Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2025:20260-1
Distribution: SUSE
Plattformen: SUSE Linux Micro 6.1
Datum: Mo, 14. Juli 2025, 13:06
Referenzen: https://www.cve.org/CVERecord?id=CVE-2025-21781
https://www.cve.org/CVERecord?id=CVE-2025-21828
https://www.cve.org/CVERecord?id=CVE-2024-54683
https://www.cve.org/CVERecord?id=CVE-2024-56605
https://www.cve.org/CVERecord?id=CVE-2024-58076
https://www.cve.org/CVERecord?id=CVE-2025-21734
https://www.cve.org/CVERecord?id=CVE-2024-53239
https://www.cve.org/CVERecord?id=CVE-2024-43820
https://www.cve.org/CVERecord?id=CVE-2024-50073
https://www.cve.org/CVERecord?id=CVE-2024-49571
https://www.cve.org/CVERecord?id=CVE-2025-21861
https://www.cve.org/CVERecord?id=CVE-2025-21638
https://www.cve.org/CVERecord?id=CVE-2025-21732
https://www.cve.org/CVERecord?id=CVE-2025-21759
https://www.cve.org/CVERecord?id=CVE-2024-58054
https://www.cve.org/CVERecord?id=CVE-2025-21820
https://www.cve.org/CVERecord?id=CVE-2025-21888
https://www.cve.org/CVERecord?id=CVE-2025-21775
https://www.cve.org/CVERecord?id=CVE-2024-50304
https://www.cve.org/CVERecord?id=CVE-2024-56548
https://www.cve.org/CVERecord?id=CVE-2025-21728
https://www.cve.org/CVERecord?id=CVE-2025-21779
https://www.cve.org/CVERecord?id=CVE-2025-21823
https://www.cve.org/CVERecord?id=CVE-2024-58078
https://www.cve.org/CVERecord?id=CVE-2025-21864
https://www.cve.org/CVERecord?id=CVE-2025-21793
https://www.cve.org/CVERecord?id=CVE-2024-50085
https://www.cve.org/CVERecord?id=CVE-2024-57834
https://www.cve.org/CVERecord?id=CVE-2024-44974
https://www.cve.org/CVERecord?id=CVE-2025-21756
https://www.cve.org/CVERecord?id=CVE-2025-21671
https://www.cve.org/CVERecord?id=CVE-2025-21703
https://www.cve.org/CVERecord?id=CVE-2025-21795
https://www.cve.org/CVERecord?id=CVE-2024-56770
https://www.cve.org/CVERecord?id=CVE-2025-21700
https://www.cve.org/CVERecord?id=CVE-2025-21799
https://www.cve.org/CVERecord?id=CVE-2025-21706
https://www.cve.org/CVERecord?id=CVE-2024-47794
https://www.cve.org/CVERecord?id=CVE-2024-57889
https://www.cve.org/CVERecord?id=CVE-2025-21697
https://www.cve.org/CVERecord?id=CVE-2024-58052
https://www.cve.org/CVERecord?id=CVE-2025-21637
https://www.cve.org/CVERecord?id=CVE-2025-21890
https://www.cve.org/CVERecord?id=CVE-2024-56592
https://www.cve.org/CVERecord?id=CVE-2025-21802
https://www.cve.org/CVERecord?id=CVE-2024-57900
https://www.cve.org/CVERecord?id=CVE-2024-47701
https://www.cve.org/CVERecord?id=CVE-2024-58051
https://www.cve.org/CVERecord?id=CVE-2024-56702
https://www.cve.org/CVERecord?id=CVE-2025-21715
https://www.cve.org/CVERecord?id=CVE-2025-21636
https://www.cve.org/CVERecord?id=CVE-2024-58020
https://www.cve.org/CVERecord?id=CVE-2025-21736
https://www.cve.org/CVERecord?id=CVE-2025-21631
https://www.cve.org/CVERecord?id=CVE-2024-46858
https://www.cve.org/CVERecord?id=CVE-2024-58085
https://www.cve.org/CVERecord?id=CVE-2025-21704
https://www.cve.org/CVERecord?id=CVE-2024-58017
https://www.cve.org/CVERecord?id=CVE-2025-21830
https://www.cve.org/CVERecord?id=CVE-2023-52924
https://www.cve.org/CVERecord?id=CVE-2024-57997
https://www.cve.org/CVERecord?id=CVE-2025-21784
https://www.cve.org/CVERecord?id=CVE-2024-46782
https://www.cve.org/CVERecord?id=CVE-2025-21680
https://www.cve.org/CVERecord?id=CVE-2024-53147
https://www.cve.org/CVERecord?id=CVE-2024-41077
https://www.cve.org/CVERecord?id=CVE-2024-57947
https://www.cve.org/CVERecord?id=CVE-2024-50029
https://www.cve.org/CVERecord?id=CVE-2024-58063
https://www.cve.org/CVERecord?id=CVE-2025-21886
https://www.cve.org/CVERecord?id=CVE-2025-21856
https://www.cve.org/CVERecord?id=CVE-2024-49950
https://www.cve.org/CVERecord?id=CVE-2024-56579
https://www.cve.org/CVERecord?id=CVE-2024-41005
https://www.cve.org/CVERecord?id=CVE-2024-57996
https://www.cve.org/CVERecord?id=CVE-2023-52925
https://www.cve.org/CVERecord?id=CVE-2024-58058
https://www.cve.org/CVERecord?id=CVE-2025-21804
https://www.cve.org/CVERecord?id=CVE-2024-53123
https://www.cve.org/CVERecord?id=CVE-2025-21684
https://www.cve.org/CVERecord?id=CVE-2025-21705
https://www.cve.org/CVERecord?id=CVE-2025-21877
https://www.cve.org/CVERecord?id=CVE-2025-21782
https://www.cve.org/CVERecord?id=CVE-2025-21829
https://www.cve.org/CVERecord?id=CVE-2025-21891
https://www.cve.org/CVERecord?id=CVE-2025-21735
https://www.cve.org/CVERecord?id=CVE-2024-58072
https://www.cve.org/CVERecord?id=CVE-2025-21883
https://www.cve.org/CVERecord?id=CVE-2024-42307
https://www.cve.org/CVERecord?id=CVE-2025-21718
https://www.cve.org/CVERecord?id=CVE-2024-56647
https://www.cve.org/CVERecord?id=CVE-2024-50056
https://www.cve.org/CVERecord?id=CVE-2025-21716
https://www.cve.org/CVERecord?id=CVE-2025-21885
https://www.cve.org/CVERecord?id=CVE-2025-21714
https://www.cve.org/CVERecord?id=CVE-2025-21690
https://www.cve.org/CVERecord?id=CVE-2025-21687
https://www.cve.org/CVERecord?id=CVE-2025-21832
https://www.cve.org/CVERecord?id=CVE-2025-21681
https://www.cve.org/CVERecord?id=CVE-2025-21785
https://www.cve.org/CVERecord?id=CVE-2025-21678
https://www.cve.org/CVERecord?id=CVE-2024-58069
https://www.cve.org/CVERecord?id=CVE-2024-46796
https://www.cve.org/CVERecord?id=CVE-2025-21869
https://www.cve.org/CVERecord?id=CVE-2024-56720
https://www.cve.org/CVERecord?id=CVE-2025-21719
https://www.cve.org/CVERecord?id=CVE-2024-58086
https://www.cve.org/CVERecord?id=CVE-2024-50036
https://www.cve.org/CVERecord?id=CVE-2024-58019
https://www.cve.org/CVERecord?id=CVE-2024-41149
https://www.cve.org/CVERecord?id=CVE-2025-21835
https://www.cve.org/CVERecord?id=CVE-2024-53140
https://www.cve.org/CVERecord?id=CVE-2025-21810
https://www.cve.org/CVERecord?id=CVE-2025-21767
https://www.cve.org/CVERecord?id=CVE-2024-53063
https://www.cve.org/CVERecord?id=CVE-2024-47408
https://www.cve.org/CVERecord?id=CVE-2024-58061
https://www.cve.org/CVERecord?id=CVE-2025-21725
https://www.cve.org/CVERecord?id=CVE-2024-49994
https://www.cve.org/CVERecord?id=CVE-2024-56703
https://www.cve.org/CVERecord?id=CVE-2025-21635
https://www.cve.org/CVERecord?id=CVE-2024-41055
https://www.cve.org/CVERecord?id=CVE-2024-58034
https://www.cve.org/CVERecord?id=CVE-2024-56658
https://www.cve.org/CVERecord?id=CVE-2025-21866
https://www.cve.org/CVERecord?id=CVE-2025-21878
https://www.cve.org/CVERecord?id=CVE-2024-56640
https://www.cve.org/CVERecord?id=CVE-2024-53177
https://www.cve.org/CVERecord?id=CVE-2024-53163
https://www.cve.org/CVERecord?id=CVE-2025-21865
https://www.cve.org/CVERecord?id=CVE-2025-21870
https://www.cve.org/CVERecord?id=CVE-2024-57974
https://www.cve.org/CVERecord?id=CVE-2025-21739
https://www.cve.org/CVERecord?id=CVE-2025-21724
https://www.cve.org/CVERecord?id=CVE-2025-21701
https://www.cve.org/CVERecord?id=CVE-2024-53680
https://www.cve.org/CVERecord?id=CVE-2024-53173
https://www.cve.org/CVERecord?id=CVE-2025-21821
https://www.cve.org/CVERecord?id=CVE-2025-21776
https://www.cve.org/CVERecord?id=CVE-2025-21796
https://www.cve.org/CVERecord?id=CVE-2025-21689
https://www.cve.org/CVERecord?id=CVE-2025-21859
https://www.cve.org/CVERecord?id=CVE-2024-49884
https://www.cve.org/CVERecord?id=CVE-2024-35910
https://www.cve.org/CVERecord?id=CVE-2025-21731
https://www.cve.org/CVERecord?id=CVE-2024-57882
https://www.cve.org/CVERecord?id=CVE-2024-58055
https://www.cve.org/CVERecord?id=CVE-2024-56718
https://www.cve.org/CVERecord?id=CVE-2025-21862
https://www.cve.org/CVERecord?id=CVE-2025-21640
https://www.cve.org/CVERecord?id=CVE-2024-50140
https://www.cve.org/CVERecord?id=CVE-2025-21825
https://www.cve.org/CVERecord?id=CVE-2025-21780
https://www.cve.org/CVERecord?id=CVE-2025-21794
https://www.cve.org/CVERecord?id=CVE-2024-53176
https://www.cve.org/CVERecord?id=CVE-2024-58079
https://www.cve.org/CVERecord?id=CVE-2024-58012
https://www.cve.org/CVERecord?id=CVE-2024-57807
https://www.cve.org/CVERecord?id=CVE-2025-21733
https://www.cve.org/CVERecord?id=CVE-2024-45009
https://www.cve.org/CVERecord?id=CVE-2025-21723
https://www.cve.org/CVERecord?id=CVE-2024-50126
https://www.cve.org/CVERecord?id=CVE-2025-21647
https://www.cve.org/CVERecord?id=CVE-2025-21741
https://www.cve.org/CVERecord?id=CVE-2024-57973
https://www.cve.org/CVERecord?id=CVE-2024-56719
https://www.cve.org/CVERecord?id=CVE-2024-56539
https://www.cve.org/CVERecord?id=CVE-2025-21699
https://www.cve.org/CVERecord?id=CVE-2025-21688
https://www.cve.org/CVERecord?id=CVE-2024-50251
https://www.cve.org/CVERecord?id=CVE-2025-21665
https://www.cve.org/CVERecord?id=CVE-2024-56758
https://www.cve.org/CVERecord?id=CVE-2025-21726
https://www.cve.org/CVERecord?id=CVE-2025-21791
https://www.cve.org/CVERecord?id=CVE-2025-21815
https://www.cve.org/CVERecord?id=CVE-2025-21772
https://www.cve.org/CVERecord?id=CVE-2024-35826
https://www.cve.org/CVERecord?id=CVE-2024-58009
https://www.cve.org/CVERecord?id=CVE-2024-53178
https://www.cve.org/CVERecord?id=CVE-2025-21693
https://www.cve.org/CVERecord?id=CVE-2025-21743
https://www.cve.org/CVERecord?id=CVE-2024-57981
https://www.cve.org/CVERecord?id=CVE-2024-26873
https://www.cve.org/CVERecord?id=CVE-2025-21692
https://www.cve.org/CVERecord?id=CVE-2024-53226
https://www.cve.org/CVERecord?id=CVE-2025-21764
https://www.cve.org/CVERecord?id=CVE-2024-57979
https://www.cve.org/CVERecord?id=CVE-2025-21745
https://www.cve.org/CVERecord?id=CVE-2025-21667
https://www.cve.org/CVERecord?id=CVE-2024-50152
https://www.cve.org/CVERecord?id=CVE-2025-21762
https://www.cve.org/CVERecord?id=CVE-2025-21727
https://www.cve.org/CVERecord?id=CVE-2024-56751
https://www.cve.org/CVERecord?id=CVE-2025-21790
https://www.cve.org/CVERecord?id=CVE-2025-21831
https://www.cve.org/CVERecord?id=CVE-2025-21819
https://www.cve.org/CVERecord?id=CVE-2024-58011
https://www.cve.org/CVERecord?id=CVE-2025-21773
https://www.cve.org/CVERecord?id=CVE-2025-21760
https://www.cve.org/CVERecord?id=CVE-2023-52926
https://www.cve.org/CVERecord?id=CVE-2024-49940
https://www.cve.org/CVERecord?id=CVE-2024-58080
https://www.cve.org/CVERecord?id=CVE-2024-40980
https://www.cve.org/CVERecord?id=CVE-2024-58013
https://www.cve.org/CVERecord?id=CVE-2024-50115
https://www.cve.org/CVERecord?id=CVE-2024-45010
https://www.cve.org/CVERecord?id=CVE-2024-58057
https://www.cve.org/CVERecord?id=CVE-2024-26634
https://www.cve.org/CVERecord?id=CVE-2025-21844
https://www.cve.org/CVERecord?id=CVE-2024-26810
https://www.cve.org/CVERecord?id=CVE-2025-21876
https://www.cve.org/CVERecord?id=CVE-2025-21765
https://www.cve.org/CVERecord?id=CVE-2024-57948
https://www.cve.org/CVERecord?id=CVE-2024-58007
https://www.cve.org/CVERecord?id=CVE-2025-21871
https://www.cve.org/CVERecord?id=CVE-2025-21738
https://www.cve.org/CVERecord?id=CVE-2024-57999
https://www.cve.org/CVERecord?id=CVE-2024-58083
https://www.cve.org/CVERecord?id=CVE-2024-49924
https://www.cve.org/CVERecord?id=CVE-2025-21766
https://www.cve.org/CVERecord?id=CVE-2024-58014
https://www.cve.org/CVERecord?id=CVE-2024-38606
https://www.cve.org/CVERecord?id=CVE-2025-21639
https://www.cve.org/CVERecord?id=CVE-2024-58056
https://www.cve.org/CVERecord?id=CVE-2024-46736
https://www.cve.org/CVERecord?id=CVE-2024-58005
https://www.cve.org/CVERecord?id=CVE-2025-21847
https://www.cve.org/CVERecord?id=CVE-2024-53057
https://www.cve.org/CVERecord?id=CVE-2025-21846
https://www.cve.org/CVERecord?id=CVE-2025-21673
https://www.cve.org/CVERecord?id=CVE-2024-58006
https://www.cve.org/CVERecord?id=CVE-2023-52927
https://www.cve.org/CVERecord?id=CVE-2025-21670
https://www.cve.org/CVERecord?id=CVE-2024-57990
https://www.cve.org/CVERecord?id=CVE-2025-21838
https://www.cve.org/CVERecord?id=CVE-2025-21754
https://www.cve.org/CVERecord?id=CVE-2024-50290
https://www.cve.org/CVERecord?id=CVE-2025-21753
https://www.cve.org/CVERecord?id=CVE-2025-21708
https://www.cve.org/CVERecord?id=CVE-2024-56638
https://www.cve.org/CVERecord?id=CVE-2025-21848
https://www.cve.org/CVERecord?id=CVE-2025-21669
https://www.cve.org/CVERecord?id=CVE-2024-56633
https://www.cve.org/CVERecord?id=CVE-2024-57993
https://www.cve.org/CVERecord?id=CVE-2025-21711
https://www.cve.org/CVERecord?id=CVE-2025-21675
https://www.cve.org/CVERecord?id=CVE-2024-52559
https://www.cve.org/CVERecord?id=CVE-2024-26708
https://www.cve.org/CVERecord?id=CVE-2024-58002
https://www.cve.org/CVERecord?id=CVE-2024-50294
https://www.cve.org/CVERecord?id=CVE-2025-21750
https://www.cve.org/CVERecord?id=CVE-2024-57994
https://www.cve.org/CVERecord?id=CVE-2025-21659
https://www.cve.org/CVERecord?id=CVE-2025-21855
https://www.cve.org/CVERecord?id=CVE-2025-21749
https://www.cve.org/CVERecord?id=CVE-2025-21763
https://www.cve.org/CVERecord?id=CVE-2025-21857
https://www.cve.org/CVERecord?id=CVE-2025-21666
https://www.cve.org/CVERecord?id=CVE-2025-21668
https://www.cve.org/CVERecord?id=CVE-2025-21744
https://www.cve.org/CVERecord?id=CVE-2025-21892
https://www.cve.org/CVERecord?id=CVE-2025-21742
https://www.cve.org/CVERecord?id=CVE-2024-50258
https://www.cve.org/CVERecord?id=CVE-2024-57980
https://www.cve.org/CVERecord?id=CVE-2025-21850
https://www.cve.org/CVERecord?id=CVE-2024-57978
https://www.cve.org/CVERecord?id=CVE-2023-52831
https://www.cve.org/CVERecord?id=CVE-2024-50142
https://www.cve.org/CVERecord?id=CVE-2024-57986
https://www.cve.org/CVERecord?id=CVE-2025-21761
https://www.cve.org/CVERecord?id=CVE-2024-50185
https://www.cve.org/CVERecord?id=CVE-2025-21858
Applikationen: Linux

Originalnachricht

--===============4470831759471973195==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:20260-1
Release Date: 2025-04-17T10:48:21Z
Rating: important
References:

* bsc#1012628
* bsc#1207948
* bsc#1215199
* bsc#1215211
* bsc#1218470
* bsc#1219367
* bsc#1221651
* bsc#1222649
* bsc#1222672
* bsc#1222803
* bsc#1223047
* bsc#1224049
* bsc#1224489
* bsc#1224610
* bsc#1225533
* bsc#1225606
* bsc#1225742
* bsc#1225770
* bsc#1225981
* bsc#1226871
* bsc#1227858
* bsc#1227937
* bsc#1228521
* bsc#1228653
* bsc#1229311
* bsc#1229361
* bsc#1230235
* bsc#1230438
* bsc#1230439
* bsc#1230497
* bsc#1230728
* bsc#1230769
* bsc#1230832
* bsc#1231088
* bsc#1231293
* bsc#1231432
* bsc#1231912
* bsc#1231920
* bsc#1231949
* bsc#1232159
* bsc#1232198
* bsc#1232201
* bsc#1232299
* bsc#1232364
* bsc#1232389
* bsc#1232421
* bsc#1232508
* bsc#1232520
* bsc#1232743
* bsc#1232812
* bsc#1232848
* bsc#1232895
* bsc#1232919
* bsc#1233028
* bsc#1233033
* bsc#1233060
* bsc#1233109
* bsc#1233221
* bsc#1233248
* bsc#1233259
* bsc#1233260
* bsc#1233479
* bsc#1233483
* bsc#1233522
* bsc#1233551
* bsc#1233557
* bsc#1233749
* bsc#1234070
* bsc#1234222
* bsc#1234480
* bsc#1234828
* bsc#1234853
* bsc#1234857
* bsc#1234891
* bsc#1234894
* bsc#1234895
* bsc#1234896
* bsc#1234936
* bsc#1234963
* bsc#1235054
* bsc#1235061
* bsc#1235073
* bsc#1235244
* bsc#1235435
* bsc#1235436
* bsc#1235441
* bsc#1235455
* bsc#1235485
* bsc#1235501
* bsc#1235524
* bsc#1235589
* bsc#1235591
* bsc#1235592
* bsc#1235599
* bsc#1235609
* bsc#1235621
* bsc#1235637
* bsc#1235698
* bsc#1235711
* bsc#1235712
* bsc#1235715
* bsc#1235729
* bsc#1235733
* bsc#1235761
* bsc#1235870
* bsc#1235874
* bsc#1235914
* bsc#1235932
* bsc#1235933
* bsc#1235973
* bsc#1236099
* bsc#1236111
* bsc#1236113
* bsc#1236114
* bsc#1236115
* bsc#1236122
* bsc#1236123
* bsc#1236133
* bsc#1236138
* bsc#1236199
* bsc#1236200
* bsc#1236203
* bsc#1236205
* bsc#1236206
* bsc#1236333
* bsc#1236573
* bsc#1236575
* bsc#1236576
* bsc#1236591
* bsc#1236661
* bsc#1236677
* bsc#1236680
* bsc#1236681
* bsc#1236682
* bsc#1236683
* bsc#1236684
* bsc#1236685
* bsc#1236689
* bsc#1236692
* bsc#1236694
* bsc#1236698
* bsc#1236700
* bsc#1236702
* bsc#1236752
* bsc#1236757
* bsc#1236758
* bsc#1236759
* bsc#1236760
* bsc#1236761
* bsc#1236821
* bsc#1236822
* bsc#1236896
* bsc#1236897
* bsc#1236952
* bsc#1236967
* bsc#1236994
* bsc#1237007
* bsc#1237017
* bsc#1237025
* bsc#1237028
* bsc#1237029
* bsc#1237045
* bsc#1237126
* bsc#1237132
* bsc#1237139
* bsc#1237155
* bsc#1237158
* bsc#1237159
* bsc#1237164
* bsc#1237232
* bsc#1237234
* bsc#1237313
* bsc#1237325
* bsc#1237356
* bsc#1237415
* bsc#1237452
* bsc#1237504
* bsc#1237521
* bsc#1237530
* bsc#1237558
* bsc#1237562
* bsc#1237563
* bsc#1237565
* bsc#1237571
* bsc#1237848
* bsc#1237849
* bsc#1237853
* bsc#1237856
* bsc#1237873
* bsc#1237875
* bsc#1237876
* bsc#1237877
* bsc#1237879
* bsc#1237881
* bsc#1237885
* bsc#1237889
* bsc#1237890
* bsc#1237891
* bsc#1237894
* bsc#1237897
* bsc#1237900
* bsc#1237901
* bsc#1237906
* bsc#1237907
* bsc#1237911
* bsc#1237912
* bsc#1237950
* bsc#1238212
* bsc#1238214
* bsc#1238303
* bsc#1238347
* bsc#1238368
* bsc#1238474
* bsc#1238475
* bsc#1238479
* bsc#1238494
* bsc#1238496
* bsc#1238497
* bsc#1238500
* bsc#1238501
* bsc#1238502
* bsc#1238503
* bsc#1238506
* bsc#1238507
* bsc#1238509
* bsc#1238510
* bsc#1238511
* bsc#1238512
* bsc#1238521
* bsc#1238523
* bsc#1238525
* bsc#1238526
* bsc#1238528
* bsc#1238529
* bsc#1238531
* bsc#1238532
* bsc#1238570
* bsc#1238715
* bsc#1238716
* bsc#1238734
* bsc#1238735
* bsc#1238736
* bsc#1238738
* bsc#1238739
* bsc#1238747
* bsc#1238751
* bsc#1238753
* bsc#1238754
* bsc#1238757
* bsc#1238759
* bsc#1238760
* bsc#1238762
* bsc#1238763
* bsc#1238767
* bsc#1238768
* bsc#1238771
* bsc#1238772
* bsc#1238773
* bsc#1238775
* bsc#1238780
* bsc#1238781
* bsc#1238785
* bsc#1238860
* bsc#1238863
* bsc#1238864
* bsc#1238865
* bsc#1238876
* bsc#1238877
* bsc#1238903
* bsc#1238904
* bsc#1238905
* bsc#1238909
* bsc#1238911
* bsc#1238917
* bsc#1238958
* bsc#1238959
* bsc#1238963
* bsc#1238964
* bsc#1238969
* bsc#1238971
* bsc#1238973
* bsc#1238975
* bsc#1238978
* bsc#1238979
* bsc#1238981
* bsc#1238984
* bsc#1238986
* bsc#1238993
* bsc#1238994
* bsc#1238997
* bsc#1239015
* bsc#1239016
* bsc#1239027
* bsc#1239029
* bsc#1239030
* bsc#1239033
* bsc#1239034
* bsc#1239036
* bsc#1239037
* bsc#1239038
* bsc#1239039
* bsc#1239045
* bsc#1239065
* bsc#1239068
* bsc#1239073
* bsc#1239076
* bsc#1239080
* bsc#1239085
* bsc#1239087
* bsc#1239095
* bsc#1239104
* bsc#1239105
* bsc#1239109
* bsc#1239112
* bsc#1239114
* bsc#1239115
* bsc#1239117
* bsc#1239167
* bsc#1239174
* bsc#1239346
* bsc#1239349
* bsc#1239435
* bsc#1239467
* bsc#1239468
* bsc#1239471
* bsc#1239473
* bsc#1239474
* bsc#1239477
* bsc#1239478
* bsc#1239479
* bsc#1239481
* bsc#1239482
* bsc#1239483
* bsc#1239484
* bsc#1239486
* bsc#1239508
* bsc#1239512
* bsc#1239518
* bsc#1239573
* bsc#1239594
* bsc#1239595
* bsc#1239600
* bsc#1239605
* bsc#1239615
* bsc#1239644
* bsc#1239707
* bsc#1239986
* bsc#1239994
* bsc#1240169
* bsc#1240172
* bsc#1240173
* bsc#1240175
* bsc#1240177
* bsc#1240179
* bsc#1240182
* bsc#1240183
* bsc#1240186
* bsc#1240188
* bsc#1240189
* bsc#1240191
* bsc#1240192
* bsc#1240333
* bsc#1240334
* jsc#PED-10028
* jsc#PED-10701
* jsc#PED-11253
* jsc#PED-12094
* jsc#PED-12251
* jsc#PED-12416
* jsc#PED-348
* jsc#PED-7619


Cross-References:

* CVE-2023-52831
* CVE-2023-52924
* CVE-2023-52925
* CVE-2023-52926
* CVE-2023-52927
* CVE-2024-26634
* CVE-2024-26708
* CVE-2024-26810
* CVE-2024-26873
* CVE-2024-35826
* CVE-2024-35910
* CVE-2024-38606
* CVE-2024-40980
* CVE-2024-41005
* CVE-2024-41055
* CVE-2024-41077
* CVE-2024-41149
* CVE-2024-42307
* CVE-2024-43820
* CVE-2024-44974
* CVE-2024-45009
* CVE-2024-45010
* CVE-2024-46736
* CVE-2024-46782
* CVE-2024-46796
* CVE-2024-46858
* CVE-2024-47408
* CVE-2024-47701
* CVE-2024-47794
* CVE-2024-49571
* CVE-2024-49884
* CVE-2024-49924
* CVE-2024-49940
* CVE-2024-49950
* CVE-2024-49994
* CVE-2024-50029
* CVE-2024-50036
* CVE-2024-50056
* CVE-2024-50073
* CVE-2024-50085
* CVE-2024-50115
* CVE-2024-50126
* CVE-2024-50140
* CVE-2024-50142
* CVE-2024-50152
* CVE-2024-50185
* CVE-2024-50251
* CVE-2024-50258
* CVE-2024-50290
* CVE-2024-50294
* CVE-2024-50304
* CVE-2024-52559
* CVE-2024-53057
* CVE-2024-53063
* CVE-2024-53123
* CVE-2024-53140
* CVE-2024-53147
* CVE-2024-53163
* CVE-2024-53173
* CVE-2024-53176
* CVE-2024-53177
* CVE-2024-53178
* CVE-2024-53226
* CVE-2024-53239
* CVE-2024-53680
* CVE-2024-54683
* CVE-2024-56539
* CVE-2024-56548
* CVE-2024-56579
* CVE-2024-56592
* CVE-2024-56605
* CVE-2024-56633
* CVE-2024-56638
* CVE-2024-56640
* CVE-2024-56647
* CVE-2024-56658
* CVE-2024-56702
* CVE-2024-56703
* CVE-2024-56718
* CVE-2024-56719
* CVE-2024-56720
* CVE-2024-56751
* CVE-2024-56758
* CVE-2024-56770
* CVE-2024-57807
* CVE-2024-57834
* CVE-2024-57882
* CVE-2024-57889
* CVE-2024-57900
* CVE-2024-57947
* CVE-2024-57948
* CVE-2024-57973
* CVE-2024-57974
* CVE-2024-57978
* CVE-2024-57979
* CVE-2024-57980
* CVE-2024-57981
* CVE-2024-57986
* CVE-2024-57990
* CVE-2024-57993
* CVE-2024-57994
* CVE-2024-57996
* CVE-2024-57997
* CVE-2024-57999
* CVE-2024-58002
* CVE-2024-58005
* CVE-2024-58006
* CVE-2024-58007
* CVE-2024-58009
* CVE-2024-58011
* CVE-2024-58012
* CVE-2024-58013
* CVE-2024-58014
* CVE-2024-58017
* CVE-2024-58019
* CVE-2024-58020
* CVE-2024-58034
* CVE-2024-58051
* CVE-2024-58052
* CVE-2024-58054
* CVE-2024-58055
* CVE-2024-58056
* CVE-2024-58057
* CVE-2024-58058
* CVE-2024-58061
* CVE-2024-58063
* CVE-2024-58069
* CVE-2024-58072
* CVE-2024-58076
* CVE-2024-58078
* CVE-2024-58079
* CVE-2024-58080
* CVE-2024-58083
* CVE-2024-58085
* CVE-2024-58086
* CVE-2025-21631
* CVE-2025-21635
* CVE-2025-21636
* CVE-2025-21637
* CVE-2025-21638
* CVE-2025-21639
* CVE-2025-21640
* CVE-2025-21647
* CVE-2025-21659
* CVE-2025-21665
* CVE-2025-21666
* CVE-2025-21667
* CVE-2025-21668
* CVE-2025-21669
* CVE-2025-21670
* CVE-2025-21671
* CVE-2025-21673
* CVE-2025-21675
* CVE-2025-21678
* CVE-2025-21680
* CVE-2025-21681
* CVE-2025-21684
* CVE-2025-21687
* CVE-2025-21688
* CVE-2025-21689
* CVE-2025-21690
* CVE-2025-21692
* CVE-2025-21693
* CVE-2025-21697
* CVE-2025-21699
* CVE-2025-21700
* CVE-2025-21701
* CVE-2025-21703
* CVE-2025-21704
* CVE-2025-21705
* CVE-2025-21706
* CVE-2025-21708
* CVE-2025-21711
* CVE-2025-21714
* CVE-2025-21715
* CVE-2025-21716
* CVE-2025-21718
* CVE-2025-21719
* CVE-2025-21723
* CVE-2025-21724
* CVE-2025-21725
* CVE-2025-21726
* CVE-2025-21727
* CVE-2025-21728
* CVE-2025-21731
* CVE-2025-21732
* CVE-2025-21733
* CVE-2025-21734
* CVE-2025-21735
* CVE-2025-21736
* CVE-2025-21738
* CVE-2025-21739
* CVE-2025-21741
* CVE-2025-21742
* CVE-2025-21743
* CVE-2025-21744
* CVE-2025-21745
* CVE-2025-21749
* CVE-2025-21750
* CVE-2025-21753
* CVE-2025-21754
* CVE-2025-21756
* CVE-2025-21759
* CVE-2025-21760
* CVE-2025-21761
* CVE-2025-21762
* CVE-2025-21763
* CVE-2025-21764
* CVE-2025-21765
* CVE-2025-21766
* CVE-2025-21767
* CVE-2025-21772
* CVE-2025-21773
* CVE-2025-21775
* CVE-2025-21776
* CVE-2025-21779
* CVE-2025-21780
* CVE-2025-21781
* CVE-2025-21782
* CVE-2025-21784
* CVE-2025-21785
* CVE-2025-21790
* CVE-2025-21791
* CVE-2025-21793
* CVE-2025-21794
* CVE-2025-21795
* CVE-2025-21796
* CVE-2025-21799
* CVE-2025-21802
* CVE-2025-21804
* CVE-2025-21810
* CVE-2025-21815
* CVE-2025-21819
* CVE-2025-21820
* CVE-2025-21821
* CVE-2025-21823
* CVE-2025-21825
* CVE-2025-21828
* CVE-2025-21829
* CVE-2025-21830
* CVE-2025-21831
* CVE-2025-21832
* CVE-2025-21835
* CVE-2025-21838
* CVE-2025-21844
* CVE-2025-21846
* CVE-2025-21847
* CVE-2025-21848
* CVE-2025-21850
* CVE-2025-21855
* CVE-2025-21856
* CVE-2025-21857
* CVE-2025-21858
* CVE-2025-21859
* CVE-2025-21861
* CVE-2025-21862
* CVE-2025-21864
* CVE-2025-21865
* CVE-2025-21866
* CVE-2025-21869
* CVE-2025-21870
* CVE-2025-21871
* CVE-2025-21876
* CVE-2025-21877
* CVE-2025-21878
* CVE-2025-21883
* CVE-2025-21885
* CVE-2025-21886
* CVE-2025-21888
* CVE-2025-21890
* CVE-2025-21891
* CVE-2025-21892


CVSS scores:

* CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52924 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52925 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52925 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52926 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52927 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26708 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-41055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41149 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44974 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-44974 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-44974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-45009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45010 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-45010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46736 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46796 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47408 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47794 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49571 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49940 ( SUSE ): 6.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49994 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50056 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50140 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50142 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50258 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53147 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53147 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53163 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53173 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53176 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53177 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53178 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53226 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53239 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53680 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-54683 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56539 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-56548 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56579 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56579 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56592 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56633 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56638 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56647 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56658 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56702 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56703 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56718 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56719 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56720 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56751 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56758 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56770 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57807 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57882 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57882 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-57882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57889 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57947 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-57948 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57996 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58011 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58012 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58013 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58014 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58017 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58020 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58085 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21631 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21635 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21636 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21637 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21638 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21639 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21647 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21659 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-21665 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21666 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21667 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21668 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21668 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-21669 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21669 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21671 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21673 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21675 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21678 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21680 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21681 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21684 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21684 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21687 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21687 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21688 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21689 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21690 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21692 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21697 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-21697 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21700 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21704 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-21705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21708 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21711 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21715 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21718 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21726 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21738 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21749 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21750 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21772 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21780 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21782 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21785 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21791 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21832 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21844 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21846 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21855 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* SUSE Linux Micro 6.1



An update that solves 272 vulnerabilities, contains eight features and has 91
fixes can now be installed.

## Description:

The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive
various security bugfixes.

The following security bugs were fixed:

* CVE-2023-52927: netfilter: allow exp not to be removed in
nf_ct_find_expectation (bsc#1239644).
* CVE-2024-26708: mptcp: fix inconsistent state on fastopen race
(bsc#1222672).
* CVE-2024-35910: tcp: properly terminate timers for kernel sockets
(bsc#1224489).
* CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock
(bsc#1227937).
* CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active
(bsc#1227858).
* CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp
(bsc#1230235).
* CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req
(bsc#1230438).
* CVE-2024-45010: mptcp: pm: only mark 'subflow' endp as available
(bsc#1230439).
* CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769).
* CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
* CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal
msg (bsc#1235711).
* CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by
freplace
kABI workaround (bsc#1235712).
* CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when
receiving proposal msg (bsc#1235733).
* CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount
underflow (bsc#1232812).
* CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync
(bsc#1231949).
* CVE-2024-50036: net: do not delay dst_entries_add() in dst_release()
(bsc#1231912).
* CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c
(bsc#1232389).
* CVE-2024-50085: mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
(bsc#1232508).
* CVE-2024-50140: net: sched: use RCU read-side critical section in
taprio_dump() (bsc#1233060).
* CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when
sel.family is unset (bsc#1233028).
* CVE-2024-50185: kABI fix for mptcp: handle consistently DSS corruption
(bsc#1233109).
* CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before
calling skb_checksum() (bsc#1233248).
* CVE-2024-50258: net: fix crash when config small
gso_max_size/gso_ipv4_max_size (bsc#1233221).
* CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls
(bsc#1233483).
* CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_find() (bsc#1233522).
* CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
(bsc#1233551).
* CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070).
* CVE-2024-53140: netlink: terminate outstanding dump on socket close
(bsc#1234222).
* CVE-2024-53147: exfat: fix out-of-bounds access of directory entries
(bsc#1234857).
* CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop
their dentry (bsc#1234894).
* CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error
paths (bsc#1234896).
* CVE-2024-53178: smb: Do not leak cfid when reconnect races with
open_cached_dir (bsc#1234895).
* CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in
ip_vs_protocol_init() (bsc#1235715).
* CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
(bsc#1235729).
* CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket()
(bsc#1235244).
* CVE-2024-56633: selftests/bpf: Add apply_bytes test to
test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485).
* CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu
area
handling under softirq" (bsc#1235524).
* CVE-2024-56640: net/smc: fix LGR and link use-after-free issue
(bsc#1235436).
* CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug
(bsc#1235435).
* CVE-2024-56658: net: defer final 'struct net' free in netns
dismantle
(bsc#1235441).
* CVE-2024-56702: bpf: Add tracepoints with null-able arguments
(bsc#1235501).
* CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next
hop churn (bsc#1235455).
* CVE-2024-56718: net/smc: protect link down work from execute after lgr
freed
(bsc#1235589).
* CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops
(bsc#1235591).
* CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data
(bsc#1235592).
* CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936).
* CVE-2024-56758: btrfs: check folio mapping after unlock in
relocate_one_folio() (bsc#1235621).
* CVE-2024-56770: net/sched: netem: account for backlog updates from child
qdisc (bsc#1235637).
* CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914).
* CVE-2024-57900: ila: serialize calls to nf_register_net_hooks()
(bsc#1235973).
* CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill
(bsc#1236333).
* CVE-2024-57974: udp: Deal with race between UDP socket address change and
rehash (bsc#1238532).
* CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).
* CVE-2024-57994: ptr_ring: do not block hard interrupts in
ptr_ring_resize_multiple() (bsc#1237901).
* CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit
(bsc#1239076).
* CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid
during
params (bsc#1239104).
* CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message
queue (bsc#1238997).
* CVE-2024-58083: KVM: Explicitly verify target vCPU is online in
kvm_get_vcpu() (bsc#1239036).
* CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
current->nsproxy (bsc#1236111).
* CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using
current->nsproxy (bsc#1236113).
* CVE-2025-21637: sctp: sysctl: udp_port: avoid using current->nsproxy
(bsc#1236114).
* CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy
(bsc#1236115).
* CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy
(bsc#1236122).
* CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using
current->nsproxy
(bsc#1236123).
* CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow
fairness counts (bsc#1236133).
* CVE-2025-21659: netdev: prevent accessing NAPI instances from another
namespace (bsc#1236206).
* CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits
(bsc#1236684).
* CVE-2025-21666: vsock: prevent null-ptr-deref in
vsock_*[has_data|has_space]
(bsc#1236680).
* CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits
(bsc#1236681).
* CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition
(bsc#1236682).
* CVE-2025-21669: vsock/virtio: discard packets if the transport changes
(bsc#1236683).
* CVE-2025-21670: vsock/bpf: return early if transport is not assigned
(bsc#1236685).
* CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname
(bsc#1236689).
* CVE-2025-21675: net/mlx5: Clear port select structure when fail to create
(bsc#1236694).
* CVE-2025-21678: gtp: Destroy device along with udp socket's netns
dismantle
(bsc#1236698).
* CVE-2025-21680: pktgen: Avoid out-of-bounds access in get_imix_entries
(bsc#1236700).
* CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with
carrier (bsc#1236702).
* CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls
(bsc#1237045).
* CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
* CVE-2025-21693: mm: zswap: properly synchronize freeing resources during
CPU
hotunplug (bsc#1237029).
* CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one
parent to another (bsc#1237159).
* CVE-2025-21701: net: avoid race between device unregistration and ethnl ops
(bsc#1237164).
* CVE-2025-21703: netem: Update sch->q.qlen before
qdisc_tree_reduce_backlog()
(bsc#1237313).
* CVE-2025-21705: mptcp: handle fastopen disconnect correctly (bsc#1238525).
* CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp
(bsc#1238528).
* CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove (bsc#1237889).
* CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump()
(bsc#1237891).
* CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries
(bsc#1238860).
* CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in
iova_bitmap_offset_to_index() (bsc#1238863).
* CVE-2025-21725: smb: client: fix oops due to unset link speed
(bsc#1238877).
* CVE-2025-21728: bpf: Send signals asynchronously if !preemptible
(bsc#1237879).
* CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints
(bsc#1238494).
* CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506).
* CVE-2025-21753: btrfs: fix use-after-free when attempting to join an
aborted
transaction (bsc#1237875).
* CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent
after transaction abort (bsc#1238496).
* CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send()
(bsc#1238738).
* CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb()
(bsc#1238763).
* CVE-2025-21761: openvswitch: use RCU protection in
ovs_vport_cmd_fill_info()
(bsc#1238775).
* CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).
* CVE-2025-21763: neighbour: use RCU protection in __neigh_notify()
(bsc#1237897).
* CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss()
(bsc#1237906).
* CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu()
(bsc#1238754).
* CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling
get_random_u32() in atomic context (bsc#1238509).
* CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value
(bsc#1238753).
* CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
* CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback (bsc#1238759).
* CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in
am65_cpsw_nuss_remove_tx_chns() (bsc#1238739).
* CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling
(bsc#1238751).
* CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer
(bsc#1238971).
* CVE-2025-21844: smb: client: Add check for next_buffer in
receive_encrypted_standard() (bsc#1239512).
* CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
(bsc#1239479).
* CVE-2025-21856: s390/ism: add release function for struct device
(bsc#1239486).
* CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL
dereference (bsc#1239478).
* CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in
migrate_device_finalize() (bsc#1239483).
* CVE-2025-21862: drop_monitor: fix incorrect initialization order
(bsc#1239474).
* CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we
currently drop (bsc#1239482).
* CVE-2025-21865: gtp: Suppress list corruption splat in
gtp_net_exit_batch_rtnl() (bsc#1239481).
* CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH
copiers (bsc#1240191).
* CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).
* CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189).
* CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173).
* CVE-2025-21891: ipvlan: ensure network headers are in skb linear part
(bsc#1240186).

The following non-security bugs were fixed:

* ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes).
* ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are
invalid (bsc#1237530).
* ACPI: property: Fix return value for nval == 0 in acpi_data_prop_read()
(git-fixes).
* ACPI: resource: IRQ override for Eluktronics MECH-17 (stable-fixes).
* ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V
(stable-fixes).
* ALSA: hda/cirrus: Correct the full scale volume set logic (git-fixes).
* ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED
(stable-fixes).
* ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable-
fixes).
* ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx
(stable-fixes).
* ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using
CS35L41 HDA (stable-fixes).
* ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using
CS35L41 HDA (stable-fixes).
* ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using
CS35L41
HDA (stable-fixes).
* ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41
HDA (stable-fixes).
* ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using
CS35L41 HDA (stable-fixes).
* ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using
CS35L41 HDA (stable-fixes).
* ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA
(stable-fixes).
* ALSA: hda/realtek: Add support for various HP Laptops using CS35L41 HDA
(stable-fixes).
* ALSA: hda/realtek: Always honor no_shutup_pins (git-fixes).
* ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes).
* ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA
(git-
fixes).
* ALSA: hda/realtek: Fix microphone regression on ASUS N705UD (git-fixes).
* ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15 (git-fixes).
* ALSA: hda/realtek: Fixup ALC225 depop procedure (git-fixes).
* ALSA: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes).
* ALSA: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes).
* ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes).
* ALSA: hda/realtek: update ALC222 depop optimize (stable-fixes).
* ALSA: hda: Add error check for snd_ctl_rename_id() in
snd_hda_create_dig_out_ctls() (git-fixes).
* ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes).
* ALSA: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes).
* ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes).
* ALSA: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence()
(git-
fixes).
* ALSA: seq: Avoid module auto-load handling at event delivery
(stable-fixes).
* ALSA: seq: Drop UMP events when no UMP-conversion is set (git-fixes).
* ALSA: seq: Make dependency on UMP clearer (git-fixes).
* ALSA: seq: remove redundant 'tristate' for SND_SEQ_UMP_CLIENT
(stable-
fixes).
* ALSA: usb-audio: Add quirk for Plantronics headsets to fix control names
(stable-fixes).
* ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports (git-
fixes).
* ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2 (stable-
fixes).
* ALSA: usb-audio: separate DJM-A9 cap lvl options (git-fixes).
* ALSA: usx2y: validate nrpacks module parameter on probe (git-fixes).
* APEI: GHES: Have GHES honor the panic= setting (stable-fixes).
* ASoC: Intel: avs: Abstract IPC handling (stable-fixes).
* ASoC: Intel: avs: Do not readq() u32 registers (git-fixes).
* ASoC: Intel: avs: Prefix SKL/APL-specific members (stable-fixes).
* ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet 5V
(stable-fixes).
* ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module
(stable-
fixes).
* ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes).
* ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close (git-fixes).
* ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()
(git-
fixes).
* ASoC: amd: Add ACPI dependency to fix build error (stable-fixes).
* ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model
(stable-fixes).
* ASoC: arizona/madera: use fsleep() in up/down DAPM event delays (stable-
fixes).
* ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git-
fixes).
* ASoC: cs35l41: check the return value from spi_setup() (git-fixes).
* ASoC: es8328: fix route from DAC to output (git-fixes).
* ASoC: fsl_micfil: Enable default case in micfil_set_quality() (git-fixes).
* ASoC: ops: Consistently treat platform_max as control value (git-fixes).
* ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB] (git-
fixes).
* ASoC: rt722-sdca: add missing readable registers (git-fixes).
* ASoC: tas2764: Fix power control mask (stable-fixes).
* ASoC: tas2764: Set the SDOUT polarity correctly (stable-fixes).
* ASoC: tas2770: Fix volume scale (stable-fixes).
* ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio
compatible (git-fixes).
* Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() (git-
fixes).
* Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name()
(git-fixes).
* Bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes).
* Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel
(git-fixes).
* Bluetooth: Improve setsockopt() handling of malformed user input (git-
fixes).
* Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response (git-fixes).
* Bluetooth: MGMT: Fix slab-use-after-free Read in
mgmt_remove_adv_monitor_sync (stable-fixes).
* Bluetooth: hci_event: Fix connection regression between LE and non-LE
adapters (git-fixes).
* Bluetooth: hci_event: Fix enabling passive scanning (git-fixes).
* Documentation: qat: fix auto_reset attribute details (git-fixes).
* Documentation: qat: fix auto_reset section (git-fixes).
* Drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio()
(git-fixes).
* Fix memory-hotplug regression (bsc#1237504)
* Grab mm lock before grabbing pt lock (git-fixes).
* HID: Enable playstation driver independently of sony driver (git-fixes).
* HID: Wacom: Add PCI Wacom device support (stable-fixes).
* HID: apple: disable Fn key handling on the Omoton KB066 (git-fixes).
* HID: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes).
* HID: appleir: Fix potential NULL dereference at raw event handle (git-
fixes).
* HID: google: fix unused variable warning under !CONFIG_ACPI (git-fixes).
* HID: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes).
* HID: hid-steam: Add Deck IMU support (stable-fixes).
* HID: hid-steam: Add gamepad-only mode switched to by holding options
(stable-fixes).
* HID: hid-steam: Avoid overwriting smoothing parameter (stable-fixes).
* HID: hid-steam: Clean up locking (stable-fixes).
* HID: hid-steam: Disable watchdog instead of using a heartbeat (stable-
fixes).
* HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context (git-
fixes).
* HID: hid-steam: Fix cleanup in probe() (git-fixes).
* HID: hid-steam: Fix use-after-free when detaching device (git-fixes).
* HID: hid-steam: Make sure rumble work is canceled on removal
(stable-fixes).
* HID: hid-steam: Move hidraw input (un)registering to work (git-fixes).
* HID: hid-steam: Update list of identifiers from SDL (stable-fixes).
* HID: hid-steam: remove pointless error message (stable-fixes).
* HID: hid-thrustmaster: fix stack-out-of-bounds read in
usb_check_int_endpoints() (git-fixes).
* HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend
(stable-fixes).
* HID: ignore non-functional sensor in HP 5MP Camera (stable-fixes).
* HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git-
fixes).
* HID: intel-ish-hid: Send clock sync message immediately after reset
(stable-
fixes).
* HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell
(stable-
fixes).
* HID: multitouch: Add NULL check in mt_input_configured (git-fixes).
* HID: remove superfluous (and wrong) Makefile entry for
CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes).
* HID: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes).
* IB/mad: Check available slots before posting receive WRs (git-fixes)
* IB/mlx5: Set and get correct qp_num for a DCT QP (git-fixes)
* Input: ads7846 - fix gpiod allocation (git-fixes).
* Input: allocate keycode for phone linking (stable-fixes).
* Input: i8042 - add required quirks for missing old boardnames (stable-
fixes).
* Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ
(stable-fixes).
* Input: i8042 - swap old quirk combination with new quirk for more devices
(stable-fixes).
* Input: i8042 - swap old quirk combination with new quirk for several
devices
(stable-fixes).
* Input: iqs7222 - add support for Azoteq IQS7222D (git-fixes).
* Input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes).
* Input: iqs7222 - preserve system status register (git-fixes).
* Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE
controllers (stable-fixes).
* Input: xpad - add multiple supported devices (stable-fixes).
* Input: xpad - add support for TECNO Pocket Go (stable-fixes).
* Input: xpad - add support for ZOTAC Gaming Zone (stable-fixes).
* Input: xpad - rename QH controller to Legion Go S (stable-fixes).
* KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is
cleared (git-fixes).
* KVM: VMX: Fix comment of handle_vmx_instruction() (git-fixes).
* KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset()
(jsc#PED-348 git-fixes).
* KVM: arm64: Do not eagerly teardown the vgic on init error (git-fixes).
* KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration (git-
fixes).
* KVM: arm64: Fix alignment of kvm_hyp_memcache allocations (git-fixes).
* KVM: arm64: Flush hyp bss section after initialization of variables in bss
(git-fixes).
* KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state
(git-fixes)
* KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR (git-fixes).
* KVM: nSVM: Enter guest mode before initializing nested NPT MMU (git-fixes).
* KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID disabled
(jsc#PED-348 git-fixes).
* KVM: s390: vsie: fix some corner-cases when grabbing vsie pages (git-fixes
bsc#1237155).
* KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a
leaf SPTE
(git-fixes).
* KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB (git-fixes).
* KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX
(git-fixes).
* KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (git-fixes).
* KVM: x86: Avoid double RDPKRU when loading host/guest PKRU (git-fixes).
* KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init (git-
fixes).
* KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit() (git-
fixes).
* KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't
in-kernel
(git-fixes).
* KVM: x86: Unconditionally set irr_pending when updating APICv state
(jsc#PED-348).
* KVM: x86: Zero out PV features cache when the CPUID leaf is not present
(git-fixes).
* Move upstreamed ACPI patch into sorted section
* Move upstreamed PCI and initramfs patches into sorted section
* Move upstreamed nfsd and sunrpc patches into sorted section
* Move upstreamed powerpc and SCSI patches into sorted section
* PCI/ACS: Fix 'pci=config_acs=' parameter (git-fixes).
* PCI/ASPM: Fix link state exit during switch upstream function removal (git-
fixes).
* PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req()
(bsc#1237853)
* PCI/DOE: Support discovery version 2 (bsc#1237853)
* PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P (stable-fixes).
* PCI/portdrv: Only disable pciehp interrupts early when needed (git-fixes).
* PCI: Avoid reset when disabled via sysfs (git-fixes).
* PCI: Fix reference leak in pci_alloc_child_bus() (git-fixes).
* PCI: Remove stray put_device() in pci_register_host_bridge() (git-fixes).
* PCI: Use downstream bridges for distributing resources (bsc#1237325).
* PCI: brcmstb: Fix error path after a call to regulator_bulk_get() (git-
fixes).
* PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes).
* PCI: brcmstb: Fix potential premature regulator disabling (git-fixes).
* PCI: brcmstb: Set generation limit before PCIe link up (git-fixes).
* PCI: brcmstb: Use internal register to change link capability (git-fixes).
* PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data
payload (git-fixes).
* PCI: dwc: ep: Return -ENOMEM for allocation failures (git-fixes).
* PCI: hookup irq_get_affinity callback (bsc#1236896).
* PCI: imx6: Simplify clock handling by using clk_bulk*() function (git-
fixes).
* PCI: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes).
* PCI: switchtec: Add Microchip PCI100X device IDs (stable-fixes).
* PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes).
* PM: sleep: Adjust check before setting power.must_resume (git-fixes).
* PM: sleep: Fix handling devices with direct_complete set on errors (git-
fixes).
* RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
* RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes)
* RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes)
* RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers
(git-fixes)
* RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes)
* RDMA/core: Do not expose hw_counters outside of init net namespace (git-
fixes)
* RDMA/efa: Reset device on probe failure (git-fixes)
* RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes)
* RDMA/hns: Fix a missing rollback in error path of
hns_roce_create_qp_common() (git-fixes)
* RDMA/hns: Fix mbox timing out by adding retry mechanism (git-fixes)
* RDMA/hns: Fix missing xa_destroy() (git-fixes)
* RDMA/hns: Fix soft lockup during bt pages loop (git-fixes)
* RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git-
fixes)
* RDMA/hns: Fix wrong value of max_sge_rd (git-fixes)
* RDMA/mana_ib: Allocate PAGE aligned doorbell index (git-fixes).
* RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
* RDMA/mlx5: Fix AH static rate parsing (git-fixes)
* RDMA/mlx5: Fix MR cache initialization error flow (git-fixes)
* RDMA/mlx5: Fix a WARN during dereg_mr for DM type (git-fixes)
* RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error (git-
fixes)
* RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes)
* RDMA/mlx5: Fix cache entry update on dereg error (git-fixes)
* RDMA/mlx5: Fix calculation of total invalidated pages (git-fixes)
* RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes)
* RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes)
* RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes)
* RDMA/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes)
* RDMA/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex()
tests (git-fixes)
* RDMA/rxe: Improve newline in printing messages (git-fixes)
* Reapply "wifi: ath11k: restore country code during resume"
(bsc#1207948).
* Revert "blk-throttle: Fix IO hang for a corner case" (git-fixes).
* Revert "dm: requeue IO if mapping table not yet available"
(git-fixes).
* Revert "drivers/card_reader/rtsx_usb: Restore interrupt based
detection"
(git-fixes).
* Revert "drm/amd/display: Use HW lock mgr for PSR1" (stable-fixes).
* Revert "leds-pca955x: Remove the unused function
pca95xx_num_led_regs()"
(stable-fixes).
* Revert "wifi: ath11k: restore country code during resume"
(bsc#1207948).
* Revert "wifi: ath11k: support hibernation" (bsc#1207948).
* SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes).
* SUNRPC: Prevent looping due to rpc_signal_task() races (git-fixes).
* SUNRPC: convert RPC_TASK_* constants to enum (git-fixes).
* UPSTREAM: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open()
(git-fixes).
* USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (stable-
fixes).
* USB: Fix the issue of task recovery failure caused by USB status when S4
wakes up (git-fixes).
* USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk (git-fixes).
* USB: gadget: f_midi: f_midi_complete to call queue_work (git-fixes).
* USB: hub: Ignore non-compliant devices with too many configs or interfaces
(stable-fixes).
* USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI (stable-fixes).
* USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist (stable-fixes).
* USB: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes).
* USB: serial: option: add MeiG Smart SLM828 (stable-fixes).
* USB: serial: option: add Telit Cinterion FE990B compositions
(stable-fixes).
* USB: serial: option: add Telit Cinterion FN990B compositions
(stable-fixes).
* USB: serial: option: drop MeiG Smart defines (stable-fixes).
* USB: serial: option: fix Telit Cinterion FE990A name (stable-fixes).
* USB: serial: option: fix Telit Cinterion FN990A name (stable-fixes).
* USB: serial: option: match on interface class for Telit FN990B (stable-
fixes).
* Update "drm/mgag200: Added support for the new device G200eH5"
(jsc#PED-12094)
* Use gcc-13 for build on SLE16 (jsc#PED-10028).
* accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes).
* accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes).
* acct: block access to kernel internal filesystems (git-fixes).
* acct: perform last write from workqueue (git-fixes).
* add nf_tables for iptables non-legacy network handling.
* af_packet: do not call packet_read_pending() from tpacket_destruct_skb()
(bsc#1237849).
* af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb()
(bsc#1239435).
* af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash
(bsc#1239435).
* af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334).
* amdgpu/pm/legacy: fix suspend/resume issues (git-fixes).
* arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes)
* arm64: Handle .ARM.attributes section in linker scripts (git-fixes)
* arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (git-fixes)
* arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes)
* arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git-
fixes)
* arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes)
* arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git-
fixes)
* arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git-
fixes)
* arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes)
* arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes)
* arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes)
* arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes)
* arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git-
fixes)
* arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git-
fixes)
* arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git-
fixes)
* arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git-
fixes)
* arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git-
fixes)
* arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git-
fixes)
* arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level
(git-fixes)
* arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes (git-
fixes)
* arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE (git-fixes)
* arm64: mm: Populate vmemmap at the page level if not section aligned (git-
fixes)
* arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes)
* ata: ahci: Add mask_port_map module parameter (git-fixes).
* ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git-
fixes).
* ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes).
* ata: libata-sff: Ensure that we cannot write outside the allocated buffer
(stable-fixes).
* ata: libata: Fix NCQ Non-Data log not supported print (git-fixes).
* ata: pata_parport: add custom version of wait_after_reset (git-fixes).
* ata: pata_parport: fit3: implement IDE command set registers (git-fixes).
* ata: pata_serverworks: Do not use the term blacklist (git-fixes).
* ata: sata_highbank: fix OF node reference leak in
highbank_initialize_phys()
(git-fixes).
* ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes).
* auxdisplay: panel: Fix an API misuse in panel.c (git-fixes).
* backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()
(git-fixes).
* batman-adv: Drop unmanaged ELP metric worker (git-fixes).
* batman-adv: Ignore neighbor throughput metrics in error case
(stable-fixes).
* batman-adv: Ignore own maximum aggregation size during RX (git-fixes).
* batman-adv: fix panic during interface removal (git-fixes).
* bio-integrity: do not restrict the size of integrity metadata (git-fixes).
* bitmap: introduce generic optimized bitmap_size() (git-fixes).
* blk-cgroup: Fix class @block_class's subsystem refcount leakage
(bsc#1237558).
* blk-cgroup: Properly propagate the iostat update up the hierarchy
(bsc#1225606).
* blk-iocost: Avoid using clamp() on inuse in __propagate_weights() (git-
fixes).
* blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less long
(git-
fixes).
* blk-mq: add number of queue calc helper (bsc#1236897).
* blk-mq: create correct map for fallback case (bsc#1236896).
* blk-mq: do not count completed flush data request as inflight in case of
quiesce (git-fixes).
* blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896).
* blk-mq: issue warning when offlining hctx with online isolcpus
(bsc#1236897).
* blk-mq: move cpuhp callback registering out of q->sysfs_lock
(git-fixes).
* blk-mq: register cpuhp callback after hctx is added to xarray table (git-
fixes).
* blk-mq: use hk cpus only when isolcpus=managed_irq is enabled
(bsc#1236897).
* blk_iocost: remove some duplicate irq disable/enables (git-fixes).
* block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (git-fixes).
* block: Clear zone limits for a non-zoned stacked queue (git-fixes).
* block: Fix elevator_get_default() checking for NULL q->tag_set
(git-fixes).
* block: Fix lockdep warning in blk_mq_mark_tag_wait (git-fixes).
* block: Fix page refcounts for unaligned buffers in __bio_release_pages()
(git-fixes).
* block: Provide bdev_open_* functions (git-fixes).
* block: Remove special-casing of compound pages (git-fixes).
* block: Set memalloc_noio to false on device_add_disk() error path (git-
fixes).
* block: add a disk_has_partscan helper (git-fixes).
* block: add a partscan sysfs attribute for disks (git-fixes).
* block: add check of 'minors' and 'first_minor' in
device_add_disk() (git-
fixes).
* block: avoid to reuse `hctx` not removed from cpuhp callback list (git-
fixes).
* block: change rq_integrity_vec to respect the iterator (git-fixes).
* block: cleanup and fix batch completion adding conditions (git-fixes).
* block: copy back bounce buffer to user-space correctly in case of split
(git-fixes).
* block: do not revert iter for -EIOCBQUEUED (git-fixes).
* block: ensure we hold a queue reference when using queue limits
(git-fixes).
* block: fix and simplify blkdevparts= cmdline parsing (git-fixes).
* block: fix bio_split_rw_at to take zone_write_granularity into account
(git-
fixes).
* block: fix integer overflow in BLKSECDISCARD (git-fixes).
* block: fix missing dispatching request when queue is started or unquiesced
(git-fixes).
* block: fix ordering between checking BLK_MQ_S_STOPPED request adding (git-
fixes).
* block: fix ordering between checking QUEUE_FLAG_QUIESCED request adding
(git-fixes).
* block: fix sanity checks in blk_rq_map_user_bvec (git-fixes).
* block: propagate partition scanning errors to the BLKRRPART ioctl (git-
fixes).
* block: remove the blk_flush_integrity call in blk_integrity_unregister
(git-
fixes).
* block: retry call probe after request_module in blk_request_module (git-
fixes).
* block: return unsigned int from bdev_io_min (git-fixes).
* block: sed-opal: avoid possible wrong address reference in
read_sed_opal_key() (git-fixes).
* block: support to account io_ticks precisely (git-fixes).
* block: use the right type for stub rq_integrity_vec() (git-fixes).
* bluetooth: btusb: Initialize .owner field of force_poll_sync_fops (git-
fixes).
* bnxt_en: Fix possible memory leak when hwrm_req_replace fails (git-fixes).
* bnxt_en: Refactor bnxt_ptp_init() (git-fixes).
* bnxt_en: Unregister PTP during PCI shutdown and suspend (git-fixes).
* bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes).
* bpf: Fix a verifier verbose message (git-fixes).
* bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git-
fixes).
* bpf: Use -Wno-error in certain tests when building with GCC (git-fixes).
* bpf: prevent r10 register from being marked as precise (git-fixes).
* broadcom: fix supported flag check in periodic output function (git-fixes).
* btrfs: check delayed refs when we're checking if a ref exists
(bsc#1239605).
* btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045).
* btrfs: drop the backref cache during relocation if we commit (bsc#1239605).
* btrfs: fix defrag not merging contiguous extents due to merged extent maps
(bsc#1237232).
* btrfs: fix extent map merging not happening for adjacent extents
(bsc#1237232).
* btrfs: remove the mirror_num argument to btrfs_submit_compressed_read
(bsc#1239045).
* btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage
(bsc#1239045).
* btrfs: use a separate end_io handler for extent_buffer writing
(bsc#1239045).
* bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes).
* bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
(git-fixes).
* bus: qcom-ssc-block-bus: Fix the error handling path of
qcom_ssc_block_bus_probe() (git-fixes).
* bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls
(git-fixes).
* bus: simple-pm-bus: fix forced runtime PM use (git-fixes).
* can: c_can: fix unbalanced runtime PM disable in error path (git-fixes).
* can: ctucanfd: handle skb allocation failure (git-fixes).
* can: etas_es58x: fix potential NULL pointer dereference on udev->serial
(git-fixes).
* can: flexcan: disable transceiver during system PM (git-fixes).
* can: flexcan: only change CAN state when link up in system PM (git-fixes).
* can: j1939: j1939_sk_send_loop(): fix unable to send messages with data
length zero (git-fixes).
* can: rcar_canfd: Fix page entries in the AFL list (git-fixes).
* can: ucan: fix out of bound read in strscpy() source (git-fixes).
* cdx: Fix possible UAF error in driver_override_show() (git-fixes).
* char: misc: deallocate static minor in error path (git-fixes).
* chelsio/chtls: prevent potential integer overflow on 32bit (git-fixes).
* cifs: Fix parsing reparse point with native symlink in SMB1 non-UNICODE
session (git-fixes).
* cifs: Remove intermediate object of failed create reparse call (git-fixes).
* cifs: commands that are retried should have replay flag set (bsc#1231432).
* cifs: fix potential null pointer use in destroy_workqueue in init_cifs
error
path (bsc#1231432).
* cifs: helper function to check replayable error codes (bsc#1231432).
* cifs: new mount option called retrans (bsc#1231432).
* cifs: open_cached_dir should not rely on primary channel (bsc#1231432).
* cifs: open_cached_dir(): add FILE_READ_EA to desired access (git-fixes).
* cifs: update desired access while requesting for directory lease (git-
fixes).
* cifs: update the same create_guid on replay (git-fixes).
* clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe (git-
fixes).
* clk: mediatek: mt2701-bdp: add missing dummy clk (git-fixes).
* clk: mediatek: mt2701-img: add missing dummy clk (git-fixes).
* clk: mediatek: mt2701-mm: add missing dummy clk (git-fixes).
* clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe (git-
fixes).
* clk: qcom: clk-alpha-pll: fix alpha mode configuration (git-fixes).
* clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate (git-fixes).
* clk: qcom: dispcc-sm6350: Add missing parent_map for a clock (git-fixes).
* clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg
(git-fixes).
* clk: qcom: gcc-sm6350: Add missing parent_map for two clocks (git-fixes).
* clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during gdsc_disable()
(git-fixes).
* clk: sunxi-ng: a100: enable MMC clock reparenting (git-fixes).
* clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes).
* config: Set gcc version (jsc#PED-12251).
* coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes).
* cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged
(bsc#1237856)
* cpu/hotplug: Do not offline the last non-isolated CPU (bsc#1237562).
* cpu/hotplug: Prevent self deadlock on CPU hot-unplug (bsc#1237562).
* cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707).
* cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856)
* cpufreq/cppc: Move and rename (bsc#1237856)
* cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create
(bsc#1237856)
* cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error
(bsc#1237856)
* cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily (git-fixes).
* cpufreq: imx6q: do not warn for disabling a non-existing frequency (git-
fixes).
* cpufreq: mediatek-hw: Do not error out if supply is not found (git-fixes).
* cpufreq: mediatek-hw: Wait for CPU supplies before probing (git-fixes).
* cpufreq: qcom-nvmem: Enable virtual power domain devices (git-fixes).
* cpufreq: qcom-nvmem: Simplify driver data allocation (stable-fixes).
* cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes).
* cpufreq: qcom-nvmem: drop pvs_ver for format a fuses (git-fixes).
* cpufreq: qcom-nvmem: fix memory leaks in probe error paths (git-fixes).
* cpufreq: qcom-nvmem: use SoC ID-s from bindings (git-fixes).
* cpufreq: qcom-nvmem: use helper to get SMEM SoC ID (git-fixes).
* cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh IRQ is
not available (git-fixes).
* cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq* clocks
(git-fixes).
* cpufreq: s3c64xx: Fix compilation warning (stable-fixes).
* cpumask: add cpumask_weight_andnot() (bsc#1239015).
* cpumask: define cleanup function for cpumasks (bsc#1239015).
* crypto: ccp - Fix check for the primary ASP device (git-fixes).
* crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes).
* crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes).
* crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes).
* crypto: hisilicon/sec2 - fix for aead icv error (git-fixes).
* crypto: hisilicon/sec2 - fix for aead invalid authsize (git-fixes).
* crypto: hisilicon/sec2 - fix for sec spec check (git-fixes).
* crypto: hisilicon/sec2 - optimize the error return process (stable-fixes).
* crypto: iaa - Add global_stats file and remove individual stat files
(jsc#PED-12416).
* crypto: iaa - Change desc->priv to 0 (jsc#PED-12416).
* crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416).
* crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416).
* crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416).
* crypto: iaa - Remove header table code (jsc#PED-12416).
* crypto: iaa - Remove potential infinite loop in check_completion()
(jsc#PED-12416).
* crypto: iaa - Remove unnecessary debugfs_create_dir() error check in
iaa_crypto_debugfs_init() (jsc#PED-12416).
* crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
(jsc#PED-12416).
* crypto: iaa - Test the correct request flag (git-fixes).
* crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416).
* crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
(jsc#PED-12416).
* crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416).
* crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags
(jsc#PED-12416).
* crypto: iaa - remove unneeded semicolon (jsc#PED-12416).
* crypto: nx - Fix uninitialised hv_nxc on error (git-fixes).
* crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
(jsc#PED-12416).
* crypto: qat - Constify struct pm_status_row (jsc#PED-12416).
* crypto: qat - Fix missing destroy_workqueue in adf_init_aer()
(jsc#PED-12416).
* crypto: qat - Fix spelling mistake "Invalide" ->
"Invalid" (jsc#PED-12416).
* crypto: qat - Fix typo "accelaration" (jsc#PED-12416).
* crypto: qat - Fix typo (jsc#PED-12416).
* crypto: qat - Remove trailing space after \n newline (jsc#PED-12416).
* crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416).
* crypto: qat - add admin msgs for telemetry (jsc#PED-12416).
* crypto: qat - add auto reset on error (jsc#PED-12416).
* crypto: qat - add bank save and restore flows (jsc#PED-12416).
* crypto: qat - add fatal error notification (jsc#PED-12416).
* crypto: qat - add fatal error notify method (jsc#PED-12416).
* crypto: qat - add heartbeat error simulator (jsc#PED-12416).
* crypto: qat - add interface for live migration (jsc#PED-12416).
* crypto: qat - add support for 420xx devices (jsc#PED-12416).
* crypto: qat - add support for device telemetry (jsc#PED-12416).
* crypto: qat - add support for ring pair level telemetry (jsc#PED-12416).
* crypto: qat - adf_get_etr_base() helper (jsc#PED-12416).
* crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416).
* crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416).
* crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416).
* crypto: qat - disable arbitration before reset (jsc#PED-12416).
* crypto: qat - ensure correct order in VF restarting handler
(jsc#PED-12416).
* crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416).
* crypto: qat - fix "Full Going True" macro definition
(jsc#PED-12416).
* crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
(jsc#PED-12416).
* crypto: qat - fix comment structure (jsc#PED-12416).
* crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416).
* crypto: qat - fix recovery flow for VFs (jsc#PED-12416).
* crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416).
* crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416).
* crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416).
* crypto: qat - implement interface for live migration (jsc#PED-12416).
* crypto: qat - improve aer error reset handling (jsc#PED-12416).
* crypto: qat - improve error message in adf_get_arbiter_mapping()
(jsc#PED-12416).
* crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416).
* crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416).
* crypto: qat - limit heartbeat notifications (jsc#PED-12416).
* crypto: qat - make adf_ctl_class constant (jsc#PED-12416).
* crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416).
* crypto: qat - move PFVF compat checker to a function (jsc#PED-12416).
* crypto: qat - move fw config related structures (jsc#PED-12416).
* crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416).
* crypto: qat - re-enable sriov after pf reset (jsc#PED-12416).
* crypto: qat - relocate CSR access code (jsc#PED-12416).
* crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416).
* crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416).
* crypto: qat - remove access to parity register for QAT GEN4 (git-fixes).
* crypto: qat - remove unnecessary description from comment (jsc#PED-12416).
* crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416).
* crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416).
* crypto: qat - set parity error mask for qat_420xx (git-fixes).
* crypto: qat - uninitialized variable in adf_hb_error_inject_write()
(jsc#PED-12416).
* crypto: qat - update PFVF protocol for recovery (jsc#PED-12416).
* crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416).
* crypto: qat - validate slices count returned by FW (jsc#PED-12416).
* crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416).
* cxgb4: Avoid removal of uninserted tid (git-fixes).
* cxgb4: use port number to set mac addr (git-fixes).
* devlink: avoid potential loop in devlink_rel_nested_in_notify_work()
(bsc#1237234).
* dlm: fix srcu_read_lock() return type to int (git-fixes).
* dlm: prevent NPD when writing a positive value to event_done (git-fixes).
* dm array: fix cursor index when skipping across block boundaries (git-
fixes).
* dm array: fix unreleased btree blocks on closing a faulty array cursor
(git-
fixes).
* dm init: Handle minors larger than 255 (git-fixes).
* dm integrity: fix out-of-range warning (git-fixes).
* dm persistent data: fix memory allocation failure (git-fixes).
* dm resume: do not return EINVAL when signalled (git-fixes).
* dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes).
* dm thin: Add missing destroy_work_on_stack() (git-fixes).
* dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit()
(git-fixes).
* dm-crypt: track tag_offset in convert_context (git-fixes).
* dm-delay: fix hung task introduced by kthread mode (git-fixes).
* dm-delay: fix max_delay calculations (git-fixes).
* dm-delay: fix workqueue delay_timer race (git-fixes).
* dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes).
* dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git-
fixes).
* dm-integrity: align the outgoing bio in integrity_recheck (git-fixes).
* dm-integrity: fix a race condition when accessing recalc_sector
(git-fixes).
* dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes).
* dm-unstriped: cast an operand to sector_t to prevent potential uint32_t
overflow (git-fixes).
* dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2)
(git-fixes).
* dm: Fix typo in error message (git-fixes).
* dma: kmsan: export kmsan_handle_dma() for modules (git-fixes).
* doc/README.SUSE: Point to the updated version of LKMPG
* doc: update managed_irq documentation (bsc#1236897).
* driver core: Remove needless return in void API device_remove_group() (git-
fixes).
* driver core: bus: add irq_get_affinity callback to bus_type (bsc#1236896).
* drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes).
* drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
(git-fixes).
* drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable-
fixes).
* drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes).
* drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable-
fixes).
* drm/amd/display: Fix HPD after gpu reset (stable-fixes).
* drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor
(stable-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
resource_build_scaling_params (git-fixes).
* drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes).
* drm/amd/display: Restore correct backlight brightness after a GPU reset
(stable-fixes).
* drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes).
* drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes).
* drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters()
(git-fixes).
* drm/amd/pm: Mark MM activity as unsupported (stable-fixes).
* drm/amdgpu/umsch: declare umsch firmware (git-fixes).
* drm/amdgpu: Check extended configuration space register when system uses
large bar (stable-fixes).
* drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable-
fixes).
* drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes).
* drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid
Priority Inversion in SRIOV (git-fixes).
* drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (stable-
fixes).
* drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode()
(git-fixes).
* drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes).
* drm/amdgpu: fix UVD contiguous CS mapping problem (bsc#1236759).
* drm/amdkfd: Fix Circular Locking Dependency in
'svm_range_cpu_invalidate_pagetables' (git-fixes).
* drm/amdkfd: only flush the validate MES contex (stable-fixes).
* drm/atomic: Filter out redundant DPMS calls (stable-fixes).
* drm/bridge: Fix spelling mistake "gettin" -> "getting"
(git-fixes).
* drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT (stable-
fixes).
* drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes).
* drm/bridge: it6505: fix HDCP CTS KSV list wait timer (stable-fixes).
* drm/bridge: it6505: fix HDCP CTS compare V matching (stable-fixes).
* drm/bridge: it6505: fix HDCP V match check is not performed correctly (git-
fixes).
* drm/bridge: it6505: fix HDCP encryption when R0 ready (stable-fixes).
* drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes).
* drm/dp_mst: Fix drm RAD print (git-fixes).
* drm/dp_mst: Fix locking when skipping CSN before topology probing (git-
fixes).
* drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git-
fixes).
* drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git-
fixes).
* drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes).
* drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes).
* drm/i915/dp: Fix error handling during 128b/132b link training (stable-
fixes).
* drm/i915/dp: Iterate DSC BPP from high to low on all platforms (git-fixes).
* drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro
(git-fixes).
* drm/i915/guc: Debug print LRC state entries only if the context is pinned
(git-fixes).
* drm/i915/pmu: Fix zero delta busyness issue (git-fixes).
* drm/i915/selftests: avoid using uninitialized context (git-fixes).
* drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes).
* drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes (stable-fixes).
* drm/i915: Fix page cleanup on DMA remap failure (git-fixes).
* drm/i915: Make sure all planes in use by the joiner have their crtc
included
(stable-fixes).
* drm/komeda: Add check for komeda_get_layer_fourcc_list() (git-fixes).
* drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git-
fixes).
* drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes).
* drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes).
* drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git-
fixes).
* drm/mgag200: Added support for the new device G200eH5 (jsc#PED-12094)
* drm/modeset: Handle tiled displays in pan_display_atomic (stable-fixes).
* drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes).
* drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes).
* drm/msm/dpu: Disable dither in phys encoder cleanup (git-fixes).
* drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC fields
(git-
fixes).
* drm/msm/dpu: do not use active in atomic_check() (git-fixes).
* drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git-
fixes).
* drm/msm/dsi: Use existing per-interface slice count in DSC timing (git-
fixes).
* drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER (stable-fixes).
* drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit()
(git-fixes).
* drm/msm: Avoid rounding up to one jiffy (git-fixes).
* drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes).
* drm/nouveau: Do not override forced connector status (stable-fixes).
* drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes).
* drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes).
* drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable-
fixes).
* drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git-
fixes).
* drm/repaper: fix integer overflows in repeat functions (git-fixes).
* drm/rockchip: move output interface related definition to
rockchip_drm_drv.h
(stable-fixes).
* drm/rockchip: vop2: Fix the windows switch between different layers (git-
fixes).
* drm/rockchip: vop2: Set YUV/RGB overlay mode (stable-fixes).
* drm/rockchip: vop2: include rockchip_drm_drv.h (git-fixes).
* drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config (stable-
fixes).
* drm/sched: Fix fence reference count leak (git-fixes).
* drm/sched: Fix preprocessor guard (git-fixes).
* drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes).
* drm/ssd130x: ensure ssd132x pitch is correct (git-fixes).
* drm/ssd130x: fix ssd132x encoding (git-fixes).
* drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes).
* drm/virtio: New fence for every plane update (stable-fixes).
* drm/vkms: Fix use after free and double free on init error (git-fixes).
* drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes).
* drm: xlnx: zynqmp: Fix max dma segment size (git-fixes).
* dummycon: fix default rows/cols (git-fixes).
* eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes).
* efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349).
* efi: Avoid cold plugged memory for placing the kernel (stable-fixes).
* efi: libstub: Use '-std=gnu11' to fix build with GCC 15
(stable-fixes).
* eth: gve: use appropriate helper to set xdp_features (git-fixes).
* exfat: convert to ctime accessor functions (git-fixes).
* exfat: do not zero the extended part (bsc#1237356).
* exfat: fix appending discontinuous clusters to empty file (bsc#1237356).
* exfat: fix file being changed by unaligned direct write (git-fixes).
* exfat: fix timing of synchronizing bitmap and inode (bsc#1237356).
* exfat: fix zero the unwritten part for dio read (git-fixes).
* fbdev: au1100fb: Move a variable assignment behind a null pointer check
(git-fixes).
* fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes).
* fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
* fbdev: sm501fb: Add some geometry checks (git-fixes).
* firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before
comparison (git-fixes).
* firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes).
* firmware: cs_dsp: Remove async regmap writes (git-fixes).
* firmware: imx-scu: fix OF node leak in .probe() (git-fixes).
* firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry (git-fixes).
* flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994).
* futex: Do not include process MM in futex key on no-MMU (git-fixes).
* gpio: aggregator: protect driver attr handlers against module unload (git-
fixes).
* gpio: bcm-kona: Add missing newline to dev_err format string (git-fixes).
* gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0 (git-fixes).
* gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ (git-
fixes).
* gpio: pca953x: Improve interrupt support (git-fixes).
* gpio: rcar: Fix missing of_node_put() call (git-fixes).
* gpio: rcar: Use raw_spinlock to protect register access (stable-fixes).
* gpio: stmpe: Check return value of stmpe_reg_read in
stmpe_gpio_irq_sync_unlock (git-fixes).
* gpiolib: acpi: Add a quirk for Acer Nitro ANV14 (stable-fixes).
* gpu: drm_dp_cec: fix broken CEC adapter properties check (git-fixes).
* gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git-
fixes).
* gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp() (git-fixes).
* gup: make the stack expansion warning a bit more targeted (bsc#1238214).
* hfs: Sanity check the root record (git-fixes).
* hwmon: (ad7314) Validate leading zero bits and return error (git-fixes).
* hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes).
* hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes).
* hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git-
fixes).
* i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz (stable-fixes).
* i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes).
* i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes).
* i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git-
fixes).
* i2c: ls2x: Fix frequency division register access (git-fixes).
* i2c: npcm: disable interrupt enable bit before devm_request_irq
(git-fixes).
* i2c: omap: fix IRQ storms (git-fixes).
* i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes).
* i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes).
* i3c: master: svc: Fix missing the IBI rules (git-fixes).
* i3c: master: svc: Use readsb helper for reading MDB (git-fixes).
* iavf: allow changing VLAN state without calling PF (git-fixes).
* ice: Remove and readd netdev during devlink reload (bsc#1230497
bsc#1239518).
* ice: Skip PTP HW writes during PTP reset procedure (git-fixes).
* ice: add ice_adapter for shared data across PFs on the same NIC
(bsc#1237415).
* ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1237415).
* ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset (git-
fixes).
* ice: fix incorrect PHY settings for 100 GB/s (git-fixes).
* ice: fix max values for dpll pin phase adjust (git-fixes).
* ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1237415).
* ice: gather page_count()'s of each frag right before XDP prog call
(git-
fixes).
* ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848 bsc#1230497).
* ice: put Rx buffers after being done with current frame (git-fixes).
* ice: stop storing XDP verdict within ice_rx_buf (git-fixes).
* ice: use internal pf id instead of function number (git-fixes).
* idpf: add read memory barrier when checking descriptor done bit
(git-fixes).
* idpf: call set_real_num_queues in idpf_open (bsc#1236661).
* idpf: convert workqueues to unbound (git-fixes).
* idpf: fix VF dynamic interrupt ctl register initialization (git-fixes).
* idpf: fix handling rsc packet with a single segment (git-fixes).
* igc: Fix HW RX timestamp when passed by ZC XDP (git-fixes).
* igc: Set buffer type for empty frames in igc_init_empty_frame (git-fixes).
* igc: return early when failing to read EECD register (git-fixes).
* iio: accel: mma8452: Ensure error return on failure to matching
oversampling
ratio (git-fixes).
* iio: accel: msa311: Fix failure to release runtime pm if direct mode claim
fails (git-fixes).
* iio: adc: ad4130: Fix comparison of channel setups (git-fixes).
* iio: adc: ad7124: Fix comparison of channel configs (git-fixes).
* iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes).
* iio: dac: ad3552r: clear reset status flag (git-fixes).
* iio: filter: admv8818: Force initialization of SDO (git-fixes).
* include/linux/mmzone.h: clean up watermark accessors (bsc#1239600).
* include: net: add static inline dst_dev_overhead() to dst.h (git-fixes).
* init: add initramfs_internal.h (bsc#1232848).
* initcall_blacklist: Does not allow kernel_lockdown be blacklisted
(bsc#1237521).
* initramfs: allocate heap buffers together (bsc#1232848).
* initramfs: fix hardlink hash leak without TRAILER (bsc#1232848).
* intel_idle: Add ibrs_off module parameter to force-disable IBRS
(git-fixes).
* intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes).
* intel_th: pci: Add Arrow Lake support (stable-fixes).
* intel_th: pci: Add Panther Lake-H support (stable-fixes).
* intel_th: pci: Add Panther Lake-P/U support (stable-fixes).
* ioam6: improve checks on user data (git-fixes).
* iommu/arm-smmu-v3: Clean up more on probe failure (stable-fixes).
* iommu/vt-d: Fix suspicious RCU usage (git-fixes).
* ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994).
* ipv4: use RCU protection in inet_select_addr() (bsc#1239994).
* ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994).
* ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994).
* ipv4: use RCU protection in rt_is_expired() (bsc#1239994).
* ipv6: Ensure natural alignment of const ipv6 loopback and router addresses
(git-fixes).
* ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git-
fixes).
* ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create()
(git-
fixes).
* ipv6: Use RCU in ip6_input() (bsc#1239994).
* ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes).
* ipv6: avoid atomic fragment on GSO packets (git-fixes).
* ipv6: fib6_rules: flush route cache when rule is changed (git-fixes).
* ipv6: fib: hide unused 'pn' variable (git-fixes).
* ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes).
* ipv6: fix potential NULL deref in fib6_add() (git-fixes).
* ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).
* ipv6: introduce dst_rt6_info() helper (git-fixes).
* ipv6: ioam: block BH from ioam6_output() (git-fixes).
* ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes).
* ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
* ipv6: sr: add missing seg6_local_exit (git-fixes).
* ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes).
* ipv6: take care of scope when choosing the src addr (git-fixes).
* jfs: add check read-only before truncation in jfs_truncate_nolock() (git-
fixes).
* jfs: add check read-only before txBeginAnon() call (git-fixes).
* jfs: add index corruption check to DT_GETPAGE() (git-fixes).
* jfs: fix slab-out-of-bounds read in ea_get() (git-fixes).
* jfs: reject on-disk inodes of an unsupported type (git-fixes).
* kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes)
* kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
* kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in
RTM_NEWPREFIX (git-fixes).
* kABI fix for netlink: terminate outstanding dump on socket close (git-
fixes).
* kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes).
* kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes).
* kABI workaround for intel-ish-hid (git-fixes).
* kABI workaround for soc_mixer_control changes (git-fixes).
* kabi: fix bus type (bsc#1236896).
* kabi: fix group_cpus_evenly (bsc#1236897).
* kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749).
* kasan: do not call find_vm_area() in a PREEMPT_RT kernel (git-fixes).
* kbuild: hdrcheck: fix cross build with clang (git-fixes).
* kbuild: userprogs: fix bitsize and target detection on clang (git-fixes).
* kernel-source: Also replace bin/env
* kunit: qemu_configs: sparc: use Zilog console (git-fixes).
* l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes).
* l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt()
function (git-fixes).
* l2tp: fix lockdep splat (git-fixes).
* leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git-
fixes).
* leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git-
fixes).
* lib/group_cpus: honor housekeeping config when grouping CPUs (bsc#1236897).
* lib/group_cpus: let group_cpu_evenly return number initialized masks
(bsc#1236897).
* lib/iov_iter: fix import_iovec_ubuf iovec management (git-fixes).
* lib: 842: Improve error handling in sw842_compress() (git-fixes).
* lib: stackinit: hide never-taken branch from compiler (stable-fixes).
* lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*()
(git-fixes).
* lockdep: Fix upper limit for LOCKDEP_*_BITS configs (stable-fixes).
* lockdep: fix deadlock issue between lockdep and rcu (git-fixes).
* locking/lockdep: Avoid creating new name string literals in
lockdep_set_subclass() (git-fixes).
* locking/rwsem: Add __always_inline annotation to __down_write_common() and
inlined callers (git-fixes).
* loop: do not set QUEUE_FLAG_NOMERGES (git-fixes).
* md/md-bitmap: Add missing destroy_work_on_stack() (git-fixes).
* md/md-bitmap: add 'sync_size' into struct md_bitmap_stats
(git-fixes).
* md/md-bitmap: replace md_bitmap_status() with a new helper
md_bitmap_get_stats() (git-fixes).
* md/md-cluster: fix spares warnings for __le64 (git-fixes).
* md/raid0: do not free conf on raid0_run failure (git-fixes).
* md/raid1: do not free conf on raid0_run failure (git-fixes).
* md/raid5: Wait sync io to finish before changing group cnt (git-fixes).
* md: Do not flush sync_work in md_write_start() (git-fixes).
* md: convert comma to semicolon (git-fixes).
* mdacon: rework dependency list (git-fixes).
* media: cxd2841er: fix 64-bit division on gcc-9 (stable-fixes).
* media: dvb: mb86a16: check the return value of mb86a16_read() (git-fixes).
* media: firewire: firedtv-avc.c: replace BUG with proper, error return (git-
fixes).
* media: i2c: adv748x: Fix test pattern selection mask (git-fixes).
* media: i2c: ccs: Set the device's runtime PM status correctly in remove
(git-fixes).
* media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO
(git-fixes).
* media: i2c: ov7251: Set enable GPIO low in probe (git-fixes).
* media: ov08x40: Fix hblank out of range issue (git-fixes).
* media: platform: allgro-dvt: unregister v4l2_device on the error path (git-
fixes).
* media: platform: stm32: Add check for clk_enable() (git-fixes).
* media: siano: Fix error handling in smsdvb_module_init() (git-fixes).
* media: streamzap: fix race between device disconnection and urb callback
(git-fixes).
* media: streamzap: prevent processing IR data on URB failure (git-fixes).
* media: uvcvideo: Add Kurokesu C1 PRO camera (stable-fixes).
* media: uvcvideo: Add new quirk definition for the Sonix Technology Co. 292a
camera (stable-fixes).
* media: uvcvideo: Implement dual stream quirk to fix loss of usb packets
(stable-fixes).
* media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf()
(git-
fixes).
* media: venus: hfi: add a check to handle OOB in sfr region (git-fixes).
* media: venus: hfi: add check to handle incorrect queue size (git-fixes).
* media: venus: hfi_parser: add check to avoid out of bound access (git-
fixes).
* media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes).
* media: verisilicon: HEVC: Initialize start_bit field (git-fixes).
* media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread (stable-fixes).
* media: vim2m: print device name after registering device (git-fixes).
* media: visl: Fix ERANGE error when setting enum controls (git-fixes).
* mei: me: add panther lake P DID (stable-fixes).
* memblock tests: fix warning: "__ALIGN_KERNEL" redefined
(git-fixes).
* memory: mtk-smi: Add ostd setting for mt8192 (git-fixes).
* memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
(git-fixes).
* mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes).
* mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id (stable-
fixes).
* mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes).
* mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes).
* mfd: syscon: Fix race in device_node_get_regmap() (git-fixes).
* mfd: syscon: Remove extern from function prototypes (stable-fixes).
* mfd: syscon: Use scoped variables with memory allocators to simplify error
paths (stable-fixes).
* mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes
(mm/compaction)).
* mm/page_alloc: fix memory accept before watermarks gets initialized
(bsc#1239600).
* mm: accept to promo watermark (bsc#1239600).
* mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600).
* mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600).
* mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear() (git-
fixes)
* mm: zswap: move allocations during CPU init outside the lock (git-fixes).
* mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes).
* mmc: core: Respect quirk_max_rate for non-UHS SDIO card (stable-fixes).
* mmc: mtk-sd: Fix register settings for hs400(es) mode (git-fixes).
* mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes).
* mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes).
* mmc: sdhci-msm: Correctly set the load for the regulator (stable-fixes).
* mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes).
* mptcp: export local_address (git-fixes)
* mptcp: fix NL PM announced address accounting (git-fixes)
* mptcp: fix data races on local_id (git-fixes)
* mptcp: fix inconsistent state on fastopen race (bsc#1222672).
* mptcp: fix recvbuffer adjust on sleeping rcvmsg (git-fixes)
* mptcp: fully established after ADD_ADDR echo on MPJ (git-fixes)
* mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes)
* mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR (git-
fixes)
* mptcp: pm: deny endp with signal + subflow + port (git-fixes)
* mptcp: pm: do not ignore 'subflow' if 'signal' flag is also
set (git-fixes)
* mptcp: pm: do not try to create sf if alloc failed (git-fixes)
* mptcp: pm: fullmesh: select the right ID later (git-fixes)
* mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID (git-fixes)
* mptcp: pm: only in-kernel cannot have entries with ID 0 (git-fixes)
* mptcp: pm: re-using ID of unused flushed subflows (git-fixes)
* mptcp: pm: re-using ID of unused removed ADD_ADDR (git-fixes)
* mptcp: pm: re-using ID of unused removed subflows (git-fixes)
* mptcp: pm: reduce indentation blocks (git-fixes)
* mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes)
* mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes)
* mptcp: unify pm get_local_id interfaces (git-fixes)
* mptcp: unify pm set_flags interfaces (git-fixes)
* mtd: Add check for devm_kcalloc() (git-fixes).
* mtd: Replace kcalloc() with devm_kcalloc() (git-fixes).
* mtd: nand: Fix a kdoc comment (git-fixes).
* mtd: rawnand: brcmnand: fix PM resume warning (git-fixes).
* mtd: rawnand: cadence: fix error code in cadence_nand_init() (git-fixes).
* mtd: rawnand: cadence: fix incorrect device in dma_unmap_single
(git-fixes).
* mtd: rawnand: cadence: fix unchecked dereference (git-fixes).
* mtd: rawnand: cadence: use dma_map_resource for sdma address (git-fixes).
* nbd: Fix signal handling (git-fixes).
* nbd: Improve the documentation of the locking assumptions (git-fixes).
* nbd: do not allow reconnect after disconnect (git-fixes).
* ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994).
* ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994).
* net l2tp: drop flow hash on forward (git-fixes).
* net/mlx5: Correct TASR typo into TSAR (git-fixes).
* net/mlx5: Fix RDMA TX steering prio (git-fixes).
* net/mlx5: Fix msix vectors to respect platform limit (bsc#1225981).
* net/mlx5: SF, Fix add port error handling (git-fixes).
* net/mlx5: Verify support for scheduling element and TSAR type (git-fixes).
* net/mlx5e: Always start IPsec sequence number from 1 (git-fixes).
* net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes).
* net/mlx5e: macsec: Maintain TX SA from encoding_sa (git-fixes).
* net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions
created by classifiers (git-fixes).
* net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes).
* net/sched: adjust device watchdog timer to detect stopped queue at right
time (git-fixes).
* net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes).
* net/sched: cls_u32: replace int refcounts with proper refcounts
(git-fixes).
* net/sched: flower: Add lock protection when remove filter handle (git-
fixes).
* net/sched: taprio: make q->picos_per_byte available to
fill_sched_entry()
(git-fixes).
* net/sched: tbf: correct backlog statistic for GSO packets (git-fixes).
* net/smc: support ipv4 mapped ipv6 addr client for smc-r v2 (bsc#1236994).
* net: Fix undefined behavior in netdev name allocation (bsc#1233749).
* net: add dev_net_rcu() helper (bsc#1239994).
* net: avoid UAF on deleted altname (bsc#1233749).
* net: check for altname conflicts when changing netdev's netns
(bsc#1233749).
* net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes).
* net: core: Use the bitmap API to allocate bitmaps (bsc#1233749).
* net: do not send a MOVE event when netdev changes netns (bsc#1233749).
* net: do not use input buffer of __dev_alloc_name() as a scratch space
(bsc#1233749).
* net: fix ifname in netlink ntf during netns move (bsc#1233749).
* net: fix removing a namespace with conflicting altnames (bsc#1233749).
* net: free altname using an RCU callback (bsc#1233749).
* net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes).
* net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes).
* net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes).
* net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes).
* net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes).
* net: ipv6: fix wrong start position when receive hop-by-hop fragment (git-
fixes).
* net: ipv6: ioam6: code alignment (git-fixes).
* net: ipv6: ioam6: new feature tunsrc (git-fixes).
* net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes).
* net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git-
fixes).
* net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes).
* net: ipv6: support reporting otherwise unknown prefix flags in
RTM_NEWPREFIX
(git-fixes).
* net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749).
* net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
* net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
* net: mana: Allow variable size indirection table (bsc#1239016).
* net: mana: Assigning IRQ affinity on HT cores (bsc#1239015).
* net: mana: Avoid open coded arithmetic (bsc#1239016).
* net: mana: Cleanup "mana" debugfs dir after cleanup of all children
(bsc#1236760).
* net: mana: Enable debugfs files for MANA device (bsc#1236758).
* net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs
(bsc#1239015).
* net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015).
* net: mana: Support holes in device list reply msg (git-fixes).
* net: mana: add a function to spread IRQs per CPUs (bsc#1239015).
* net: mana: cleanup mana struct after debugfs_remove() (git-fixes).
* net: move altnames together with the netdevice (bsc#1233749).
* net: netvsc: Update default VMBus channels (bsc#1236757).
* net: reduce indentation of __dev_alloc_name() (bsc#1233749).
* net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749).
* net: remove else after return in dev_prep_valid_name() (bsc#1233749).
* net: rose: lock the socket in rose_bind() (git-fixes).
* net: sfc: Correct key_len for efx_tc_ct_zone_ht_params (git-fixes).
* net: smc: fix spurious error message from __sock_release() (bsc#1237126).
* net: trust the bitmap in __dev_alloc_name() (bsc#1233749).
* net: usb: usbnet: restore usb%d name exception for local mac addresses
(bsc#1234480).
* net: use unrcu_pointer() helper (git-fixes).
* net: wwan: iosm: Fix hibernation by re-binding the driver around it
(stable-
fixes).
* net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable-
fixes).
* net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes).
* net_sched: sch_sfq: annotate data-races around q->perturb_period (git-
fixes).
* net_sched: sch_sfq: handle bigger packets (git-fixes).
* nfsd: clear acl_access/acl_default after releasing them (git-fixes).
* nouveau/svm: fix missing folio unlock + put after
make_device_exclusive_range() (git-fixes).
* null_blk: Do not allow runt zone with zone capacity smaller then zone size
(git-fixes).
* null_blk: Fix missing mutex_destroy() at module removal (git-fixes).
* null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION() (git-
fixes).
* null_blk: Print correct max open zones limit in null_init_zoned_dev() (git-
fixes).
* null_blk: Remove usage of the deprecated ida_simple_xx() API (git-fixes).
* null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS (git-fixes).
* null_blk: fix validation of block size (git-fixes).
* nvme-fc: do not ignore connectivity loss during connecting (git-fixes
bsc#1222649).
* nvme-fc: go straight to connecting state when initializing (git-fixes
bsc#1222649).
* nvme-fc: rely on state transitions to handle connectivity loss (git-fixes
bsc#1222649).
* nvme-fc: use ctrl state getter (git-fixes).
* nvme-ioctl: fix leaked requests on mapping error (git-fixes).
* nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk (git-fixes).
* nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk (git-fixes).
* nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes).
* nvme-pci: remove stale comment (git-fixes).
* nvme-pci: use block layer helpers to calculate num of queues (bsc#1236897).
* nvme-tcp: Fix a C2HTermReq error message (git-fixes).
* nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes).
* nvme-tcp: fix connect failure on receiving partial ICResp PDU (git-fixes).
* nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git-
fixes).
* nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes).
* nvme/ioctl: add missing space in err message (git-fixes).
* nvme: handle connectivity loss in nvme_set_queue_count (git-fixes).
* nvme: introduce nvme_disk_is_ns_head helper (git-fixes).
* nvme: make nvme_tls_attrs_group static (git-fixes).
* nvme: move error logging from nvme_end_req() to __nvme_end_req() (git-
fixes).
* nvme: move passthrough logging attribute to head (git-fixes).
* nvme: only allow entering LIVE from CONNECTING state (git-fixes
bsc#1222649).
* nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues
(bsc#1236896).
* nvme: tcp: Fix compilation warning with W=1 (git-fixes).
* nvmet-fc: Remove unused functions (git-fixes).
* nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git-
fixes).
* nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch
(git-fixes).
* nvmet: Fix crash when a namespace is disabled (git-fixes).
* nvmet: remove old function prototype (git-fixes).
* ocfs2: check dir i_size in ocfs2_find_entry (git-fixes).
* ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes).
* ocfs2: fix incorrect CPU endianness conversion causing mount failure
(bsc#1236138).
* ocfs2: handle a symlink read error correctly (git-fixes).
* ocfs2: mark dquot as inactive if failed to start trans while releasing
dquot
(git-fixes).
* ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes).
* orangefs: fix a oob in orangefs_debug_write (git-fixes).
* padata: Clean up in padata_do_multithreaded() (bsc#1237563).
* padata: Honor the caller's alignment in case of chunk_size 0
(bsc#1237563).
* padata: fix sysfs store callback check (git-fixes).
* partitions: ldm: remove the initial kernel-doc notation (git-fixes).
* partitions: mac: fix handling of bogus partition table (git-fixes).
* phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in refclk
(git-fixes).
* phy: rockchip: naneng-combphy: compatible reset with old DT (git-fixes).
* phy: tegra: xusb: reset VBUS & ID OVERRIDE (git-fixes).
* pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes).
* pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware (git-fixes).
* pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm()
(git-fixes).
* pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git-
fixes).
* pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes).
* pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes).
* pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes).
* platform/x86/intel-uncore-freq: Ignore minor version change (bsc#1237452).
* platform/x86/intel-uncore-freq: Increase minor number support
(bsc#1237452).
* platform/x86/intel/tpmi: Add defines to get version information
(bsc#1237452).
* platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable-
fixes).
* platform/x86: ISST: Ignore minor version change (bsc#1237452).
* platform/x86: acer-wmi: Ignore AC events (stable-fixes).
* platform/x86: dell-ddv: Fix temperature calculation (git-fixes).
* platform/x86: int3472: Check for adev == NULL (stable-fixes).
* platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable-
fixes).
* platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e
(stable-fixes).
* platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable-
fixes).
* pnfs/flexfiles: retry getting layout segment for reads (git-fixes).
* power: supply: da9150-fg: fix potential overflow (git-fixes).
* power: supply: max77693: Fix wrong conversion of charge input threshold
value (git-fixes).
* powerpc/64s/mm: Move __real_pte stubs into hash-4k.h (bsc#1215199).
* powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static inline
(bsc#1215199).
* powerpc/code-patching: Disable KASAN report during patching via temporary
mm
(bsc#1215199).
* powerpc/code-patching: Fix KASAN hit by not flagging text patching area as
VM_ALLOC (bsc#1215199).
* powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573).
* powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS
block (bsc#1239573).
* powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid mode
(ltc#210895 bsc#1235933 ltc#210896 bsc#1235932).
* powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory
(bsc#1239167 ltc#211055).
* powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API (bsc#1236967
ltc#210988).
* powerpc: Stop using no_llseek (bsc#1239573).
* printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX
(bsc#1237950).
* r8169: enable SG/TSO on selected chip versions per default (bsc#1235874).
* rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes).
* rapidio: fix an API misues when rio_add_net() fails (git-fixes).
* rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings
(git-fixes).
* rbd: do not assume rbd_is_lock_owner() for exclusive mappings (git-fixes).
* rbd: do not move requests to the running list on errors (git-fixes).
* rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait (git-fixes).
* regmap-irq: Add missing kfree() (git-fixes).
* regulator: check that dummy regulator has been probed before using it
(stable-fixes).
* regulator: core: Fix deadlock in create_regulator() (git-fixes).
* regulator: dummy: force synchronous probing (git-fixes).
* rndis_host: Flag RNDIS modems as WWAN devices (git-fixes).
* rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
* rpm/release-projects: Update the ALP projects again (bsc#1231293).
* rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
* s390/cio: rename bitmap_size() -> idset_bitmap_size() (git-fixes
bsc#1236205).
* s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes bsc#1237158).
* s390/iucv: fix receive buffer virtual vs physical address confusion (git-
fixes bsc#1236200).
* s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes bsc#1236752).
* s390/pci: Fix handling of isolated VFs (git-fixes bsc#1238368).
* s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails
(bsc#1236752).
* s390/pci: Ignore RID for isolated VFs (bsc#1236752).
* s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn() (git-
fixes bsc#1238368).
* s390/pci: Sort PCI functions prior to creating virtual busses
(bsc#1236752).
* s390/pci: Use topology ID for multi-function devices (bsc#1236752).
* s390/smp,mcck: fix early IPI handling (git-fixes bsc#1236199).
* s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes
bsc#1239594).
* s390/topology: Improve topology detection (bsc#1236591).
* s390/traps: Fix test_monitor_call() inline assembly (git-fixes
bsc#1239595).
* s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops (git-fixes
bsc#1236203).
* sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
* scripts/gdb: fix aarch64 userspace detection in get_current_task (stable-
fixes).
* scsi: core: Clear driver private data when retrying request (git-fixes).
* scsi: core: Do not retry I/Os during depopulation (git-fixes).
* scsi: core: Handle depopulation and restoration in progress (git-fixes).
* scsi: hisi_sas: Allocate DFX memory during dump trigger (git-fixes).
* scsi: hisi_sas: Directly call register snapshot instead of using workqueue
(git-fixes).
* scsi: hisi_sas: Enable all PHYs that are not disabled by user during
controller reset (git-fixes).
* scsi: hisi_sas: Fix a deadlock issue related to automatic dump (git-fixes).
* scsi: hisi_sas: Remove redundant checks for automatic debugfs dump (git-
fixes).
* scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS request
(git-fixes).
* scsi: lpfc: Copyright updates for 14.4.0.8 patches (bsc#1238347).
* scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when pci_irq_vector()
fails (bsc#1238347).
* scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine
(bsc#1238347).
* scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk
(bsc#1238347).
* scsi: lpfc: Reduce log message generation during ELS ring clean up
(bsc#1238347).
* scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347).
* scsi: megaraid_sas: Fix for a potential deadlock (git-fixes).
* scsi: mpi3mr: Fix possible crash when setting up bsg fails (git-fixes).
* scsi: mpi3mr: Start controller indexing from 0 (git-fixes).
* scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes).
* scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during driver
load
time (jsc#PED-11253).
* scsi: myrb: Remove dead code (git-fixes).
* scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock
(git-fixes).
* scsi: qla1280: Fix hw revision numbering for ISP1020/1040 (git-fixes).
* scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues
(bsc#1236896).
* scsi: scsi_debug: Fix hrtimer support for ndelay (git-fixes).
* scsi: sg: Enable runtime power management (git-fixes).
* scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device reset
(git-
fixes).
* scsi: st: Do not modify unknown block number in MTIOCGET (git-fixes).
* scsi: storvsc: Set correct data length for sending SCSI command without
payload (git-fixes).
* scsi: use block layer helpers to calculate num of queues (bsc#1236897).
* selftest: hugetlb_dio: fix test naming (git-fixes).
* selftest: mm: Test if hugepage does not get leaked during
__bio_release_pages() (git-fixes).
* selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes).
* selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes).
* selftests/bpf: Prevent client connect before server bind in
test_tc_tunnel.sh (git-fixes).
* selftests/bpf: add fp-leaking precise subprog result tests (git-fixes).
* selftests/futex: pass _GNU_SOURCE without a value to the compiler (git-
fixes).
* selftests/mm/cow: fix the incorrect error handling (git-fixes).
* selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack() (stable-
fixes).
* selftests/x86/syscall: Fix coccinelle WARNING recommending the use of
ARRAY_SIZE() (git-fixes).
* selftests: gpio: gpio-sim: Fix missing chip disablements (stable-fixes).
* selftests: hugetlb_dio: check for initial conditions to skip in the start
(git-fixes).
* selftests: hugetlb_dio: fixup check for initial conditions to skip in the
start (git-fixes).
* selftests: mptcp: close fd_in before returning in main_loop (git-fixes).
* selftests: mptcp: connect: -f: no reconnect (git-fixes).
* selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes).
* selftests: rtnetlink: update netdevsim ipsec output format (stable-fixes).
* seq_file: add helper macro to define attribute for rw file (jsc#PED-12416).
* serial: 8250: Fix fifo underflow on flush (git-fixes).
* serial: sc16is7xx: use device_property APIs when configuring irda mode
(stable-fixes).
* slimbus: messaging: Free transaction ID in delayed interrupt scenario (git-
fixes).
* smb3: fix creating FIFOs when mounting with "sfu" mount option
(git-fixes).
* smb3: request handle caching when caching directories (bsc#1231432).
* smb3: retrying on failed server close (bsc#1231432).
* smb: cached directories can be more than root file handle (bsc#1231432).
* smb: cilent: set reparse mount points as automounts (git-fixes).
* smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs() (git-fixes).
* smb: client: Fix minor whitespace errors and warnings (git-fixes).
* smb: client: Fix netns refcount imbalance causing leaks and use-after-free
(git-fixes).
* smb: client: add support for WSL reparse points (git-fixes).
* smb: client: allow creating special files via reparse points (git-fixes).
* smb: client: allow creating symlinks via reparse points (git-fixes).
* smb: client: cleanup smb2_query_reparse_point() (git-fixes).
* smb: client: destroy cfid_put_wq on module exit (git-fixes).
* smb: client: do not query reparse points twice on symlinks (git-fixes).
* smb: client: extend smb2_compound_op() to accept more commands
(bsc#1231432).
* smb: client: fix OOB in SMB2_query_info_init() (bsc#1231432).
* smb: client: fix OOB in smb2_query_reparse_point() (git-fixes).
* smb: client: fix corruption in cifs_extend_writeback (bsc#1235609).
* smb: client: fix double put of @cfile in smb2_rename_path() (git-fixes).
* smb: client: fix double put of @cfile in smb2_set_path_size() (git-fixes).
* smb: client: fix hardlinking of reparse points (git-fixes).
* smb: client: fix missing mode bits for SMB symlinks (git-fixes).
* smb: client: fix possible double free in smb2_set_ea() (git-fixes).
* smb: client: fix potential broken compound request (git-fixes).
* smb: client: fix renaming of reparse points (git-fixes).
* smb: client: get rid of smb311_posix_query_path_info() (git-fixes).
* smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED (git-fixes).
* smb: client: handle lack of FSCTL_GET_REPARSE_POINT support (git-fixes).
* smb: client: handle path separator of created SMB symlinks (git-fixes).
* smb: client: handle special files and symlinks in SMB3 POSIX (git-fixes).
* smb: client: ignore unhandled reparse tags (git-fixes).
* smb: client: implement ->query_reparse_point() for SMB1 (git-fixes).
* smb: client: instantiate when creating SFU files (git-fixes).
* smb: client: introduce ->parse_reparse_point() (git-fixes).
* smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes).
* smb: client: introduce cifs_sfu_make_node() (git-fixes).
* smb: client: introduce reparse mount option (git-fixes).
* smb: client: make smb2_compound_op() return resp buffer on success
(bsc#1231432).
* smb: client: move most of reparse point handling code to common file (git-
fixes).
* smb: client: move some params to cifs_open_info_data (bsc#1231432).
* smb: client: optimise reparse point querying (git-fixes).
* smb: client: parse owner/group when creating reparse points (git-fixes).
* smb: client: parse reparse point flag in create response (bsc#1231432).
* smb: client: parse uid, gid, mode and dev from WSL reparse points (git-
fixes).
* smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299,
bsc#1235599, bsc#1234896).
* smb: client: reduce number of parameters in smb2_compound_op() (git-fixes).
* smb: client: reduce stack usage in smb2_query_info_compound()
(bsc#1231432).
* smb: client: reduce stack usage in smb2_query_reparse_point() (git-fixes).
* smb: client: reduce stack usage in smb2_set_ea() (bsc#1231432).
* smb: client: retry compound request without reusing lease (git-fixes).
* smb: client: return reparse type in /proc/mounts (git-fixes).
* smb: client: reuse file lease key in compound operations (git-fixes).
* smb: client: set correct d_type for reparse DFS/DFSR and mount point (git-
fixes).
* smb: client: set correct file type from NFS reparse points (git-fixes).
* smb: client: stop revalidating reparse points unnecessarily (git-fixes).
* smb: use kernel_connect() and kernel_bind() (git-fixes).
* soc/mediatek: mtk-devapc: Convert to platform remove callback returning
void
(stable-fixes).
* soc/tegra: fuse: Update Tegra234 nvmem keepout list (stable-fixes).
* soc: imx8m: Remove global soc_uid (stable-fixes).
* soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes).
* soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes).
* soc: loongson: loongson2_guts: Add check for devm_kstrdup() (git-fixes).
* soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes).
* soc: mediatek: mt8365-mmsys: Fix routing table masks and values
(git-fixes).
* soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove (git-fixes).
* soc: qcom: pdr: Fix the potential deadlock (git-fixes).
* soc: qcom: smem: introduce qcom_smem_get_soc_id() (git-fixes).
* soc: qcom: socinfo: move SMEM item struct and defines to a header (git-
fixes).
* soc: samsung: exynos-chipid: Add NULL pointer check in
exynos_chipid_probe()
(git-fixes).
* soundwire: slave: fix an OF node reference leak in soundwire slave device
(git-fixes).
* spi: atmel-qspi: Memory barriers after memory-mapped I/O (git-fixes).
* spi: atmel-quadspi: Create `atmel_qspi_ops` to support newer SoC families
(stable-fixes).
* spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes).
* spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes).
* spi: microchip-core: Use helper function devm_clk_get_enabled()
(git-fixes).
* spi: sn-f-ospi: Fix division by zero (git-fixes).
* splice: do not checksum AF_UNIX sockets (bsc#1240333).
* sunrpc: suppress warnings for unused procfs functions (git-fixes).
* supported.conf: add now-included qat_420xx (external, intel)
* tcp: Add memory barrier to tcp_push() (git-fixes).
* tcp: Adjust clamping window for applications specifying SO_RCVBUF (git-
fixes).
* tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset
(git-fixes).
* tcp: Defer ts_recent changes until req is owned (git-fixes).
* tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes).
* tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes).
* tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non-
wildcard addresses (git-fixes).
* tcp: Update window clamping condition (git-fixes).
* tcp: add tcp_done_with_error() helper (git-fixes).
* tcp: adjust rcvq_space after updating scaling ratio (git-fixes).
* tcp: annotate data-races around tp->window_clamp (git-fixes).
* tcp: avoid premature drops in tcp_add_backlog() (git-fixes).
* tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process
(git-fixes).
* tcp: check mptcp-level constraints for backlog coalescing (git-fixes).
* tcp: check space before adding MPTCP SYN options (git-fixes).
* tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes).
* tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes).
* tcp: define initial scaling factor value as a macro (git-fixes).
* tcp: derive delack_max from rto_min (git-fixes).
* tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git-
fixes).
* tcp: fix cookie_init_timestamp() overflows (git-fixes).
* tcp: fix forever orphan socket caused by tcp_abort (git-fixes).
* tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function
(git-fixes).
* tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes).
* tcp: fix mid stream window clamp (git-fixes).
* tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes).
* tcp: fix race in tcp_write_err() (git-fixes).
* tcp: fix races in tcp_abort() (git-fixes).
* tcp: fix races in tcp_v_err() (git-fixes).
* tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe
(git-
fixes).
* tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO
(git-
fixes).
* tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes).
* tcp: increase the default TCP scaling ratio (git-fixes).
* tcp: introduce tcp_clock_ms() (git-fixes).
* tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes).
* tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes).
* tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes).
* tcp: replace tcp_time_stamp_raw() (git-fixes).
* tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367).
* thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes).
* thermal: int340x: Add NULL check for adev (git-fixes).
* tomoyo: do not emit warning in tomoyo_write_control() (stable-fixes).
* tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind
(git-fixes).
* tools: fix annoying "mkdir -p ..." logs when building tools in
parallel
(git-fixes).
* tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes).
* tpm: do not start chip while suspended (git-fixes).
* tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).
* tty: xilinx_uartps: split sysrq handling (git-fixes).
* ubi: Add a check for ubi_num (git-fixes).
* ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes).
* ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes).
* ubi: correct the calculation of fastmap size (stable-fixes).
* ubi: eba: properly rollback inside self_check_eba (git-fixes).
* ubi: fastmap: Fix missed ec updating after erasing old fastmap data block
(git-fixes).
* ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists
(git-fixes).
* ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git-
fixes).
* ubi: wl: Put source PEB into correct list if trying locking LEB failed
(git-
fixes).
* ublk: fix error code for unsupported command (git-fixes).
* ublk: fix ublk_ch_mmap() for 64K page size (git-fixes).
* ublk: move ublk_cancel_dev() out of ub->mutex (git-fixes).
* ublk: move zone report data out of request pdu (git-fixes).
* usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes).
* usb: cdc-acm: Check control transfer buffer size before access (git-fixes).
* usb: cdc-acm: Fix handling of oversized fragments (git-fixes).
* usb: chipidea: ci_hdrc_imx: decrement device's refcount in .remove()
and in
the error path of .probe() (git-fixes).
* usb: core: fix pipe creation for get_bMaxPacketSize0 (git-fixes).
* usb: dwc2: gadget: remove of_node reference upon udc_stop (git-fixes).
* usb: dwc3: Fix timeout issue during controller enter/exit from halt state
(git-fixes).
* usb: dwc3: core: Defer the probe until USB power supply ready (git-fixes).
* usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes).
* usb: gadget: Check bmAttributes only if configuration is valid (git-fixes).
* usb: gadget: Fix setting self-powered state on suspend (git-fixes).
* usb: gadget: Set self-powered based on MaxPower and bmAttributes (git-
fixes).
* usb: gadget: core: flush gadget workqueue after device removal (git-fixes).
* usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI bind
retries (git-fixes).
* usb: gadget: f_midi: fix MIDI Streaming descriptor lengths (git-fixes).
* usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git-
fixes).
* usb: gadget: udc: renesas_usb3: Fix compiler warning (git-fixes).
* usb: hub: lack of clearing xHC resources (git-fixes).
* usb: phy: generic: Use proper helper for property detection (stable-fixes).
* usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card
Reader
(stable-fixes).
* usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device
(git-fixes).
* usb: renesas_usbhs: Call clk_put() (git-fixes).
* usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes).
* usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes).
* usb: roles: set switch registered flag early on (git-fixes).
* usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality
(git-fixes).
* usb: typec: ucsi: Fix NULL pointer access (git-fixes).
* usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes).
* usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host
(git-fixes).
* usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes).
* usb: xhci: Fix NULL pointer dereference on certain command aborts (git-
fixes).
* usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes).
* usbnet: gl620a: fix endpoint checking in genelink_bind() (git-fixes).
* usbnet: ipheth: document scope of NCM implementation (stable-fixes).
* util_macros.h: fix/rework find_closest() macros (git-fixes).
* vboxsf: fix building with GCC 15 (stable-fixes).
* vfio/pci: Lock external INTx masking ops (bsc#1222803).
* vhost/net: Set num_buffers for virtio 1.0 (git-fixes).
* virtio-mem: check if the config changed before fake offlining memory (git-
fixes).
* virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY (git-
fixes).
* virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub
Block
Mode (SBM) (git-fixes).
* virtio-mem: remove unsafe unplug in Big Block Mode (BBM) (git-fixes).
* virtio: blk/scsi: replace blk_mq_virtio_map_queues with
blk_mq_map_hw_queues
(bsc#1236896).
* virtio: blk/scsi: use block layer helpers to calculate num of queues
(bsc#1236897).
* virtio: hookup irq_get_affinity callback (bsc#1236896).
* virtio_blk: reverse request order in virtio_queue_rqs (git-fixes).
* vsock/virtio: cancel close work in the destructor (git-fixes)
* vsock: Keep the binding until socket destruction (git-fixes)
* vsock: reset socket state when de-assigning the transport (git-fixes)
* wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in
error path (git-fixes).
* wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git-
fixes).
* wifi: ath11k: choose default PM policy for hibernation (bsc#1207948).
* wifi: ath11k: determine PM policy based on machine model (bsc#1207948).
* wifi: ath11k: fix RCU stall while reaping monitor destination ring (git-
fixes).
* wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git-
fixes).
* wifi: ath11k: introduce ath11k_core_continue_suspend_resume()
(bsc#1207948).
* wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948).
* wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948).
* wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in
error path (git-fixes).
* wifi: ath12k: encode max Tx power in scan channel list command (git-fixes).
* wifi: ath12k: fix handling of 6 GHz rules (git-fixes).
* wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes).
* wifi: brcmfmac: Check the return value of of_property_read_string_index()
(stable-fixes).
* wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (stable-
fixes).
* wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
(stable-fixes).
* wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes).
* wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes).
* wifi: cfg80211: regulatory: improve invalid hints checking (git-fixes).
* wifi: iwlwifi: avoid memory leak (stable-fixes).
* wifi: iwlwifi: limit printed string from FW file (git-fixes).
* wifi: iwlwifi: mvm: do not try to talk to a dead firmware (git-fixes).
* wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes).
* wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes).
* wifi: mt76: Add check for devm_kstrdup() (git-fixes).
* wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac (stable-fixes).
* wifi: mt76: mt7915: fix omac index assignment after hardware reset (git-
fixes).
* wifi: mt76: mt7915: fix possible integer overflows in
mt7915_muru_stats_show() (git-fixes).
* wifi: mt76: mt7915: improve hardware restart reliability (stable-fixes).
* wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH (stable-fixes).
* wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes).
* wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes).
* wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes).
* wifi: mwifiex: Fix premature release of RF calibration data (git-fixes).
* wifi: nl80211: reject cooked mode if it is set along with other flags (git-
fixes).
* wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git-
fixes).
* wifi: rtw88: sdio: Fix disconnection after beacon loss (stable-fixes).
* wifi: rtw89: add crystal_cap check to avoid setting as overflow value
(stable-fixes).
* wifi: rtw89: fw: correct debug message format in
rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes).
* wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes).
* x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB (git-fixes).
* x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes).
* x86/asm: Make serialize() always_inline (git-fixes).
* x86/boot/32: De-uglify the 2/3 level paging difference in
mk_early_pgtbl_32() (git-fixes).
* x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32()
(git-fixes).
* x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes).
* x86/boot/32: Temporarily map initrd for microcode loading (git-fixes).
* x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes).
* x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes).
* x86/coco: Replace 'static const cc_mask' with the newly introduced
cc_get_mask() function (git-fixes).
* x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers
(git-fixes).
* x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (git-fixes).
* x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR
implementation
(git-fixes).
* x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git-
fixes).
* x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes).
* x86/fpu: Fix guest FPU state buffer allocation size (git-fixes).
* x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes).
* x86/hyperv: Fix output argument to hypercall that changes page visibility
(git-fixes).
* x86/idle: Disable IBRS when CPU is offline to improve single-threaded
performance (git-fixes).
* x86/microcode/32: Move early loading after paging enable (git-fixes).
* x86/microcode/amd: Cache builtin microcode too (git-fixes).
* x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes).
* x86/microcode/amd: Use cached microcode for AP load (git-fixes).
* x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes).
* x86/microcode/intel: Add a minimum required revision for late loading (git-
fixes).
* x86/microcode/intel: Cleanup code further (git-fixes).
* x86/microcode/intel: Move microcode functions out of cpu/intel.c (git-
fixes).
* x86/microcode/intel: Remove debug code (git-fixes).
* x86/microcode/intel: Remove pointless mutex (git-fixes).
* x86/microcode/intel: Rename get_datasize() since its used externally (git-
fixes).
* x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes).
* x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes).
* x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes).
* x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git-
fixes).
* x86/microcode/intel: Save the microcode only after a successful late-load
(git-fixes).
* x86/microcode/intel: Simplify and rename generic_load_microcode() (git-
fixes).
* x86/microcode/intel: Simplify early loading (git-fixes).
* x86/microcode/intel: Simplify scan_microcode() (git-fixes).
* x86/microcode/intel: Switch to kvmalloc() (git-fixes).
* x86/microcode/intel: Unify microcode apply() functions (git-fixes).
* x86/microcode: Add per CPU control field (git-fixes).
* x86/microcode: Add per CPU result state (git-fixes).
* x86/microcode: Clarify the late load logic (git-fixes).
* x86/microcode: Clean up mc_cpu_down_prep() (git-fixes).
* x86/microcode: Get rid of the schedule work indirection (git-fixes).
* x86/microcode: Handle "nosmt" correctly (git-fixes).
* x86/microcode: Handle "offline" CPUs correctly (git-fixes).
* x86/microcode: Hide the config knob (git-fixes).
* x86/microcode: Include vendor headers into microcode.h (git-fixes).
* x86/microcode: Make reload_early_microcode() static (git-fixes).
* x86/microcode: Mop up early loading leftovers (git-fixes).
* x86/microcode: Move core specific defines to local header (git-fixes).
* x86/microcode: Prepare for minimal revision check (git-fixes).
* x86/microcode: Protect against instrumentation (git-fixes).
* x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes).
* x86/microcode: Provide new control functions (git-fixes).
* x86/microcode: Remove microcode_mutex (git-fixes).
* x86/microcode: Remove pointless apply() invocation (git-fixes).
* x86/microcode: Rendezvous and load in NMI (git-fixes).
* x86/microcode: Replace the all-in-one rendevous handler (git-fixes).
* x86/microcode: Sanitize __wait_for_cpus() (git-fixes).
* x86/mm: Carve out INVLPG inline asm for use by others (git-fixes).
* x86/mm: Remove unused microcode.h include (git-fixes).
* x86/platform/olpc: Remove unused variable 'len' in
olpc_dt_compatible_match() (git-fixes).
* x86/speculation: Add __update_spec_ctrl() helper (git-fixes).
* x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s
description (git-fixes).
* x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).
* x86/xen: allow larger contiguous memory regions in PV guests (git-fixes).
* x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).
* xen/swiotlb: relax alignment requirements (git-fixes).
* xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes).
* xhci: Cleanup Candence controller PCI device and vendor ID usage (git-
fixes).
* xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701).
* xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701).
* xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes).
* xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes).
* xhci: dbc: Convert to use sysfs_streq() (git-fixes).
* xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes).
* xhci: dbc: Fix STALL transfer event handling (git-fixes).
* xhci: dbc: Replace custom return value with proper Linux error code (git-
fixes).
* xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes).
* xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes).
* xhci: dbgtty: remove kfifo_out() wrapper (git-fixes).
* xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes).
* xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes).
* xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes).
* xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes).
* xhci: pci: Use standard pattern for device IDs (git-fixes).
* zram: clear IDLE flag after recompression (git-fixes).
* zram: clear IDLE flag in mark_idle() (git-fixes).
* zram: do not mark idle slots that cannot be idle (git-fixes).
* zram: fix potential UAF of zram table (git-fixes).
* zram: fix uninitialized ZRAM not releasing backing device (git-fixes).
* zram: refuse to use zero sized block device as backing device (git-fixes).
* zram: split memory-tracking and ac-time tracking (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Micro 6.1
zypper in -t patch SUSE-SLE-Micro-6.1-kernel-8=1

## Package List:

* SUSE Linux Micro 6.1 (noarch)
* kernel-devel-rt-6.4.0-28.1
* kernel-source-rt-6.4.0-28.1
* SUSE Linux Micro 6.1 (aarch64 nosrc x86_64)
* kernel-rt-6.4.0-28.1
* SUSE Linux Micro 6.1 (aarch64 x86_64)
* kernel-rt-debugsource-6.4.0-28.1
* kernel-rt-debuginfo-6.4.0-28.1
* kernel-rt-devel-6.4.0-28.1
* SUSE Linux Micro 6.1 (x86_64)
* kernel-livepatch-6_4_0-28-rt-1-3.1
* kernel-rt-devel-debuginfo-6.4.0-28.1
* kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-1-3.1
* kernel-livepatch-6_4_0-28-rt-debuginfo-1-3.1
* kernel-rt-livepatch-6.4.0-28.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52831.html
* https://www.suse.com/security/cve/CVE-2023-52924.html
* https://www.suse.com/security/cve/CVE-2023-52925.html
* https://www.suse.com/security/cve/CVE-2023-52926.html
* https://www.suse.com/security/cve/CVE-2023-52927.html
* https://www.suse.com/security/cve/CVE-2024-26634.html
* https://www.suse.com/security/cve/CVE-2024-26708.html
* https://www.suse.com/security/cve/CVE-2024-26810.html
* https://www.suse.com/security/cve/CVE-2024-26873.html
* https://www.suse.com/security/cve/CVE-2024-35826.html
* https://www.suse.com/security/cve/CVE-2024-35910.html
* https://www.suse.com/security/cve/CVE-2024-38606.html
* https://www.suse.com/security/cve/CVE-2024-40980.html
* https://www.suse.com/security/cve/CVE-2024-41005.html
* https://www.suse.com/security/cve/CVE-2024-41055.html
* https://www.suse.com/security/cve/CVE-2024-41077.html
* https://www.suse.com/security/cve/CVE-2024-41149.html
* https://www.suse.com/security/cve/CVE-2024-42307.html
* https://www.suse.com/security/cve/CVE-2024-43820.html
* https://www.suse.com/security/cve/CVE-2024-44974.html
* https://www.suse.com/security/cve/CVE-2024-45009.html
* https://www.suse.com/security/cve/CVE-2024-45010.html
* https://www.suse.com/security/cve/CVE-2024-46736.html
* https://www.suse.com/security/cve/CVE-2024-46782.html
* https://www.suse.com/security/cve/CVE-2024-46796.html
* https://www.suse.com/security/cve/CVE-2024-46858.html
* https://www.suse.com/security/cve/CVE-2024-47408.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47794.html
* https://www.suse.com/security/cve/CVE-2024-49571.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49940.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49994.html
* https://www.suse.com/security/cve/CVE-2024-50029.html
* https://www.suse.com/security/cve/CVE-2024-50036.html
* https://www.suse.com/security/cve/CVE-2024-50056.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50085.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50126.html
* https://www.suse.com/security/cve/CVE-2024-50140.html
* https://www.suse.com/security/cve/CVE-2024-50142.html
* https://www.suse.com/security/cve/CVE-2024-50152.html
* https://www.suse.com/security/cve/CVE-2024-50185.html
* https://www.suse.com/security/cve/CVE-2024-50251.html
* https://www.suse.com/security/cve/CVE-2024-50258.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50294.html
* https://www.suse.com/security/cve/CVE-2024-50304.html
* https://www.suse.com/security/cve/CVE-2024-52559.html
* https://www.suse.com/security/cve/CVE-2024-53057.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53123.html
* https://www.suse.com/security/cve/CVE-2024-53140.html
* https://www.suse.com/security/cve/CVE-2024-53147.html
* https://www.suse.com/security/cve/CVE-2024-53163.html
* https://www.suse.com/security/cve/CVE-2024-53173.html
* https://www.suse.com/security/cve/CVE-2024-53176.html
* https://www.suse.com/security/cve/CVE-2024-53177.html
* https://www.suse.com/security/cve/CVE-2024-53178.html
* https://www.suse.com/security/cve/CVE-2024-53226.html
* https://www.suse.com/security/cve/CVE-2024-53239.html
* https://www.suse.com/security/cve/CVE-2024-53680.html
* https://www.suse.com/security/cve/CVE-2024-54683.html
* https://www.suse.com/security/cve/CVE-2024-56539.html
* https://www.suse.com/security/cve/CVE-2024-56548.html
* https://www.suse.com/security/cve/CVE-2024-56579.html
* https://www.suse.com/security/cve/CVE-2024-56592.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://www.suse.com/security/cve/CVE-2024-56633.html
* https://www.suse.com/security/cve/CVE-2024-56638.html
* https://www.suse.com/security/cve/CVE-2024-56640.html
* https://www.suse.com/security/cve/CVE-2024-56647.html
* https://www.suse.com/security/cve/CVE-2024-56658.html
* https://www.suse.com/security/cve/CVE-2024-56702.html
* https://www.suse.com/security/cve/CVE-2024-56703.html
* https://www.suse.com/security/cve/CVE-2024-56718.html
* https://www.suse.com/security/cve/CVE-2024-56719.html
* https://www.suse.com/security/cve/CVE-2024-56720.html
* https://www.suse.com/security/cve/CVE-2024-56751.html
* https://www.suse.com/security/cve/CVE-2024-56758.html
* https://www.suse.com/security/cve/CVE-2024-56770.html
* https://www.suse.com/security/cve/CVE-2024-57807.html
* https://www.suse.com/security/cve/CVE-2024-57834.html
* https://www.suse.com/security/cve/CVE-2024-57882.html
* https://www.suse.com/security/cve/CVE-2024-57889.html
* https://www.suse.com/security/cve/CVE-2024-57900.html
* https://www.suse.com/security/cve/CVE-2024-57947.html
* https://www.suse.com/security/cve/CVE-2024-57948.html
* https://www.suse.com/security/cve/CVE-2024-57973.html
* https://www.suse.com/security/cve/CVE-2024-57974.html
* https://www.suse.com/security/cve/CVE-2024-57978.html
* https://www.suse.com/security/cve/CVE-2024-57979.html
* https://www.suse.com/security/cve/CVE-2024-57980.html
* https://www.suse.com/security/cve/CVE-2024-57981.html
* https://www.suse.com/security/cve/CVE-2024-57986.html
* https://www.suse.com/security/cve/CVE-2024-57990.html
* https://www.suse.com/security/cve/CVE-2024-57993.html
* https://www.suse.com/security/cve/CVE-2024-57994.html
* https://www.suse.com/security/cve/CVE-2024-57996.html
* https://www.suse.com/security/cve/CVE-2024-57997.html
* https://www.suse.com/security/cve/CVE-2024-57999.html
* https://www.suse.com/security/cve/CVE-2024-58002.html
* https://www.suse.com/security/cve/CVE-2024-58005.html
* https://www.suse.com/security/cve/CVE-2024-58006.html
* https://www.suse.com/security/cve/CVE-2024-58007.html
* https://www.suse.com/security/cve/CVE-2024-58009.html
* https://www.suse.com/security/cve/CVE-2024-58011.html
* https://www.suse.com/security/cve/CVE-2024-58012.html
* https://www.suse.com/security/cve/CVE-2024-58013.html
* https://www.suse.com/security/cve/CVE-2024-58014.html
* https://www.suse.com/security/cve/CVE-2024-58017.html
* https://www.suse.com/security/cve/CVE-2024-58019.html
* https://www.suse.com/security/cve/CVE-2024-58020.html
* https://www.suse.com/security/cve/CVE-2024-58034.html
* https://www.suse.com/security/cve/CVE-2024-58051.html
* https://www.suse.com/security/cve/CVE-2024-58052.html
* https://www.suse.com/security/cve/CVE-2024-58054.html
* https://www.suse.com/security/cve/CVE-2024-58055.html
* https://www.suse.com/security/cve/CVE-2024-58056.html
* https://www.suse.com/security/cve/CVE-2024-58057.html
* https://www.suse.com/security/cve/CVE-2024-58058.html
* https://www.suse.com/security/cve/CVE-2024-58061.html
* https://www.suse.com/security/cve/CVE-2024-58063.html
* https://www.suse.com/security/cve/CVE-2024-58069.html
* https://www.suse.com/security/cve/CVE-2024-58072.html
* https://www.suse.com/security/cve/CVE-2024-58076.html
* https://www.suse.com/security/cve/CVE-2024-58078.html
* https://www.suse.com/security/cve/CVE-2024-58079.html
* https://www.suse.com/security/cve/CVE-2024-58080.html
* https://www.suse.com/security/cve/CVE-2024-58083.html
* https://www.suse.com/security/cve/CVE-2024-58085.html
* https://www.suse.com/security/cve/CVE-2024-58086.html
* https://www.suse.com/security/cve/CVE-2025-21631.html
* https://www.suse.com/security/cve/CVE-2025-21635.html
* https://www.suse.com/security/cve/CVE-2025-21636.html
* https://www.suse.com/security/cve/CVE-2025-21637.html
* https://www.suse.com/security/cve/CVE-2025-21638.html
* https://www.suse.com/security/cve/CVE-2025-21639.html
* https://www.suse.com/security/cve/CVE-2025-21640.html
* https://www.suse.com/security/cve/CVE-2025-21647.html
* https://www.suse.com/security/cve/CVE-2025-21659.html
* https://www.suse.com/security/cve/CVE-2025-21665.html
* https://www.suse.com/security/cve/CVE-2025-21666.html
* https://www.suse.com/security/cve/CVE-2025-21667.html
* https://www.suse.com/security/cve/CVE-2025-21668.html
* https://www.suse.com/security/cve/CVE-2025-21669.html
* https://www.suse.com/security/cve/CVE-2025-21670.html
* https://www.suse.com/security/cve/CVE-2025-21671.html
* https://www.suse.com/security/cve/CVE-2025-21673.html
* https://www.suse.com/security/cve/CVE-2025-21675.html
* https://www.suse.com/security/cve/CVE-2025-21678.html
* https://www.suse.com/security/cve/CVE-2025-21680.html
* https://www.suse.com/security/cve/CVE-2025-21681.html
* https://www.suse.com/security/cve/CVE-2025-21684.html
* https://www.suse.com/security/cve/CVE-2025-21687.html
* https://www.suse.com/security/cve/CVE-2025-21688.html
* https://www.suse.com/security/cve/CVE-2025-21689.html
* https://www.suse.com/security/cve/CVE-2025-21690.html
* https://www.suse.com/security/cve/CVE-2025-21692.html
* https://www.suse.com/security/cve/CVE-2025-21693.html
* https://www.suse.com/security/cve/CVE-2025-21697.html
* https://www.suse.com/security/cve/CVE-2025-21699.html
* https://www.suse.com/security/cve/CVE-2025-21700.html
* https://www.suse.com/security/cve/CVE-2025-21701.html
* https://www.suse.com/security/cve/CVE-2025-21703.html
* https://www.suse.com/security/cve/CVE-2025-21704.html
* https://www.suse.com/security/cve/CVE-2025-21705.html
* https://www.suse.com/security/cve/CVE-2025-21706.html
* https://www.suse.com/security/cve/CVE-2025-21708.html
* https://www.suse.com/security/cve/CVE-2025-21711.html
* https://www.suse.com/security/cve/CVE-2025-21714.html
* https://www.suse.com/security/cve/CVE-2025-21715.html
* https://www.suse.com/security/cve/CVE-2025-21716.html
* https://www.suse.com/security/cve/CVE-2025-21718.html
* https://www.suse.com/security/cve/CVE-2025-21719.html
* https://www.suse.com/security/cve/CVE-2025-21723.html
* https://www.suse.com/security/cve/CVE-2025-21724.html
* https://www.suse.com/security/cve/CVE-2025-21725.html
* https://www.suse.com/security/cve/CVE-2025-21726.html
* https://www.suse.com/security/cve/CVE-2025-21727.html
* https://www.suse.com/security/cve/CVE-2025-21728.html
* https://www.suse.com/security/cve/CVE-2025-21731.html
* https://www.suse.com/security/cve/CVE-2025-21732.html
* https://www.suse.com/security/cve/CVE-2025-21733.html
* https://www.suse.com/security/cve/CVE-2025-21734.html
* https://www.suse.com/security/cve/CVE-2025-21735.html
* https://www.suse.com/security/cve/CVE-2025-21736.html
* https://www.suse.com/security/cve/CVE-2025-21738.html
* https://www.suse.com/security/cve/CVE-2025-21739.html
* https://www.suse.com/security/cve/CVE-2025-21741.html
* https://www.suse.com/security/cve/CVE-2025-21742.html
* https://www.suse.com/security/cve/CVE-2025-21743.html
* https://www.suse.com/security/cve/CVE-2025-21744.html
* https://www.suse.com/security/cve/CVE-2025-21745.html
* https://www.suse.com/security/cve/CVE-2025-21749.html
* https://www.suse.com/security/cve/CVE-2025-21750.html
* https://www.suse.com/security/cve/CVE-2025-21753.html
* https://www.suse.com/security/cve/CVE-2025-21754.html
* https://www.suse.com/security/cve/CVE-2025-21756.html
* https://www.suse.com/security/cve/CVE-2025-21759.html
* https://www.suse.com/security/cve/CVE-2025-21760.html
* https://www.suse.com/security/cve/CVE-2025-21761.html
* https://www.suse.com/security/cve/CVE-2025-21762.html
* https://www.suse.com/security/cve/CVE-2025-21763.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21765.html
* https://www.suse.com/security/cve/CVE-2025-21766.html
* https://www.suse.com/security/cve/CVE-2025-21767.html
* https://www.suse.com/security/cve/CVE-2025-21772.html
* https://www.suse.com/security/cve/CVE-2025-21773.html
* https://www.suse.com/security/cve/CVE-2025-21775.html
* https://www.suse.com/security/cve/CVE-2025-21776.html
* https://www.suse.com/security/cve/CVE-2025-21779.html
* https://www.suse.com/security/cve/CVE-2025-21780.html
* https://www.suse.com/security/cve/CVE-2025-21781.html
* https://www.suse.com/security/cve/CVE-2025-21782.html
* https://www.suse.com/security/cve/CVE-2025-21784.html
* https://www.suse.com/security/cve/CVE-2025-21785.html
* https://www.suse.com/security/cve/CVE-2025-21790.html
* https://www.suse.com/security/cve/CVE-2025-21791.html
* https://www.suse.com/security/cve/CVE-2025-21793.html
* https://www.suse.com/security/cve/CVE-2025-21794.html
* https://www.suse.com/security/cve/CVE-2025-21795.html
* https://www.suse.com/security/cve/CVE-2025-21796.html
* https://www.suse.com/security/cve/CVE-2025-21799.html
* https://www.suse.com/security/cve/CVE-2025-21802.html
* https://www.suse.com/security/cve/CVE-2025-21804.html
* https://www.suse.com/security/cve/CVE-2025-21810.html
* https://www.suse.com/security/cve/CVE-2025-21815.html
* https://www.suse.com/security/cve/CVE-2025-21819.html
* https://www.suse.com/security/cve/CVE-2025-21820.html
* https://www.suse.com/security/cve/CVE-2025-21821.html
* https://www.suse.com/security/cve/CVE-2025-21823.html
* https://www.suse.com/security/cve/CVE-2025-21825.html
* https://www.suse.com/security/cve/CVE-2025-21828.html
* https://www.suse.com/security/cve/CVE-2025-21829.html
* https://www.suse.com/security/cve/CVE-2025-21830.html
* https://www.suse.com/security/cve/CVE-2025-21831.html
* https://www.suse.com/security/cve/CVE-2025-21832.html
* https://www.suse.com/security/cve/CVE-2025-21835.html
* https://www.suse.com/security/cve/CVE-2025-21838.html
* https://www.suse.com/security/cve/CVE-2025-21844.html
* https://www.suse.com/security/cve/CVE-2025-21846.html
* https://www.suse.com/security/cve/CVE-2025-21847.html
* https://www.suse.com/security/cve/CVE-2025-21848.html
* https://www.suse.com/security/cve/CVE-2025-21850.html
* https://www.suse.com/security/cve/CVE-2025-21855.html
* https://www.suse.com/security/cve/CVE-2025-21856.html
* https://www.suse.com/security/cve/CVE-2025-21857.html
* https://www.suse.com/security/cve/CVE-2025-21858.html
* https://www.suse.com/security/cve/CVE-2025-21859.html
* https://www.suse.com/security/cve/CVE-2025-21861.html
* https://www.suse.com/security/cve/CVE-2025-21862.html
* https://www.suse.com/security/cve/CVE-2025-21864.html
* https://www.suse.com/security/cve/CVE-2025-21865.html
* https://www.suse.com/security/cve/CVE-2025-21866.html
* https://www.suse.com/security/cve/CVE-2025-21869.html
* https://www.suse.com/security/cve/CVE-2025-21870.html
* https://www.suse.com/security/cve/CVE-2025-21871.html
* https://www.suse.com/security/cve/CVE-2025-21876.html
* https://www.suse.com/security/cve/CVE-2025-21877.html
* https://www.suse.com/security/cve/CVE-2025-21878.html
* https://www.suse.com/security/cve/CVE-2025-21883.html
* https://www.suse.com/security/cve/CVE-2025-21885.html
* https://www.suse.com/security/cve/CVE-2025-21886.html
* https://www.suse.com/security/cve/CVE-2025-21888.html
* https://www.suse.com/security/cve/CVE-2025-21890.html
* https://www.suse.com/security/cve/CVE-2025-21891.html
* https://www.suse.com/security/cve/CVE-2025-21892.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1215211
* https://bugzilla.suse.com/show_bug.cgi?id=1218470
* https://bugzilla.suse.com/show_bug.cgi?id=1219367
* https://bugzilla.suse.com/show_bug.cgi?id=1221651
* https://bugzilla.suse.com/show_bug.cgi?id=1222649
* https://bugzilla.suse.com/show_bug.cgi?id=1222672
* https://bugzilla.suse.com/show_bug.cgi?id=1222803
* https://bugzilla.suse.com/show_bug.cgi?id=1223047
* https://bugzilla.suse.com/show_bug.cgi?id=1224049
* https://bugzilla.suse.com/show_bug.cgi?id=1224489
* https://bugzilla.suse.com/show_bug.cgi?id=1224610
* https://bugzilla.suse.com/show_bug.cgi?id=1225533
* https://bugzilla.suse.com/show_bug.cgi?id=1225606
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225770
* https://bugzilla.suse.com/show_bug.cgi?id=1225981
* https://bugzilla.suse.com/show_bug.cgi?id=1226871
* https://bugzilla.suse.com/show_bug.cgi?id=1227858
* https://bugzilla.suse.com/show_bug.cgi?id=1227937
* https://bugzilla.suse.com/show_bug.cgi?id=1228521
* https://bugzilla.suse.com/show_bug.cgi?id=1228653
* https://bugzilla.suse.com/show_bug.cgi?id=1229311
* https://bugzilla.suse.com/show_bug.cgi?id=1229361
* https://bugzilla.suse.com/show_bug.cgi?id=1230235
* https://bugzilla.suse.com/show_bug.cgi?id=1230438
* https://bugzilla.suse.com/show_bug.cgi?id=1230439
* https://bugzilla.suse.com/show_bug.cgi?id=1230497
* https://bugzilla.suse.com/show_bug.cgi?id=1230728
* https://bugzilla.suse.com/show_bug.cgi?id=1230769
* https://bugzilla.suse.com/show_bug.cgi?id=1230832
* https://bugzilla.suse.com/show_bug.cgi?id=1231088
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231432
* https://bugzilla.suse.com/show_bug.cgi?id=1231912
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231949
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232299
* https://bugzilla.suse.com/show_bug.cgi?id=1232364
* https://bugzilla.suse.com/show_bug.cgi?id=1232389
* https://bugzilla.suse.com/show_bug.cgi?id=1232421
* https://bugzilla.suse.com/show_bug.cgi?id=1232508
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232743
* https://bugzilla.suse.com/show_bug.cgi?id=1232812
* https://bugzilla.suse.com/show_bug.cgi?id=1232848
* https://bugzilla.suse.com/show_bug.cgi?id=1232895
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1233028
* https://bugzilla.suse.com/show_bug.cgi?id=1233033
* https://bugzilla.suse.com/show_bug.cgi?id=1233060
* https://bugzilla.suse.com/show_bug.cgi?id=1233109
* https://bugzilla.suse.com/show_bug.cgi?id=1233221
* https://bugzilla.suse.com/show_bug.cgi?id=1233248
* https://bugzilla.suse.com/show_bug.cgi?id=1233259
* https://bugzilla.suse.com/show_bug.cgi?id=1233260
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233483
* https://bugzilla.suse.com/show_bug.cgi?id=1233522
* https://bugzilla.suse.com/show_bug.cgi?id=1233551
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233749
* https://bugzilla.suse.com/show_bug.cgi?id=1234070
* https://bugzilla.suse.com/show_bug.cgi?id=1234222
* https://bugzilla.suse.com/show_bug.cgi?id=1234480
* https://bugzilla.suse.com/show_bug.cgi?id=1234828
* https://bugzilla.suse.com/show_bug.cgi?id=1234853
* https://bugzilla.suse.com/show_bug.cgi?id=1234857
* https://bugzilla.suse.com/show_bug.cgi?id=1234891
* https://bugzilla.suse.com/show_bug.cgi?id=1234894
* https://bugzilla.suse.com/show_bug.cgi?id=1234895
* https://bugzilla.suse.com/show_bug.cgi?id=1234896
* https://bugzilla.suse.com/show_bug.cgi?id=1234936
* https://bugzilla.suse.com/show_bug.cgi?id=1234963
* https://bugzilla.suse.com/show_bug.cgi?id=1235054
* https://bugzilla.suse.com/show_bug.cgi?id=1235061
* https://bugzilla.suse.com/show_bug.cgi?id=1235073
* https://bugzilla.suse.com/show_bug.cgi?id=1235244
* https://bugzilla.suse.com/show_bug.cgi?id=1235435
* https://bugzilla.suse.com/show_bug.cgi?id=1235436
* https://bugzilla.suse.com/show_bug.cgi?id=1235441
* https://bugzilla.suse.com/show_bug.cgi?id=1235455
* https://bugzilla.suse.com/show_bug.cgi?id=1235485
* https://bugzilla.suse.com/show_bug.cgi?id=1235501
* https://bugzilla.suse.com/show_bug.cgi?id=1235524
* https://bugzilla.suse.com/show_bug.cgi?id=1235589
* https://bugzilla.suse.com/show_bug.cgi?id=1235591
* https://bugzilla.suse.com/show_bug.cgi?id=1235592
* https://bugzilla.suse.com/show_bug.cgi?id=1235599
* https://bugzilla.suse.com/show_bug.cgi?id=1235609
* https://bugzilla.suse.com/show_bug.cgi?id=1235621
* https://bugzilla.suse.com/show_bug.cgi?id=1235637
* https://bugzilla.suse.com/show_bug.cgi?id=1235698
* https://bugzilla.suse.com/show_bug.cgi?id=1235711
* https://bugzilla.suse.com/show_bug.cgi?id=1235712
* https://bugzilla.suse.com/show_bug.cgi?id=1235715
* https://bugzilla.suse.com/show_bug.cgi?id=1235729
* https://bugzilla.suse.com/show_bug.cgi?id=1235733
* https://bugzilla.suse.com/show_bug.cgi?id=1235761
* https://bugzilla.suse.com/show_bug.cgi?id=1235870
* https://bugzilla.suse.com/show_bug.cgi?id=1235874
* https://bugzilla.suse.com/show_bug.cgi?id=1235914
* https://bugzilla.suse.com/show_bug.cgi?id=1235932
* https://bugzilla.suse.com/show_bug.cgi?id=1235933
* https://bugzilla.suse.com/show_bug.cgi?id=1235973
* https://bugzilla.suse.com/show_bug.cgi?id=1236099
* https://bugzilla.suse.com/show_bug.cgi?id=1236111
* https://bugzilla.suse.com/show_bug.cgi?id=1236113
* https://bugzilla.suse.com/show_bug.cgi?id=1236114
* https://bugzilla.suse.com/show_bug.cgi?id=1236115
* https://bugzilla.suse.com/show_bug.cgi?id=1236122
* https://bugzilla.suse.com/show_bug.cgi?id=1236123
* https://bugzilla.suse.com/show_bug.cgi?id=1236133
* https://bugzilla.suse.com/show_bug.cgi?id=1236138
* https://bugzilla.suse.com/show_bug.cgi?id=1236199
* https://bugzilla.suse.com/show_bug.cgi?id=1236200
* https://bugzilla.suse.com/show_bug.cgi?id=1236203
* https://bugzilla.suse.com/show_bug.cgi?id=1236205
* https://bugzilla.suse.com/show_bug.cgi?id=1236206
* https://bugzilla.suse.com/show_bug.cgi?id=1236333
* https://bugzilla.suse.com/show_bug.cgi?id=1236573
* https://bugzilla.suse.com/show_bug.cgi?id=1236575
* https://bugzilla.suse.com/show_bug.cgi?id=1236576
* https://bugzilla.suse.com/show_bug.cgi?id=1236591
* https://bugzilla.suse.com/show_bug.cgi?id=1236661
* https://bugzilla.suse.com/show_bug.cgi?id=1236677
* https://bugzilla.suse.com/show_bug.cgi?id=1236680
* https://bugzilla.suse.com/show_bug.cgi?id=1236681
* https://bugzilla.suse.com/show_bug.cgi?id=1236682
* https://bugzilla.suse.com/show_bug.cgi?id=1236683
* https://bugzilla.suse.com/show_bug.cgi?id=1236684
* https://bugzilla.suse.com/show_bug.cgi?id=1236685
* https://bugzilla.suse.com/show_bug.cgi?id=1236689
* https://bugzilla.suse.com/show_bug.cgi?id=1236692
* https://bugzilla.suse.com/show_bug.cgi?id=1236694
* https://bugzilla.suse.com/show_bug.cgi?id=1236698
* https://bugzilla.suse.com/show_bug.cgi?id=1236700
* https://bugzilla.suse.com/show_bug.cgi?id=1236702
* https://bugzilla.suse.com/show_bug.cgi?id=1236752
* https://bugzilla.suse.com/show_bug.cgi?id=1236757
* https://bugzilla.suse.com/show_bug.cgi?id=1236758
* https://bugzilla.suse.com/show_bug.cgi?id=1236759
* https://bugzilla.suse.com/show_bug.cgi?id=1236760
* https://bugzilla.suse.com/show_bug.cgi?id=1236761
* https://bugzilla.suse.com/show_bug.cgi?id=1236821
* https://bugzilla.suse.com/show_bug.cgi?id=1236822
* https://bugzilla.suse.com/show_bug.cgi?id=1236896
* https://bugzilla.suse.com/show_bug.cgi?id=1236897
* https://bugzilla.suse.com/show_bug.cgi?id=1236952
* https://bugzilla.suse.com/show_bug.cgi?id=1236967
* https://bugzilla.suse.com/show_bug.cgi?id=1236994
* https://bugzilla.suse.com/show_bug.cgi?id=1237007
* https://bugzilla.suse.com/show_bug.cgi?id=1237017
* https://bugzilla.suse.com/show_bug.cgi?id=1237025
* https://bugzilla.suse.com/show_bug.cgi?id=1237028
* https://bugzilla.suse.com/show_bug.cgi?id=1237029
* https://bugzilla.suse.com/show_bug.cgi?id=1237045
* https://bugzilla.suse.com/show_bug.cgi?id=1237126
* https://bugzilla.suse.com/show_bug.cgi?id=1237132
* https://bugzilla.suse.com/show_bug.cgi?id=1237139
* https://bugzilla.suse.com/show_bug.cgi?id=1237155
* https://bugzilla.suse.com/show_bug.cgi?id=1237158
* https://bugzilla.suse.com/show_bug.cgi?id=1237159
* https://bugzilla.suse.com/show_bug.cgi?id=1237164
* https://bugzilla.suse.com/show_bug.cgi?id=1237232
* https://bugzilla.suse.com/show_bug.cgi?id=1237234
* https://bugzilla.suse.com/show_bug.cgi?id=1237313
* https://bugzilla.suse.com/show_bug.cgi?id=1237325
* https://bugzilla.suse.com/show_bug.cgi?id=1237356
* https://bugzilla.suse.com/show_bug.cgi?id=1237415
* https://bugzilla.suse.com/show_bug.cgi?id=1237452
* https://bugzilla.suse.com/show_bug.cgi?id=1237504
* https://bugzilla.suse.com/show_bug.cgi?id=1237521
* https://bugzilla.suse.com/show_bug.cgi?id=1237530
* https://bugzilla.suse.com/show_bug.cgi?id=1237558
* https://bugzilla.suse.com/show_bug.cgi?id=1237562
* https://bugzilla.suse.com/show_bug.cgi?id=1237563
* https://bugzilla.suse.com/show_bug.cgi?id=1237565
* https://bugzilla.suse.com/show_bug.cgi?id=1237571
* https://bugzilla.suse.com/show_bug.cgi?id=1237848
* https://bugzilla.suse.com/show_bug.cgi?id=1237849
* https://bugzilla.suse.com/show_bug.cgi?id=1237853
* https://bugzilla.suse.com/show_bug.cgi?id=1237856
* https://bugzilla.suse.com/show_bug.cgi?id=1237873
* https://bugzilla.suse.com/show_bug.cgi?id=1237875
* https://bugzilla.suse.com/show_bug.cgi?id=1237876
* https://bugzilla.suse.com/show_bug.cgi?id=1237877
* https://bugzilla.suse.com/show_bug.cgi?id=1237879
* https://bugzilla.suse.com/show_bug.cgi?id=1237881
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237889
* https://bugzilla.suse.com/show_bug.cgi?id=1237890
* https://bugzilla.suse.com/show_bug.cgi?id=1237891
* https://bugzilla.suse.com/show_bug.cgi?id=1237894
* https://bugzilla.suse.com/show_bug.cgi?id=1237897
* https://bugzilla.suse.com/show_bug.cgi?id=1237900
* https://bugzilla.suse.com/show_bug.cgi?id=1237901
* https://bugzilla.suse.com/show_bug.cgi?id=1237906
* https://bugzilla.suse.com/show_bug.cgi?id=1237907
* https://bugzilla.suse.com/show_bug.cgi?id=1237911
* https://bugzilla.suse.com/show_bug.cgi?id=1237912
* https://bugzilla.suse.com/show_bug.cgi?id=1237950
* https://bugzilla.suse.com/show_bug.cgi?id=1238212
* https://bugzilla.suse.com/show_bug.cgi?id=1238214
* https://bugzilla.suse.com/show_bug.cgi?id=1238303
* https://bugzilla.suse.com/show_bug.cgi?id=1238347
* https://bugzilla.suse.com/show_bug.cgi?id=1238368
* https://bugzilla.suse.com/show_bug.cgi?id=1238474
* https://bugzilla.suse.com/show_bug.cgi?id=1238475
* https://bugzilla.suse.com/show_bug.cgi?id=1238479
* https://bugzilla.suse.com/show_bug.cgi?id=1238494
* https://bugzilla.suse.com/show_bug.cgi?id=1238496
* https://bugzilla.suse.com/show_bug.cgi?id=1238497
* https://bugzilla.suse.com/show_bug.cgi?id=1238500
* https://bugzilla.suse.com/show_bug.cgi?id=1238501
* https://bugzilla.suse.com/show_bug.cgi?id=1238502
* https://bugzilla.suse.com/show_bug.cgi?id=1238503
* https://bugzilla.suse.com/show_bug.cgi?id=1238506
* https://bugzilla.suse.com/show_bug.cgi?id=1238507
* https://bugzilla.suse.com/show_bug.cgi?id=1238509
* https://bugzilla.suse.com/show_bug.cgi?id=1238510
* https://bugzilla.suse.com/show_bug.cgi?id=1238511
* https://bugzilla.suse.com/show_bug.cgi?id=1238512
* https://bugzilla.suse.com/show_bug.cgi?id=1238521
* https://bugzilla.suse.com/show_bug.cgi?id=1238523
* https://bugzilla.suse.com/show_bug.cgi?id=1238525
* https://bugzilla.suse.com/show_bug.cgi?id=1238526
* https://bugzilla.suse.com/show_bug.cgi?id=1238528
* https://bugzilla.suse.com/show_bug.cgi?id=1238529
* https://bugzilla.suse.com/show_bug.cgi?id=1238531
* https://bugzilla.suse.com/show_bug.cgi?id=1238532
* https://bugzilla.suse.com/show_bug.cgi?id=1238570
* https://bugzilla.suse.com/show_bug.cgi?id=1238715
* https://bugzilla.suse.com/show_bug.cgi?id=1238716
* https://bugzilla.suse.com/show_bug.cgi?id=1238734
* https://bugzilla.suse.com/show_bug.cgi?id=1238735
* https://bugzilla.suse.com/show_bug.cgi?id=1238736
* https://bugzilla.suse.com/show_bug.cgi?id=1238738
* https://bugzilla.suse.com/show_bug.cgi?id=1238739
* https://bugzilla.suse.com/show_bug.cgi?id=1238747
* https://bugzilla.suse.com/show_bug.cgi?id=1238751
* https://bugzilla.suse.com/show_bug.cgi?id=1238753
* https://bugzilla.suse.com/show_bug.cgi?id=1238754
* https://bugzilla.suse.com/show_bug.cgi?id=1238757
* https://bugzilla.suse.com/show_bug.cgi?id=1238759
* https://bugzilla.suse.com/show_bug.cgi?id=1238760
* https://bugzilla.suse.com/show_bug.cgi?id=1238762
* https://bugzilla.suse.com/show_bug.cgi?id=1238763
* https://bugzilla.suse.com/show_bug.cgi?id=1238767
* https://bugzilla.suse.com/show_bug.cgi?id=1238768
* https://bugzilla.suse.com/show_bug.cgi?id=1238771
* https://bugzilla.suse.com/show_bug.cgi?id=1238772
* https://bugzilla.suse.com/show_bug.cgi?id=1238773
* https://bugzilla.suse.com/show_bug.cgi?id=1238775
* https://bugzilla.suse.com/show_bug.cgi?id=1238780
* https://bugzilla.suse.com/show_bug.cgi?id=1238781
* https://bugzilla.suse.com/show_bug.cgi?id=1238785
* https://bugzilla.suse.com/show_bug.cgi?id=1238860
* https://bugzilla.suse.com/show_bug.cgi?id=1238863
* https://bugzilla.suse.com/show_bug.cgi?id=1238864
* https://bugzilla.suse.com/show_bug.cgi?id=1238865
* https://bugzilla.suse.com/show_bug.cgi?id=1238876
* https://bugzilla.suse.com/show_bug.cgi?id=1238877
* https://bugzilla.suse.com/show_bug.cgi?id=1238903
* https://bugzilla.suse.com/show_bug.cgi?id=1238904
* https://bugzilla.suse.com/show_bug.cgi?id=1238905
* https://bugzilla.suse.com/show_bug.cgi?id=1238909
* https://bugzilla.suse.com/show_bug.cgi?id=1238911
* https://bugzilla.suse.com/show_bug.cgi?id=1238917
* https://bugzilla.suse.com/show_bug.cgi?id=1238958
* https://bugzilla.suse.com/show_bug.cgi?id=1238959
* https://bugzilla.suse.com/show_bug.cgi?id=1238963
* https://bugzilla.suse.com/show_bug.cgi?id=1238964
* https://bugzilla.suse.com/show_bug.cgi?id=1238969
* https://bugzilla.suse.com/show_bug.cgi?id=1238971
* https://bugzilla.suse.com/show_bug.cgi?id=1238973
* https://bugzilla.suse.com/show_bug.cgi?id=1238975
* https://bugzilla.suse.com/show_bug.cgi?id=1238978
* https://bugzilla.suse.com/show_bug.cgi?id=1238979
* https://bugzilla.suse.com/show_bug.cgi?id=1238981
* https://bugzilla.suse.com/show_bug.cgi?id=1238984
* https://bugzilla.suse.com/show_bug.cgi?id=1238986
* https://bugzilla.suse.com/show_bug.cgi?id=1238993
* https://bugzilla.suse.com/show_bug.cgi?id=1238994
* https://bugzilla.suse.com/show_bug.cgi?id=1238997
* https://bugzilla.suse.com/show_bug.cgi?id=1239015
* https://bugzilla.suse.com/show_bug.cgi?id=1239016
* https://bugzilla.suse.com/show_bug.cgi?id=1239027
* https://bugzilla.suse.com/show_bug.cgi?id=1239029
* https://bugzilla.suse.com/show_bug.cgi?id=1239030
* https://bugzilla.suse.com/show_bug.cgi?id=1239033
* https://bugzilla.suse.com/show_bug.cgi?id=1239034
* https://bugzilla.suse.com/show_bug.cgi?id=1239036
* https://bugzilla.suse.com/show_bug.cgi?id=1239037
* https://bugzilla.suse.com/show_bug.cgi?id=1239038
* https://bugzilla.suse.com/show_bug.cgi?id=1239039
* https://bugzilla.suse.com/show_bug.cgi?id=1239045
* https://bugzilla.suse.com/show_bug.cgi?id=1239065
* https://bugzilla.suse.com/show_bug.cgi?id=1239068
* https://bugzilla.suse.com/show_bug.cgi?id=1239073
* https://bugzilla.suse.com/show_bug.cgi?id=1239076
* https://bugzilla.suse.com/show_bug.cgi?id=1239080
* https://bugzilla.suse.com/show_bug.cgi?id=1239085
* https://bugzilla.suse.com/show_bug.cgi?id=1239087
* https://bugzilla.suse.com/show_bug.cgi?id=1239095
* https://bugzilla.suse.com/show_bug.cgi?id=1239104
* https://bugzilla.suse.com/show_bug.cgi?id=1239105
* https://bugzilla.suse.com/show_bug.cgi?id=1239109
* https://bugzilla.suse.com/show_bug.cgi?id=1239112
* https://bugzilla.suse.com/show_bug.cgi?id=1239114
* https://bugzilla.suse.com/show_bug.cgi?id=1239115
* https://bugzilla.suse.com/show_bug.cgi?id=1239117
* https://bugzilla.suse.com/show_bug.cgi?id=1239167
* https://bugzilla.suse.com/show_bug.cgi?id=1239174
* https://bugzilla.suse.com/show_bug.cgi?id=1239346
* https://bugzilla.suse.com/show_bug.cgi?id=1239349
* https://bugzilla.suse.com/show_bug.cgi?id=1239435
* https://bugzilla.suse.com/show_bug.cgi?id=1239467
* https://bugzilla.suse.com/show_bug.cgi?id=1239468
* https://bugzilla.suse.com/show_bug.cgi?id=1239471
* https://bugzilla.suse.com/show_bug.cgi?id=1239473
* https://bugzilla.suse.com/show_bug.cgi?id=1239474
* https://bugzilla.suse.com/show_bug.cgi?id=1239477
* https://bugzilla.suse.com/show_bug.cgi?id=1239478
* https://bugzilla.suse.com/show_bug.cgi?id=1239479
* https://bugzilla.suse.com/show_bug.cgi?id=1239481
* https://bugzilla.suse.com/show_bug.cgi?id=1239482
* https://bugzilla.suse.com/show_bug.cgi?id=1239483
* https://bugzilla.suse.com/show_bug.cgi?id=1239484
* https://bugzilla.suse.com/show_bug.cgi?id=1239486
* https://bugzilla.suse.com/show_bug.cgi?id=1239508
* https://bugzilla.suse.com/show_bug.cgi?id=1239512
* https://bugzilla.suse.com/show_bug.cgi?id=1239518
* https://bugzilla.suse.com/show_bug.cgi?id=1239573
* https://bugzilla.suse.com/show_bug.cgi?id=1239594
* https://bugzilla.suse.com/show_bug.cgi?id=1239595
* https://bugzilla.suse.com/show_bug.cgi?id=1239600
* https://bugzilla.suse.com/show_bug.cgi?id=1239605
* https://bugzilla.suse.com/show_bug.cgi?id=1239615
* https://bugzilla.suse.com/show_bug.cgi?id=1239644
* https://bugzilla.suse.com/show_bug.cgi?id=1239707
* https://bugzilla.suse.com/show_bug.cgi?id=1239986
* https://bugzilla.suse.com/show_bug.cgi?id=1239994
* https://bugzilla.suse.com/show_bug.cgi?id=1240169
* https://bugzilla.suse.com/show_bug.cgi?id=1240172
* https://bugzilla.suse.com/show_bug.cgi?id=1240173
* https://bugzilla.suse.com/show_bug.cgi?id=1240175
* https://bugzilla.suse.com/show_bug.cgi?id=1240177
* https://bugzilla.suse.com/show_bug.cgi?id=1240179
* https://bugzilla.suse.com/show_bug.cgi?id=1240182
* https://bugzilla.suse.com/show_bug.cgi?id=1240183
* https://bugzilla.suse.com/show_bug.cgi?id=1240186
* https://bugzilla.suse.com/show_bug.cgi?id=1240188
* https://bugzilla.suse.com/show_bug.cgi?id=1240189
* https://bugzilla.suse.com/show_bug.cgi?id=1240191
* https://bugzilla.suse.com/show_bug.cgi?id=1240192
* https://bugzilla.suse.com/show_bug.cgi?id=1240333
* https://bugzilla.suse.com/show_bug.cgi?id=1240334
* https://jira.suse.com/browse/PED-10028
* https://jira.suse.com/browse/PED-10701
* https://jira.suse.com/browse/PED-11253
* https://jira.suse.com/browse/PED-12094
* https://jira.suse.com/browse/PED-12251
* https://jira.suse.com/browse/PED-12416
* https://jira.suse.com/browse/PED-348
* https://jira.suse.com/browse/PED-7619


--===============4470831759471973195==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:20260-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-04-17T10:48:21Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">bsc#1207948</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215211">bsc#1215211</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218470">bsc#1218470</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219367">bsc#1219367</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221651">bsc#1221651</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222649">bsc#1222649</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222672">bsc#1222672</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222803">bsc#1222803</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223047">bsc#1223047</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224049">bsc#1224049</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224489">bsc#1224489</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224610">bsc#1224610</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225533">bsc#1225533</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225606">bsc#1225606</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225770">bsc#1225770</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225981">bsc#1225981</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226871">bsc#1226871</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227858">bsc#1227858</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227937">bsc#1227937</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228521">bsc#1228521</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228653">bsc#1228653</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229311">bsc#1229311</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229361">bsc#1229361</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230235">bsc#1230235</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230438">bsc#1230438</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230439">bsc#1230439</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230497">bsc#1230497</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230728">bsc#1230728</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230769">bsc#1230769</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230832">bsc#1230832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231088">bsc#1231088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231293">bsc#1231293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231432">bsc#1231432</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231912">bsc#1231912</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">bsc#1231920</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231949">bsc#1231949</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">bsc#1232159</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">bsc#1232198</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">bsc#1232201</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232299">bsc#1232299</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232364">bsc#1232364</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232389">bsc#1232389</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232421">bsc#1232421</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232508">bsc#1232508</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">bsc#1232520</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232743">bsc#1232743</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232812">bsc#1232812</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232848">bsc#1232848</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232895">bsc#1232895</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">bsc#1232919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233028">bsc#1233028</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233033">bsc#1233033</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233060">bsc#1233060</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233109">bsc#1233109</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233221">bsc#1233221</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233248">bsc#1233248</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233259">bsc#1233259</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233260">bsc#1233260</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">bsc#1233479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233483">bsc#1233483</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233522">bsc#1233522</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233551">bsc#1233551</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">bsc#1233557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233749">bsc#1233749</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234070">bsc#1234070</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234222">bsc#1234222</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234480">bsc#1234480</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234828">bsc#1234828</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">bsc#1234853</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234857">bsc#1234857</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">bsc#1234891</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234894">bsc#1234894</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234895">bsc#1234895</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234896">bsc#1234896</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234936">bsc#1234936</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">bsc#1234963</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">bsc#1235054</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">bsc#1235061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">bsc#1235073</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235244">bsc#1235244</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235435">bsc#1235435</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235436">bsc#1235436</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235441">bsc#1235441</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235455">bsc#1235455</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235485">bsc#1235485</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235501">bsc#1235501</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235524">bsc#1235524</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235589">bsc#1235589</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235591">bsc#1235591</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235592">bsc#1235592</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235599">bsc#1235599</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235609">bsc#1235609</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235621">bsc#1235621</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235637">bsc#1235637</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235698">bsc#1235698</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235711">bsc#1235711</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235712">bsc#1235712</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235715">bsc#1235715</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235729">bsc#1235729</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235733">bsc#1235733</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235761">bsc#1235761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235870">bsc#1235870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235874">bsc#1235874</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235914">bsc#1235914</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235932">bsc#1235932</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235933">bsc#1235933</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235973">bsc#1235973</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236099">bsc#1236099</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236111">bsc#1236111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236113">bsc#1236113</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236114">bsc#1236114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236115">bsc#1236115</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236122">bsc#1236122</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236123">bsc#1236123</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">bsc#1236133</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236138">bsc#1236138</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236199">bsc#1236199</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236200">bsc#1236200</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236203">bsc#1236203</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236205">bsc#1236205</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236206">bsc#1236206</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236333">bsc#1236333</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236573">bsc#1236573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236575">bsc#1236575</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">bsc#1236576</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236591">bsc#1236591</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">bsc#1236661</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">bsc#1236677</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236680">bsc#1236680</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236681">bsc#1236681</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236682">bsc#1236682</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236683">bsc#1236683</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236684">bsc#1236684</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236685">bsc#1236685</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236689">bsc#1236689</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236692">bsc#1236692</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236694">bsc#1236694</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236698">bsc#1236698</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236700">bsc#1236700</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236702">bsc#1236702</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236752">bsc#1236752</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236757">bsc#1236757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236758">bsc#1236758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236759">bsc#1236759</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236760">bsc#1236760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236761">bsc#1236761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236821">bsc#1236821</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236822">bsc#1236822</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236896">bsc#1236896</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236897">bsc#1236897</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236952">bsc#1236952</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236967">bsc#1236967</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236994">bsc#1236994</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237007">bsc#1237007</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237017">bsc#1237017</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">bsc#1237025</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">bsc#1237028</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237029">bsc#1237029</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237045">bsc#1237045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237126">bsc#1237126</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237132">bsc#1237132</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">bsc#1237139</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237155">bsc#1237155</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237158">bsc#1237158</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237159">bsc#1237159</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237164">bsc#1237164</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237232">bsc#1237232</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237234">bsc#1237234</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237313">bsc#1237313</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237325">bsc#1237325</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237356">bsc#1237356</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237415">bsc#1237415</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237452">bsc#1237452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237504">bsc#1237504</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237521">bsc#1237521</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237530">bsc#1237530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237558">bsc#1237558</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237562">bsc#1237562</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237563">bsc#1237563</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237565">bsc#1237565</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237571">bsc#1237571</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237848">bsc#1237848</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237849">bsc#1237849</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237853">bsc#1237853</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237856">bsc#1237856</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237873">bsc#1237873</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237875">bsc#1237875</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237876">bsc#1237876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237877">bsc#1237877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237879">bsc#1237879</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237881">bsc#1237881</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237885">bsc#1237885</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237889">bsc#1237889</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237890">bsc#1237890</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237891">bsc#1237891</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237894">bsc#1237894</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237897">bsc#1237897</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237900">bsc#1237900</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237901">bsc#1237901</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237906">bsc#1237906</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237907">bsc#1237907</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237911">bsc#1237911</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237912">bsc#1237912</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237950">bsc#1237950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238212">bsc#1238212</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238214">bsc#1238214</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238303">bsc#1238303</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238347">bsc#1238347</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238368">bsc#1238368</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238474">bsc#1238474</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238475">bsc#1238475</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238479">bsc#1238479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238494">bsc#1238494</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238496">bsc#1238496</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238497">bsc#1238497</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238500">bsc#1238500</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238501">bsc#1238501</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238502">bsc#1238502</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238503">bsc#1238503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238506">bsc#1238506</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238507">bsc#1238507</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238509">bsc#1238509</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238510">bsc#1238510</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238511">bsc#1238511</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238512">bsc#1238512</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238521">bsc#1238521</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238523">bsc#1238523</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238525">bsc#1238525</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238526">bsc#1238526</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238528">bsc#1238528</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238529">bsc#1238529</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238531">bsc#1238531</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238532">bsc#1238532</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238570">bsc#1238570</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238715">bsc#1238715</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238716">bsc#1238716</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238734">bsc#1238734</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238735">bsc#1238735</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238736">bsc#1238736</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238738">bsc#1238738</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238739">bsc#1238739</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238747">bsc#1238747</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238751">bsc#1238751</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238753">bsc#1238753</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238754">bsc#1238754</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238757">bsc#1238757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238759">bsc#1238759</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238760">bsc#1238760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238762">bsc#1238762</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238763">bsc#1238763</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238767">bsc#1238767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238768">bsc#1238768</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238771">bsc#1238771</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238772">bsc#1238772</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238773">bsc#1238773</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238775">bsc#1238775</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238780">bsc#1238780</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238781">bsc#1238781</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238785">bsc#1238785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238860">bsc#1238860</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238863">bsc#1238863</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238864">bsc#1238864</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238865">bsc#1238865</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238876">bsc#1238876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238877">bsc#1238877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238903">bsc#1238903</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238904">bsc#1238904</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238905">bsc#1238905</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238909">bsc#1238909</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238911">bsc#1238911</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238917">bsc#1238917</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238958">bsc#1238958</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238959">bsc#1238959</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238963">bsc#1238963</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238964">bsc#1238964</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238969">bsc#1238969</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238971">bsc#1238971</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238973">bsc#1238973</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238975">bsc#1238975</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238978">bsc#1238978</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238979">bsc#1238979</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238981">bsc#1238981</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238984">bsc#1238984</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238986">bsc#1238986</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238993">bsc#1238993</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238994">bsc#1238994</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238997">bsc#1238997</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239015">bsc#1239015</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239016">bsc#1239016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239027">bsc#1239027</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239029">bsc#1239029</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239030">bsc#1239030</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239033">bsc#1239033</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239034">bsc#1239034</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239036">bsc#1239036</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239037">bsc#1239037</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239038">bsc#1239038</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239039">bsc#1239039</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239045">bsc#1239045</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239065">bsc#1239065</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239068">bsc#1239068</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239073">bsc#1239073</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239076">bsc#1239076</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239080">bsc#1239080</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239085">bsc#1239085</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239087">bsc#1239087</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239095">bsc#1239095</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239104">bsc#1239104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239105">bsc#1239105</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239109">bsc#1239109</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239112">bsc#1239112</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239114">bsc#1239114</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239115">bsc#1239115</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239117">bsc#1239117</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239167">bsc#1239167</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239174">bsc#1239174</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239346">bsc#1239346</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239349">bsc#1239349</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239435">bsc#1239435</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239467">bsc#1239467</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239468">bsc#1239468</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239471">bsc#1239471</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239473">bsc#1239473</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239474">bsc#1239474</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239477">bsc#1239477</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239478">bsc#1239478</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239479">bsc#1239479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239481">bsc#1239481</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239482">bsc#1239482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239483">bsc#1239483</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239484">bsc#1239484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239486">bsc#1239486</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239508">bsc#1239508</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239512">bsc#1239512</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239518">bsc#1239518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239573">bsc#1239573</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239594">bsc#1239594</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239595">bsc#1239595</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239600">bsc#1239600</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239605">bsc#1239605</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239615">bsc#1239615</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239644">bsc#1239644</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239707">bsc#1239707</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239986">bsc#1239986</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239994">bsc#1239994</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240169">bsc#1240169</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240172">bsc#1240172</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240173">bsc#1240173</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240175">bsc#1240175</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240177">bsc#1240177</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240179">bsc#1240179</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240182">bsc#1240182</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240183">bsc#1240183</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240186">bsc#1240186</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240188">bsc#1240188</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240189">bsc#1240189</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240191">bsc#1240191</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240192">bsc#1240192</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240333">bsc#1240333</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240334">bsc#1240334</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10028">jsc#PED-10028</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10701">jsc#PED-10701</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-11253">jsc#PED-11253</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-12094">jsc#PED-12094</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-12251">jsc#PED-12251</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-12416">jsc#PED-12416</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-348">jsc#PED-348</a>
</li>

<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-7619">jsc#PED-7619</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52831.html">CVE-2023-52831</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52924.html">CVE-2023-52924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52925.html">CVE-2023-52925</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52926.html">CVE-2023-52926</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52927.html">CVE-2023-52927</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26634.html">CVE-2024-26634</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26708.html">CVE-2024-26708</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26810.html">CVE-2024-26810</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26873.html">CVE-2024-26873</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35826.html">CVE-2024-35826</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-35910.html">CVE-2024-35910</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38606.html">CVE-2024-38606</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40980.html">CVE-2024-40980</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41005.html">CVE-2024-41005</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41055.html">CVE-2024-41055</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41077.html">CVE-2024-41077</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-41149.html">CVE-2024-41149</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42307.html">CVE-2024-42307</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43820.html">CVE-2024-43820</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44974.html">CVE-2024-44974</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45009.html">CVE-2024-45009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45010.html">CVE-2024-45010</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46736.html">CVE-2024-46736</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46782.html">CVE-2024-46782</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46796.html">CVE-2024-46796</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46858.html">CVE-2024-46858</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47408.html">CVE-2024-47408</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">CVE-2024-47701</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-47794.html">CVE-2024-47794</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49571.html">CVE-2024-49571</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">CVE-2024-49884</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49924.html">CVE-2024-49924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49940.html">CVE-2024-49940</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49950.html">CVE-2024-49950</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49994.html">CVE-2024-49994</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50029.html">CVE-2024-50029</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50036.html">CVE-2024-50036</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50056.html">CVE-2024-50056</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50073.html">CVE-2024-50073</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50085.html">CVE-2024-50085</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">CVE-2024-50115</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50126.html">CVE-2024-50126</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50140.html">CVE-2024-50140</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50142.html">CVE-2024-50142</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50152.html">CVE-2024-50152</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50185.html">CVE-2024-50185</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50251.html">CVE-2024-50251</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50258.html">CVE-2024-50258</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">CVE-2024-50290</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50294.html">CVE-2024-50294</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50304.html">CVE-2024-50304</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-52559.html">CVE-2024-52559</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53057.html">CVE-2024-53057</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">CVE-2024-53063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53123.html">CVE-2024-53123</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53140.html">CVE-2024-53140</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53147.html">CVE-2024-53147</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53163.html">CVE-2024-53163</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53173.html">CVE-2024-53173</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53176.html">CVE-2024-53176</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53177.html">CVE-2024-53177</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53178.html">CVE-2024-53178</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53226.html">CVE-2024-53226</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53239.html">CVE-2024-53239</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53680.html">CVE-2024-53680</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-54683.html">CVE-2024-54683</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56539.html">CVE-2024-56539</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56548.html">CVE-2024-56548</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56579.html">CVE-2024-56579</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56592.html">CVE-2024-56592</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56605.html">CVE-2024-56605</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56633.html">CVE-2024-56633</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56638.html">CVE-2024-56638</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56640.html">CVE-2024-56640</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56647.html">CVE-2024-56647</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56658.html">CVE-2024-56658</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56702.html">CVE-2024-56702</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56703.html">CVE-2024-56703</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56718.html">CVE-2024-56718</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56719.html">CVE-2024-56719</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56720.html">CVE-2024-56720</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56751.html">CVE-2024-56751</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56758.html">CVE-2024-56758</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56770.html">CVE-2024-56770</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57807.html">CVE-2024-57807</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57834.html">CVE-2024-57834</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57882.html">CVE-2024-57882</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57889.html">CVE-2024-57889</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57900.html">CVE-2024-57900</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57947.html">CVE-2024-57947</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57948.html">CVE-2024-57948</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57973.html">CVE-2024-57973</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57974.html">CVE-2024-57974</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57978.html">CVE-2024-57978</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57979.html">CVE-2024-57979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57980.html">CVE-2024-57980</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57981.html">CVE-2024-57981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57986.html">CVE-2024-57986</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57990.html">CVE-2024-57990</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57993.html">CVE-2024-57993</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57994.html">CVE-2024-57994</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57996.html">CVE-2024-57996</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57997.html">CVE-2024-57997</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57999.html">CVE-2024-57999</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58002.html">CVE-2024-58002</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58005.html">CVE-2024-58005</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58006.html">CVE-2024-58006</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58007.html">CVE-2024-58007</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58009.html">CVE-2024-58009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58011.html">CVE-2024-58011</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58012.html">CVE-2024-58012</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58013.html">CVE-2024-58013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58014.html">CVE-2024-58014</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58017.html">CVE-2024-58017</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58019.html">CVE-2024-58019</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58020.html">CVE-2024-58020</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58034.html">CVE-2024-58034</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58051.html">CVE-2024-58051</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58052.html">CVE-2024-58052</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58054.html">CVE-2024-58054</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58055.html">CVE-2024-58055</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58056.html">CVE-2024-58056</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58057.html">CVE-2024-58057</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58058.html">CVE-2024-58058</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58061.html">CVE-2024-58061</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58063.html">CVE-2024-58063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58069.html">CVE-2024-58069</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58072.html">CVE-2024-58072</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58076.html">CVE-2024-58076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58078.html">CVE-2024-58078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58079.html">CVE-2024-58079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58080.html">CVE-2024-58080</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58083.html">CVE-2024-58083</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58085.html">CVE-2024-58085</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58086.html">CVE-2024-58086</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21631.html">CVE-2025-21631</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21635.html">CVE-2025-21635</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21636.html">CVE-2025-21636</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21637.html">CVE-2025-21637</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21638.html">CVE-2025-21638</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21639.html">CVE-2025-21639</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21640.html">CVE-2025-21640</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21647.html">CVE-2025-21647</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21659.html">CVE-2025-21659</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21665.html">CVE-2025-21665</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21666.html">CVE-2025-21666</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21667.html">CVE-2025-21667</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21668.html">CVE-2025-21668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21669.html">CVE-2025-21669</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21670.html">CVE-2025-21670</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21671.html">CVE-2025-21671</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21673.html">CVE-2025-21673</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21675.html">CVE-2025-21675</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21678.html">CVE-2025-21678</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21680.html">CVE-2025-21680</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21681.html">CVE-2025-21681</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21684.html">CVE-2025-21684</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21687.html">CVE-2025-21687</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21688.html">CVE-2025-21688</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21689.html">CVE-2025-21689</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21690.html">CVE-2025-21690</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21692.html">CVE-2025-21692</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21693.html">CVE-2025-21693</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21697.html">CVE-2025-21697</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21699.html">CVE-2025-21699</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21700.html">CVE-2025-21700</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21701.html">CVE-2025-21701</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21703.html">CVE-2025-21703</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21704.html">CVE-2025-21704</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21705.html">CVE-2025-21705</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21706.html">CVE-2025-21706</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21708.html">CVE-2025-21708</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21711.html">CVE-2025-21711</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21714.html">CVE-2025-21714</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21715.html">CVE-2025-21715</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21716.html">CVE-2025-21716</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21718.html">CVE-2025-21718</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21719.html">CVE-2025-21719</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21723.html">CVE-2025-21723</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21724.html">CVE-2025-21724</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21725.html">CVE-2025-21725</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21726.html">CVE-2025-21726</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21727.html">CVE-2025-21727</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21728.html">CVE-2025-21728</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21731.html">CVE-2025-21731</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21732.html">CVE-2025-21732</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21733.html">CVE-2025-21733</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21734.html">CVE-2025-21734</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21735.html">CVE-2025-21735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21736.html">CVE-2025-21736</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21738.html">CVE-2025-21738</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21739.html">CVE-2025-21739</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21741.html">CVE-2025-21741</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21742.html">CVE-2025-21742</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21743.html">CVE-2025-21743</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21744.html">CVE-2025-21744</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21745.html">CVE-2025-21745</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21749.html">CVE-2025-21749</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21750.html">CVE-2025-21750</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21753.html">CVE-2025-21753</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21754.html">CVE-2025-21754</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21756.html">CVE-2025-21756</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21759.html">CVE-2025-21759</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21760.html">CVE-2025-21760</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21761.html">CVE-2025-21761</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21762.html">CVE-2025-21762</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21763.html">CVE-2025-21763</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21764.html">CVE-2025-21764</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21765.html">CVE-2025-21765</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21766.html">CVE-2025-21766</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21767.html">CVE-2025-21767</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21772.html">CVE-2025-21772</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21773.html">CVE-2025-21773</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21775.html">CVE-2025-21775</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21776.html">CVE-2025-21776</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21779.html">CVE-2025-21779</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21780.html">CVE-2025-21780</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21781.html">CVE-2025-21781</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21782.html">CVE-2025-21782</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21784.html">CVE-2025-21784</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21785.html">CVE-2025-21785</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21790.html">CVE-2025-21790</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21791.html">CVE-2025-21791</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21793.html">CVE-2025-21793</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21794.html">CVE-2025-21794</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21795.html">CVE-2025-21795</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21796.html">CVE-2025-21796</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21799.html">CVE-2025-21799</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21802.html">CVE-2025-21802</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21804.html">CVE-2025-21804</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21810.html">CVE-2025-21810</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21815.html">CVE-2025-21815</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21819.html">CVE-2025-21819</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21820.html">CVE-2025-21820</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21821.html">CVE-2025-21821</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21823.html">CVE-2025-21823</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21825.html">CVE-2025-21825</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21828.html">CVE-2025-21828</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21829.html">CVE-2025-21829</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21830.html">CVE-2025-21830</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21831.html">CVE-2025-21831</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21832.html">CVE-2025-21832</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21835.html">CVE-2025-21835</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21838.html">CVE-2025-21838</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21844.html">CVE-2025-21844</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21846.html">CVE-2025-21846</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21847.html">CVE-2025-21847</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21848.html">CVE-2025-21848</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21850.html">CVE-2025-21850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21855.html">CVE-2025-21855</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21856.html">CVE-2025-21856</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21857.html">CVE-2025-21857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21858.html">CVE-2025-21858</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21859.html">CVE-2025-21859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21861.html">CVE-2025-21861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21862.html">CVE-2025-21862</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21864.html">CVE-2025-21864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21865.html">CVE-2025-21865</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21866.html">CVE-2025-21866</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21869.html">CVE-2025-21869</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21870.html">CVE-2025-21870</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21871.html">CVE-2025-21871</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21876.html">CVE-2025-21876</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21877.html">CVE-2025-21877</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21878.html">CVE-2025-21878</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21883.html">CVE-2025-21883</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21885.html">CVE-2025-21885</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21886.html">CVE-2025-21886</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21888.html">CVE-2025-21888</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21890.html">CVE-2025-21890</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21891.html">CVE-2025-21891</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21892.html">CVE-2025-21892</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52831</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">1.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">1.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52925</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52925</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52925</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52926</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26634</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26634</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26708</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26708</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26810</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26873</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26873</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35826</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-35910</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38606</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-38606</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40980</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-40980</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41005</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41055</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41055</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41077</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41077</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41149</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41149</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-41149</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42307</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-42307</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-43820</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44974</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44974</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-44974</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-45010</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46736</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46736</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46782</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46782</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46796</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46796</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46796</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46858</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46858</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47408</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47408</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47701</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47794</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-47794</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49571</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49571</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49884</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49924</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49940</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49940</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49940</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49950</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49950</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49994</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50029</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50029</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50036</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50036</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50056</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50056</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50056</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50073</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50085</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50085</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50085</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50126</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50126</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50126</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50140</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50140</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50140</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50142</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50142</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50142</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50152</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50152</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50185</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50185</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50251</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50251</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50251</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50258</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50258</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50258</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50294</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50304</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50304</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-52559</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-52559</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53057</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53057</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53123</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53123</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53140</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53140</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53147</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53163</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53163</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53163</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53176</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53176</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53177</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53177</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53177</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53178</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53178</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53680</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53680</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54683</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54683</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54683</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56539</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56539</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56579</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56579</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56579</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56592</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56592</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56633</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56633</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56638</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56638</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56640</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56640</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56640</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56640</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56647</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56647</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56647</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56658</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56658</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56658</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56658</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56702</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56702</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56702</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56703</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.2</span>
<span
class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56703</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56718</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56718</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56718</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56719</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56719</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56719</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56720</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56720</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56720</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56751</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56751</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56751</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56758</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56758</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56758</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56770</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56770</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56770</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57807</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57807</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57807</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57834</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57834</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57882</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57882</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57882</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57889</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57900</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57900</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57900</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57947</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57947</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57973</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57973</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57974</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57978</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57978</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57979</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57980</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57980</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57981</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57986</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57990</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57993</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57996</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57996</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57997</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57999</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58002</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58002</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58005</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58005</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58006</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58007</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58007</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58011</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58012</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58013</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58017</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58019</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58020</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58020</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58034</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58034</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58051</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58052</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58052</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58054</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58055</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58055</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58056</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58057</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58058</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58058</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58061</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58063</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58069</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58072</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58076</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58080</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58080</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58083</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58083</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58085</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58085</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21631</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21631</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21631</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21631</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21636</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21636</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21636</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21637</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21637</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21637</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21638</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21638</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21638</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21639</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21639</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21639</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21640</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21640</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21640</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21647</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21647</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21659</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21659</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21665</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21665</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21666</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21666</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21666</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21667</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21669</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21670</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21670</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21671</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21671</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21671</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21671</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21673</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21673</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21673</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21675</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21675</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21678</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21678</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21680</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21680</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21680</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.2</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21681</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21681</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21684</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21684</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21684</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21687</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21687</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21687</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21688</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21689</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21689</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21689</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21693</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21697</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21697</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21700</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21700</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21700</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21701</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21703</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21703</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21704</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21704</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21705</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21706</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21708</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21708</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21711</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21711</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21711</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21714</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21714</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21715</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21715</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21716</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21716</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21718</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21718</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21718</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21719</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21723</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21723</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21724</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21725</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21726</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21726</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21726</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21727</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21727</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21728</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21731</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21731</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21732</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21733</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21734</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21735</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21736</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21736</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21738</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21738</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21739</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21739</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21741</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21741</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21742</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21742</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21743</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21743</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21744</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21744</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21744</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21745</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21745</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21749</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21750</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21750</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21753</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21753</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21754</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21756</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21756</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21759</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21759</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21760</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21760</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21761</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21761</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21762</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21762</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21763</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21763</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21764</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21764</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21765</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21766</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21767</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21772</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21772</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21773</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21773</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21775</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21775</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21776</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21776</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21776</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21779</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21779</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21780</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21780</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21781</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21782</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21782</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21782</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21784</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21785</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21785</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21785</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21790</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21791</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21791</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21791</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21791</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21793</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21793</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21794</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21794</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21795</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21796</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21796</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21799</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21802</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21804</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21810</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21815</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21819</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21820</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21820</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21821</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21823</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21825</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21828</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21829</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21830</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21831</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21832</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21832</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21835</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21838</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21844</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21844</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21844</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21846</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21846</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21846</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21847</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21847</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21848</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21848</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21855</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21855</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21856</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21856</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21857</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21858</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21858</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21858</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21859</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21861</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21862</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21862</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21864</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21865</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21865</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21866</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21866</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21869</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21870</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21871</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21876</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21877</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21878</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21883</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21885</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21886</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21888</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21890</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21891</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21891</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21892</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Linux
Micro 6.1</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 272 vulnerabilities, contains eight features
and has 91 fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated
to receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-52927: netfilter: allow exp not to be removed in
nf_ct_find_expectation (bsc#1239644).</li>
<li>CVE-2024-26708: mptcp: fix inconsistent state on fastopen race
(bsc#1222672).</li>
<li>CVE-2024-35910: tcp: properly terminate timers for kernel sockets
(bsc#1224489).</li>
<li>CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock
(bsc#1227937).</li>
<li>CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active
(bsc#1227858).</li>
<li>CVE-2024-44974: mptcp: pm: avoid possible UaF when selecting endp
(bsc#1230235).</li>
<li>CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ
req (bsc#1230438).</li>
<li>CVE-2024-45010: mptcp: pm: only mark &#x27;subflow&#x27; endp
as available (bsc#1230439).</li>
<li>CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner
(bsc#1230769).</li>
<li>CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync
(bsc#1231088).</li>
<li>CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving
proposal msg (bsc#1235711).</li>
<li>CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by
freplace kABI workaround (bsc#1235712).</li>
<li>CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt
when receiving proposal msg (bsc#1235733).</li>
<li>CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount
underflow (bsc#1232812).</li>
<li>CVE-2024-50029: Bluetooth: hci_conn: Fix UAF in
hci_enhanced_setup_sync (bsc#1231949).</li>
<li>CVE-2024-50036: net: do not delay dst_entries_add() in dst_release()
(bsc#1231912).</li>
<li>CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in
uvc_v4l2.c (bsc#1232389).</li>
<li>CVE-2024-50085: mptcp: pm: fix UaF read in
mptcp_pm_nl_rm_addr_or_subflow (bsc#1232508).</li>
<li>CVE-2024-50140: net: sched: use RCU read-side critical section in
taprio_dump() (bsc#1233060).</li>
<li>CVE-2024-50142: xfrm: validate new SA&#x27;s prefixlen using SA
family when sel.family is unset (bsc#1233028).</li>
<li>CVE-2024-50185: kABI fix for mptcp: handle consistently DSS
corruption (bsc#1233109).</li>
<li>CVE-2024-50251: netfilter: nft_payload: sanitize offset and length
before calling skb_checksum() (bsc#1233248).</li>
<li>CVE-2024-50258: net: fix crash when config small
gso_max_size/gso_ipv4_max_size (bsc#1233221).</li>
<li>CVE-2024-50294: rxrpc: Fix missing locking causing hanging calls
(bsc#1233483).</li>
<li>CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_find() (bsc#1233522).</li>
<li>CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on
TC_H_ROOT (bsc#1233551).</li>
<li>CVE-2024-53123: mptcp: error out earlier on disconnect
(bsc#1234070).</li>
<li>CVE-2024-53140: netlink: terminate outstanding dump on socket close
(bsc#1234222).</li>
<li>CVE-2024-53147: exfat: fix out-of-bounds access of directory entries
(bsc#1234857).</li>
<li>CVE-2024-53176: smb: During unmount, ensure all cached dir instances
drop their dentry (bsc#1234894).</li>
<li>CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir
error paths (bsc#1234896).</li>
<li>CVE-2024-53178: smb: Do not leak cfid when reconnect races with
open_cached_dir (bsc#1234895).</li>
<li>CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in
ip_vs_protocol_init() (bsc#1235715).</li>
<li>CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
(bsc#1235729).</li>
<li>CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket()
(bsc#1235244).</li>
<li>CVE-2024-56633: selftests/bpf: Add apply_bytes test to
test_txmsg_redir_wait_sndmem in test_sockmap (bsc#1235485).</li>
<li>CVE-2024-56638: kABI fix for &quot;netfilter: nft_inner:
incorrect percpu area handling under softirq&quot; (bsc#1235524).</li>
<li>CVE-2024-56640: net/smc: fix LGR and link use-after-free issue
(bsc#1235436).</li>
<li>CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug
(bsc#1235435).</li>
<li>CVE-2024-56658: net: defer final &#x27;struct net&#x27; free
in netns dismantle (bsc#1235441).</li>
<li>CVE-2024-56702: bpf: Add tracepoints with null-able arguments
(bsc#1235501).</li>
<li>CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high
next hop churn (bsc#1235455).</li>
<li>CVE-2024-56718: net/smc: protect link down work from execute after
lgr freed (bsc#1235589).</li>
<li>CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops
(bsc#1235591).</li>
<li>CVE-2024-56720: bpf, sockmap: Several fixes to bpf_msg_pop_data
(bsc#1235592).</li>
<li>CVE-2024-56751: ipv6: release nexthop on device removal
(bsc#1234936).</li>
<li>CVE-2024-56758: btrfs: check folio mapping after unlock in
relocate_one_folio() (bsc#1235621).</li>
<li>CVE-2024-56770: net/sched: netem: account for backlog updates from
child qdisc (bsc#1235637).</li>
<li>CVE-2024-57882: mptcp: fix TCP options overflow.
(bsc#1235914).</li>
<li>CVE-2024-57900: ila: serialize calls to nf_register_net_hooks()
(bsc#1235973).</li>
<li>CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill
(bsc#1236333).</li>
<li>CVE-2024-57974: udp: Deal with race between UDP socket address change
and rehash (bsc#1238532).</li>
<li>CVE-2024-57979: kABI workaround for pps changes
(bsc#1238521).</li>
<li>CVE-2024-57994: ptr_ring: do not block hard interrupts in
ptr_ring_resize_multiple() (bsc#1237901).</li>
<li>CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit
(bsc#1239076).</li>
<li>CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid
during params (bsc#1239104).</li>
<li>CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP
message queue (bsc#1238997).</li>
<li>CVE-2024-58083: KVM: Explicitly verify target vCPU is online in
kvm_get_vcpu() (bsc#1239036).</li>
<li>CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
current-&gt;nsproxy (bsc#1236111).</li>
<li>CVE-2025-21636: sctp: sysctl: plpmtud_probe_interval: avoid using
current-&gt;nsproxy (bsc#1236113).</li>
<li>CVE-2025-21637: sctp: sysctl: udp_port: avoid using
current-&gt;nsproxy (bsc#1236114).</li>
<li>CVE-2025-21638: sctp: sysctl: auth_enable: avoid using
current-&gt;nsproxy (bsc#1236115).</li>
<li>CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using
current-&gt;nsproxy (bsc#1236122).</li>
<li>CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using
current-&gt;nsproxy (bsc#1236123).</li>
<li>CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow
fairness counts (bsc#1236133).</li>
<li>CVE-2025-21659: netdev: prevent accessing NAPI instances from another
namespace (bsc#1236206).</li>
<li>CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits
(bsc#1236684).</li>
<li>CVE-2025-21666: vsock: prevent null-ptr-deref in
vsock_*[has_data|has_space] (bsc#1236680).</li>
<li>CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32
bits (bsc#1236681).</li>
<li>CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break
condition (bsc#1236682).</li>
<li>CVE-2025-21669: vsock/virtio: discard packets if the transport
changes (bsc#1236683).</li>
<li>CVE-2025-21670: vsock/bpf: return early if transport is not assigned
(bsc#1236685).</li>
<li>CVE-2025-21673: smb: client: fix double free of
TCP_Server_Info::hostname (bsc#1236689).</li>
<li>CVE-2025-21675: net/mlx5: Clear port select structure when fail to
create (bsc#1236694).</li>
<li>CVE-2025-21678: gtp: Destroy device along with udp socket&#x27;s
netns dismantle (bsc#1236698).</li>
<li>CVE-2025-21680: pktgen: Avoid out-of-bounds access in
get_imix_entries (bsc#1236700).</li>
<li>CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev
with carrier (bsc#1236702).</li>
<li>CVE-2025-21687: vfio/platform: check the bounds of read/write
syscalls (bsc#1237045).</li>
<li>CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing
(bsc#1237028).</li>
<li>CVE-2025-21693: mm: zswap: properly synchronize freeing resources
during CPU hotunplug (bsc#1237029).</li>
<li>CVE-2025-21700: net: sched: Disallow replacing of child qdisc from
one parent to another (bsc#1237159).</li>
<li>CVE-2025-21701: net: avoid race between device unregistration and
ethnl ops (bsc#1237164).</li>
<li>CVE-2025-21703: netem: Update sch-&gt;q.qlen before
qdisc_tree_reduce_backlog() (bsc#1237313).</li>
<li>CVE-2025-21705: mptcp: handle fastopen disconnect correctly
(bsc#1238525).</li>
<li>CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp
(bsc#1238528).</li>
<li>CVE-2025-21715: net: davicom: fix UAF in dm9000_drv_remove
(bsc#1237889).</li>
<li>CVE-2025-21716: vxlan: Fix uninit-value in vxlan_vnifilter_dump()
(bsc#1237891).</li>
<li>CVE-2025-21719: ipmr: do not call mr_mfc_uses_dev() for unres entries
(bsc#1238860).</li>
<li>CVE-2025-21724: iommufd/iova_bitmap: Fix shift-out-of-bounds in
iova_bitmap_offset_to_index() (bsc#1238863).</li>
<li>CVE-2025-21725: smb: client: fix oops due to unset link speed
(bsc#1238877).</li>
<li>CVE-2025-21728: bpf: Send signals asynchronously if !preemptible
(bsc#1237879).</li>
<li>CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints
(bsc#1238494).</li>
<li>CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back
(bsc#1238506).</li>
<li>CVE-2025-21753: btrfs: fix use-after-free when attempting to join an
aborted transaction (bsc#1237875).</li>
<li>CVE-2025-21754: btrfs: fix assertion failure when splitting ordered
extent after transaction abort (bsc#1238496).</li>
<li>CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send()
(bsc#1238738).</li>
<li>CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb()
(bsc#1238763).</li>
<li>CVE-2025-21761: openvswitch: use RCU protection in
ovs_vport_cmd_fill_info() (bsc#1238775).</li>
<li>CVE-2025-21762: arp: use RCU protection in arp_xmit()
(bsc#1238780).</li>
<li>CVE-2025-21763: neighbour: use RCU protection in __neigh_notify()
(bsc#1237897).</li>
<li>CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss()
(bsc#1237906).</li>
<li>CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu()
(bsc#1238754).</li>
<li>CVE-2025-21767: clocksource: Use migrate_disable() to avoid calling
get_random_u32() in atomic context (bsc#1238509).</li>
<li>CVE-2025-21790: vxlan: check vxlan_vnigroup_init() return value
(bsc#1238753).</li>
<li>CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out()
(bsc#1238512).</li>
<li>CVE-2025-21795: NFSD: fix hang in nfsd4_shutdown_callback
(bsc#1238759).</li>
<li>CVE-2025-21799: net: ethernet: ti: am65-cpsw: fix freeing IRQ in
am65_cpsw_nuss_remove_tx_chns() (bsc#1238739).</li>
<li>CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling
(bsc#1238751).</li>
<li>CVE-2025-21825: selftests/bpf: Add test case for the freeing of
bpf_timer (bsc#1238971).</li>
<li>CVE-2025-21844: smb: client: Add check for next_buffer in
receive_encrypted_standard() (bsc#1239512).</li>
<li>CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
(bsc#1239479).</li>
<li>CVE-2025-21856: s390/ism: add release function for struct device
(bsc#1239486).</li>
<li>CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL
dereference (bsc#1239478).</li>
<li>CVE-2025-21861: mm/migrate_device: do not add folio to be freed to
LRU in migrate_device_finalize() (bsc#1239483).</li>
<li>CVE-2025-21862: drop_monitor: fix incorrect initialization order
(bsc#1239474).</li>
<li>CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we
currently drop (bsc#1239482).</li>
<li>CVE-2025-21865: gtp: Suppress list corruption splat in
gtp_net_exit_batch_rtnl() (bsc#1239481).</li>
<li>CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up
ALH copiers (bsc#1240191).</li>
<li>CVE-2025-21871: tee: optee: Fix supplicant wait loop
(bsc#1240183).</li>
<li>CVE-2025-21883: ice: Fix deinitializing VF in error path
(bsc#1240189).</li>
<li>CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc()
(bsc#1240173).</li>
<li>CVE-2025-21891: ipvlan: ensure network headers are in skb linear part
(bsc#1240186).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: PRM: Remove unnecessary strict handler address checks
(git-fixes).</li>
<li>ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states
are invalid (bsc#1237530).</li>
<li>ACPI: property: Fix return value for nval == 0 in
acpi_data_prop_read() (git-fixes).</li>
<li>ACPI: resource: IRQ override for Eluktronics MECH-17
(stable-fixes).</li>
<li>ACPI: x86: Add skip i2c clients quirk for Vexia EDU ATLA 10 tablet 5V
(stable-fixes).</li>
<li>ALSA: hda/cirrus: Correct the full scale volume set logic
(git-fixes).</li>
<li>ALSA: hda/conexant: Add quirk for HP ProBook 450 G4 mute LED
(stable-fixes).</li>
<li>ALSA: hda/realtek - add supported Mic Mute LED for Lenovo platform
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx
(stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using
CS35L41 HDA (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using
CS35L41 HDA (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using
CS35L41 HDA (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using
CS35L41 HDA (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using
CS35L41 HDA (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops
using CS35L41 HDA (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for various ASUS Laptops using CS35L41
HDA (stable-fixes).</li>
<li>ALSA: hda/realtek: Add support for various HP Laptops using CS35L41
HDA (stable-fixes).</li>
<li>ALSA: hda/realtek: Always honor no_shutup_pins
(git-fixes).</li>
<li>ALSA: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes).</li>
<li>ALSA: hda/realtek: Fix built-in mic assignment on ASUS VivoBook
X515UA (git-fixes).</li>
<li>ALSA: hda/realtek: Fix microphone regression on ASUS N705UD
(git-fixes).</li>
<li>ALSA: hda/realtek: Fix wrong mic setup for ASUS VivoBook 15
(git-fixes).</li>
<li>ALSA: hda/realtek: Fixup ALC225 depop procedure
(git-fixes).</li>
<li>ALSA: hda/realtek: Limit mic boost on Positivo ARN50
(stable-fixes).</li>
<li>ALSA: hda/realtek: Remove (revert) duplicate Ally X config
(git-fixes).</li>
<li>ALSA: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx
(stable-fixes).</li>
<li>ALSA: hda/realtek: update ALC222 depop optimize
(stable-fixes).</li>
<li>ALSA: hda: Add error check for snd_ctl_rename_id() in
snd_hda_create_dig_out_ctls() (git-fixes).</li>
<li>ALSA: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0
(stable-fixes).</li>
<li>ALSA: hda: intel: Add Dell ALC3271 to power_save denylist
(stable-fixes).</li>
<li>ALSA: hda: realtek: fix incorrect IS_REACHABLE() usage
(git-fixes).</li>
<li>ALSA: pcm: Drop superfluous NULL check in
snd_pcm_format_set_silence() (git-fixes).</li>
<li>ALSA: seq: Avoid module auto-load handling at event delivery
(stable-fixes).</li>
<li>ALSA: seq: Drop UMP events when no UMP-conversion is set
(git-fixes).</li>
<li>ALSA: seq: Make dependency on UMP clearer (git-fixes).</li>
<li>ALSA: seq: remove redundant &#x27;tristate&#x27; for
SND_SEQ_UMP_CLIENT (stable-fixes).</li>
<li>ALSA: usb-audio: Add quirk for Plantronics headsets to fix control
names (stable-fixes).</li>
<li>ALSA: usb-audio: Avoid dropping MIDI events at closing multiple ports
(git-fixes).</li>
<li>ALSA: usb-audio: Re-add sample rate quirk for Pioneer DJM-900NXS2
(stable-fixes).</li>
<li>ALSA: usb-audio: separate DJM-A9 cap lvl options
(git-fixes).</li>
<li>ALSA: usx2y: validate nrpacks module parameter on probe
(git-fixes).</li>
<li>APEI: GHES: Have GHES honor the panic= setting
(stable-fixes).</li>
<li>ASoC: Intel: avs: Abstract IPC handling (stable-fixes).</li>
<li>ASoC: Intel: avs: Do not readq() u32 registers
(git-fixes).</li>
<li>ASoC: Intel: avