/show_bug.cgi?id=1233488</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233522">https://bugzilla.suse.com/show_bug.cgi?id=1233522</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233638">https://bugzilla.suse.com/show_bug.cgi?id=1233638</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233642">https://bugzilla.suse.com/show_bug.cgi?id=1233642</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233778">https://bugzilla.suse.com/show_bug.cgi?id=1233778</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234195">https://bugzilla.suse.com/show_bug.cgi?id=1234195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234619">https://bugzilla.suse.com/show_bug.cgi?id=1234619</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234635">https://bugzilla.suse.com/show_bug.cgi?id=1234635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234683">https://bugzilla.suse.com/show_bug.cgi?id=1234683</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234693">https://bugzilla.suse.com/show_bug.cgi?id=1234693</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234726">https://bugzilla.suse.com/show_bug.cgi?id=1234726</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234825">https://bugzilla.suse.com/show_bug.cgi?id=1234825</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234863">https://bugzilla.suse.com/show_bug.cgi?id=1234863</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234887">https://bugzilla.suse.com/show_bug.cgi?id=1234887</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234888">https://bugzilla.suse.com/show_bug.cgi?id=1234888</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234893">https://bugzilla.suse.com/show_bug.cgi?id=1234893</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234898">https://bugzilla.suse.com/show_bug.cgi?id=1234898</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234901">https://bugzilla.suse.com/show_bug.cgi?id=1234901</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234906">https://bugzilla.suse.com/show_bug.cgi?id=1234906</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234923">https://bugzilla.suse.com/show_bug.cgi?id=1234923</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234931">https://bugzilla.suse.com/show_bug.cgi?id=1234931</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234934">https://bugzilla.suse.com/show_bug.cgi?id=1234934</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234947">https://bugzilla.suse.com/show_bug.cgi?id=1234947</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234957">https://bugzilla.suse.com/show_bug.cgi?id=1234957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235000">https://bugzilla.suse.com/show_bug.cgi?id=1235000</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235001">https://bugzilla.suse.com/show_bug.cgi?id=1235001</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235011">https://bugzilla.suse.com/show_bug.cgi?id=1235011</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235031">https://bugzilla.suse.com/show_bug.cgi?id=1235031</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235032">https://bugzilla.suse.com/show_bug.cgi?id=1235032</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235035">https://bugzilla.suse.com/show_bug.cgi?id=1235035</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235037">https://bugzilla.suse.com/show_bug.cgi?id=1235037</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235038">https://bugzilla.suse.com/show_bug.cgi?id=1235038</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235039">https://bugzilla.suse.com/show_bug.cgi?id=1235039</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235040">https://bugzilla.suse.com/show_bug.cgi?id=1235040</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235042">https://bugzilla.suse.com/show_bug.cgi?id=1235042</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235043">https://bugzilla.suse.com/show_bug.cgi?id=1235043</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235046">https://bugzilla.suse.com/show_bug.cgi?id=1235046</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235050">https://bugzilla.suse.com/show_bug.cgi?id=1235050</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235051">https://bugzilla.suse.com/show_bug.cgi?id=1235051</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235053">https://bugzilla.suse.com/show_bug.cgi?id=1235053</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">https://bugzilla.suse.com/show_bug.cgi?id=1235054</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235057">https://bugzilla.suse.com/show_bug.cgi?id=1235057</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235059">https://bugzilla.suse.com/show_bug.cgi?id=1235059</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235065">https://bugzilla.suse.com/show_bug.cgi?id=1235065</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235070">https://bugzilla.suse.com/show_bug.cgi?id=1235070</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">https://bugzilla.suse.com/show_bug.cgi?id=1235073</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235100">https://bugzilla.suse.com/show_bug.cgi?id=1235100</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235112">https://bugzilla.suse.com/show_bug.cgi?id=1235112</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235115">https://bugzilla.suse.com/show_bug.cgi?id=1235115</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235117">https://bugzilla.suse.com/show_bug.cgi?id=1235117</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235122">https://bugzilla.suse.com/show_bug.cgi?id=1235122</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235123">https://bugzilla.suse.com/show_bug.cgi?id=1235123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235125">https://bugzilla.suse.com/show_bug.cgi?id=1235125</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235132">https://bugzilla.suse.com/show_bug.cgi?id=1235132</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235133">https://bugzilla.suse.com/show_bug.cgi?id=1235133</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235155">https://bugzilla.suse.com/show_bug.cgi?id=1235155</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235160">https://bugzilla.suse.com/show_bug.cgi?id=1235160</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235217">https://bugzilla.suse.com/show_bug.cgi?id=1235217</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235219">https://bugzilla.suse.com/show_bug.cgi?id=1235219</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235220">https://bugzilla.suse.com/show_bug.cgi?id=1235220</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235222">https://bugzilla.suse.com/show_bug.cgi?id=1235222</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235223">https://bugzilla.suse.com/show_bug.cgi?id=1235223</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235224">https://bugzilla.suse.com/show_bug.cgi?id=1235224</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235227">https://bugzilla.suse.com/show_bug.cgi?id=1235227</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235230">https://bugzilla.suse.com/show_bug.cgi?id=1235230</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235241">https://bugzilla.suse.com/show_bug.cgi?id=1235241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235244">https://bugzilla.suse.com/show_bug.cgi?id=1235244</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235249">https://bugzilla.suse.com/show_bug.cgi?id=1235249</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235251">https://bugzilla.suse.com/show_bug.cgi?id=1235251</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235252">https://bugzilla.suse.com/show_bug.cgi?id=1235252</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235389">https://bugzilla.suse.com/show_bug.cgi?id=1235389</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235390">https://bugzilla.suse.com/show_bug.cgi?id=1235390</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235391">https://bugzilla.suse.com/show_bug.cgi?id=1235391</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235406">https://bugzilla.suse.com/show_bug.cgi?id=1235406</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235410">https://bugzilla.suse.com/show_bug.cgi?id=1235410</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235412">https://bugzilla.suse.com/show_bug.cgi?id=1235412</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235413">https://bugzilla.suse.com/show_bug.cgi?id=1235413</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235415">https://bugzilla.suse.com/show_bug.cgi?id=1235415</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235416">https://bugzilla.suse.com/show_bug.cgi?id=1235416</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235417">https://bugzilla.suse.com/show_bug.cgi?id=1235417</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235418">https://bugzilla.suse.com/show_bug.cgi?id=1235418</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235423">https://bugzilla.suse.com/show_bug.cgi?id=1235423</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235424">https://bugzilla.suse.com/show_bug.cgi?id=1235424</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235425">https://bugzilla.suse.com/show_bug.cgi?id=1235425</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235426">https://bugzilla.suse.com/show_bug.cgi?id=1235426</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235427">https://bugzilla.suse.com/show_bug.cgi?id=1235427</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235428">https://bugzilla.suse.com/show_bug.cgi?id=1235428</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235429">https://bugzilla.suse.com/show_bug.cgi?id=1235429</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235430">https://bugzilla.suse.com/show_bug.cgi?id=1235430</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235433">https://bugzilla.suse.com/show_bug.cgi?id=1235433</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235437">https://bugzilla.suse.com/show_bug.cgi?id=1235437</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235439">https://bugzilla.suse.com/show_bug.cgi?id=1235439</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235441">https://bugzilla.suse.com/show_bug.cgi?id=1235441</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235444">https://bugzilla.suse.com/show_bug.cgi?id=1235444</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235445">https://bugzilla.suse.com/show_bug.cgi?id=1235445</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235449">https://bugzilla.suse.com/show_bug.cgi?id=1235449</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235451">https://bugzilla.suse.com/show_bug.cgi?id=1235451</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235454">https://bugzilla.suse.com/show_bug.cgi?id=1235454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235458">https://bugzilla.suse.com/show_bug.cgi?id=1235458</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235459">https://bugzilla.suse.com/show_bug.cgi?id=1235459</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235464">https://bugzilla.suse.com/show_bug.cgi?id=1235464</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235466">https://bugzilla.suse.com/show_bug.cgi?id=1235466</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235473">https://bugzilla.suse.com/show_bug.cgi?id=1235473</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235479">https://bugzilla.suse.com/show_bug.cgi?id=1235479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235480">https://bugzilla.suse.com/show_bug.cgi?id=1235480</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235483">https://bugzilla.suse.com/show_bug.cgi?id=1235483</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235486">https://bugzilla.suse.com/show_bug.cgi?id=1235486</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235487">https://bugzilla.suse.com/show_bug.cgi?id=1235487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235488">https://bugzilla.suse.com/show_bug.cgi?id=1235488</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235489">https://bugzilla.suse.com/show_bug.cgi?id=1235489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235491">https://bugzilla.suse.com/show_bug.cgi?id=1235491</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235494">https://bugzilla.suse.com/show_bug.cgi?id=1235494</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235495">https://bugzilla.suse.com/show_bug.cgi?id=1235495</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235496">https://bugzilla.suse.com/show_bug.cgi?id=1235496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235497">https://bugzilla.suse.com/show_bug.cgi?id=1235497</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235498">https://bugzilla.suse.com/show_bug.cgi?id=1235498</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235500">https://bugzilla.suse.com/show_bug.cgi?id=1235500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235502">https://bugzilla.suse.com/show_bug.cgi?id=1235502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235503">https://bugzilla.suse.com/show_bug.cgi?id=1235503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235519">https://bugzilla.suse.com/show_bug.cgi?id=1235519</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235520">https://bugzilla.suse.com/show_bug.cgi?id=1235520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235521">https://bugzilla.suse.com/show_bug.cgi?id=1235521</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235523">https://bugzilla.suse.com/show_bug.cgi?id=1235523</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235526">https://bugzilla.suse.com/show_bug.cgi?id=1235526</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235528">https://bugzilla.suse.com/show_bug.cgi?id=1235528</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235532">https://bugzilla.suse.com/show_bug.cgi?id=1235532</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235533">https://bugzilla.suse.com/show_bug.cgi?id=1235533</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235534">https://bugzilla.suse.com/show_bug.cgi?id=1235534</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235537">https://bugzilla.suse.com/show_bug.cgi?id=1235537</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235538">https://bugzilla.suse.com/show_bug.cgi?id=1235538</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235545">https://bugzilla.suse.com/show_bug.cgi?id=1235545</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235552">https://bugzilla.suse.com/show_bug.cgi?id=1235552</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235555">https://bugzilla.suse.com/show_bug.cgi?id=1235555</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235557">https://bugzilla.suse.com/show_bug.cgi?id=1235557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235563">https://bugzilla.suse.com/show_bug.cgi?id=1235563</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235564">https://bugzilla.suse.com/show_bug.cgi?id=1235564</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235565">https://bugzilla.suse.com/show_bug.cgi?id=1235565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235568">https://bugzilla.suse.com/show_bug.cgi?id=1235568</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235570">https://bugzilla.suse.com/show_bug.cgi?id=1235570</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235571">https://bugzilla.suse.com/show_bug.cgi?id=1235571</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235577">https://bugzilla.suse.com/show_bug.cgi?id=1235577</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235578">https://bugzilla.suse.com/show_bug.cgi?id=1235578</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235582">https://bugzilla.suse.com/show_bug.cgi?id=1235582</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235583">https://bugzilla.suse.com/show_bug.cgi?id=1235583</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235584">https://bugzilla.suse.com/show_bug.cgi?id=1235584</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235587">https://bugzilla.suse.com/show_bug.cgi?id=1235587</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235611">https://bugzilla.suse.com/show_bug.cgi?id=1235611</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235612">https://bugzilla.suse.com/show_bug.cgi?id=1235612</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235616">https://bugzilla.suse.com/show_bug.cgi?id=1235616</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235622">https://bugzilla.suse.com/show_bug.cgi?id=1235622</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235627">https://bugzilla.suse.com/show_bug.cgi?id=1235627</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235632">https://bugzilla.suse.com/show_bug.cgi?id=1235632</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235635">https://bugzilla.suse.com/show_bug.cgi?id=1235635</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235638">https://bugzilla.suse.com/show_bug.cgi?id=1235638</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235641">https://bugzilla.suse.com/show_bug.cgi?id=1235641</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235643">https://bugzilla.suse.com/show_bug.cgi?id=1235643</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235645">https://bugzilla.suse.com/show_bug.cgi?id=1235645</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235646">https://bugzilla.suse.com/show_bug.cgi?id=1235646</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235647">https://bugzilla.suse.com/show_bug.cgi?id=1235647</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235650">https://bugzilla.suse.com/show_bug.cgi?id=1235650</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235653">https://bugzilla.suse.com/show_bug.cgi?id=1235653</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235656">https://bugzilla.suse.com/show_bug.cgi?id=1235656</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235657">https://bugzilla.suse.com/show_bug.cgi?id=1235657</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235663">https://bugzilla.suse.com/show_bug.cgi?id=1235663</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235686">https://bugzilla.suse.com/show_bug.cgi?id=1235686</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235700">https://bugzilla.suse.com/show_bug.cgi?id=1235700</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235705">https://bugzilla.suse.com/show_bug.cgi?id=1235705</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235707">https://bugzilla.suse.com/show_bug.cgi?id=1235707</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235708">https://bugzilla.suse.com/show_bug.cgi?id=1235708</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235710">https://bugzilla.suse.com/show_bug.cgi?id=1235710</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235714">https://bugzilla.suse.com/show_bug.cgi?id=1235714</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235716">https://bugzilla.suse.com/show_bug.cgi?id=1235716</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235720">https://bugzilla.suse.com/show_bug.cgi?id=1235720</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235723">https://bugzilla.suse.com/show_bug.cgi?id=1235723</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235727">https://bugzilla.suse.com/show_bug.cgi?id=1235727</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235730">https://bugzilla.suse.com/show_bug.cgi?id=1235730</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235737">https://bugzilla.suse.com/show_bug.cgi?id=1235737</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235739">https://bugzilla.suse.com/show_bug.cgi?id=1235739</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235745">https://bugzilla.suse.com/show_bug.cgi?id=1235745</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235747">https://bugzilla.suse.com/show_bug.cgi?id=1235747</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235750">https://bugzilla.suse.com/show_bug.cgi?id=1235750</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235753">https://bugzilla.suse.com/show_bug.cgi?id=1235753</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235759">https://bugzilla.suse.com/show_bug.cgi?id=1235759</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235764">https://bugzilla.suse.com/show_bug.cgi?id=1235764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235768">https://bugzilla.suse.com/show_bug.cgi?id=1235768</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235776">https://bugzilla.suse.com/show_bug.cgi?id=1235776</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235777">https://bugzilla.suse.com/show_bug.cgi?id=1235777</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235778">https://bugzilla.suse.com/show_bug.cgi?id=1235778</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235779">https://bugzilla.suse.com/show_bug.cgi?id=1235779</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235793">https://bugzilla.suse.com/show_bug.cgi?id=1235793</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235798">https://bugzilla.suse.com/show_bug.cgi?id=1235798</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235806">https://bugzilla.suse.com/show_bug.cgi?id=1235806</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235808">https://bugzilla.suse.com/show_bug.cgi?id=1235808</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235812">https://bugzilla.suse.com/show_bug.cgi?id=1235812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235814">https://bugzilla.suse.com/show_bug.cgi?id=1235814</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235818">https://bugzilla.suse.com/show_bug.cgi?id=1235818</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235842">https://bugzilla.suse.com/show_bug.cgi?id=1235842</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235865">https://bugzilla.suse.com/show_bug.cgi?id=1235865</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235874">https://bugzilla.suse.com/show_bug.cgi?id=1235874</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235894">https://bugzilla.suse.com/show_bug.cgi?id=1235894</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235902">https://bugzilla.suse.com/show_bug.cgi?id=1235902</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235903">https://bugzilla.suse.com/show_bug.cgi?id=1235903</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235906">https://bugzilla.suse.com/show_bug.cgi?id=1235906</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235914">https://bugzilla.suse.com/show_bug.cgi?id=1235914</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235918">https://bugzilla.suse.com/show_bug.cgi?id=1235918</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235919">https://bugzilla.suse.com/show_bug.cgi?id=1235919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235920">https://bugzilla.suse.com/show_bug.cgi?id=1235920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235924">https://bugzilla.suse.com/show_bug.cgi?id=1235924</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235940">https://bugzilla.suse.com/show_bug.cgi?id=1235940</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235941">https://bugzilla.suse.com/show_bug.cgi?id=1235941</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235946">https://bugzilla.suse.com/show_bug.cgi?id=1235946</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235948">https://bugzilla.suse.com/show_bug.cgi?id=1235948</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235952">https://bugzilla.suse.com/show_bug.cgi?id=1235952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235964">https://bugzilla.suse.com/show_bug.cgi?id=1235964</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235965">https://bugzilla.suse.com/show_bug.cgi?id=1235965</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235967">https://bugzilla.suse.com/show_bug.cgi?id=1235967</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235969">https://bugzilla.suse.com/show_bug.cgi?id=1235969</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235976">https://bugzilla.suse.com/show_bug.cgi?id=1235976</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235977">https://bugzilla.suse.com/show_bug.cgi?id=1235977</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236078">https://bugzilla.suse.com/show_bug.cgi?id=1236078</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236080">https://bugzilla.suse.com/show_bug.cgi?id=1236080</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236082">https://bugzilla.suse.com/show_bug.cgi?id=1236082</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236088">https://bugzilla.suse.com/show_bug.cgi?id=1236088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236090">https://bugzilla.suse.com/show_bug.cgi?id=1236090</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236091">https://bugzilla.suse.com/show_bug.cgi?id=1236091</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236096">https://bugzilla.suse.com/show_bug.cgi?id=1236096</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236097">https://bugzilla.suse.com/show_bug.cgi?id=1236097</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236098">https://bugzilla.suse.com/show_bug.cgi?id=1236098</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236101">https://bugzilla.suse.com/show_bug.cgi?id=1236101</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236102">https://bugzilla.suse.com/show_bug.cgi?id=1236102</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236104">https://bugzilla.suse.com/show_bug.cgi?id=1236104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236106">https://bugzilla.suse.com/show_bug.cgi?id=1236106</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236120">https://bugzilla.suse.com/show_bug.cgi?id=1236120</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236125">https://bugzilla.suse.com/show_bug.cgi?id=1236125</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236127">https://bugzilla.suse.com/show_bug.cgi?id=1236127</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236131">https://bugzilla.suse.com/show_bug.cgi?id=1236131</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236138">https://bugzilla.suse.com/show_bug.cgi?id=1236138</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236143">https://bugzilla.suse.com/show_bug.cgi?id=1236143</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236144">https://bugzilla.suse.com/show_bug.cgi?id=1236144</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236145">https://bugzilla.suse.com/show_bug.cgi?id=1236145</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236160">https://bugzilla.suse.com/show_bug.cgi?id=1236160</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236161">https://bugzilla.suse.com/show_bug.cgi?id=1236161</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236163">https://bugzilla.suse.com/show_bug.cgi?id=1236163</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236168">https://bugzilla.suse.com/show_bug.cgi?id=1236168</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236178">https://bugzilla.suse.com/show_bug.cgi?id=1236178</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236180">https://bugzilla.suse.com/show_bug.cgi?id=1236180</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236181">https://bugzilla.suse.com/show_bug.cgi?id=1236181</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236182">https://bugzilla.suse.com/show_bug.cgi?id=1236182</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236190">https://bugzilla.suse.com/show_bug.cgi?id=1236190</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236192">https://bugzilla.suse.com/show_bug.cgi?id=1236192</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236198">https://bugzilla.suse.com/show_bug.cgi?id=1236198</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236227">https://bugzilla.suse.com/show_bug.cgi?id=1236227</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236245">https://bugzilla.suse.com/show_bug.cgi?id=1236245</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236247">https://bugzilla.suse.com/show_bug.cgi?id=1236247</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236248">https://bugzilla.suse.com/show_bug.cgi?id=1236248</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236260">https://bugzilla.suse.com/show_bug.cgi?id=1236260</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236262">https://bugzilla.suse.com/show_bug.cgi?id=1236262</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236628">https://bugzilla.suse.com/show_bug.cgi?id=1236628</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236680">https://bugzilla.suse.com/show_bug.cgi?id=1236680</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236683">https://bugzilla.suse.com/show_bug.cgi?id=1236683</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236685">https://bugzilla.suse.com/show_bug.cgi?id=1236685</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236688">https://bugzilla.suse.com/show_bug.cgi?id=1236688</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236694">https://bugzilla.suse.com/show_bug.cgi?id=1236694</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236696">https://bugzilla.suse.com/show_bug.cgi?id=1236696</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236698">https://bugzilla.suse.com/show_bug.cgi?id=1236698</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236703">https://bugzilla.suse.com/show_bug.cgi?id=1236703</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236732">https://bugzilla.suse.com/show_bug.cgi?id=1236732</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236733">https://bugzilla.suse.com/show_bug.cgi?id=1236733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236757">https://bugzilla.suse.com/show_bug.cgi?id=1236757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236758">https://bugzilla.suse.com/show_bug.cgi?id=1236758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236760">https://bugzilla.suse.com/show_bug.cgi?id=1236760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236761">https://bugzilla.suse.com/show_bug.cgi?id=1236761</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-7242">https://jira.suse.com/browse/PED-7242</a>
</li>


</ul>

</div>

--===============4099292061028594122==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung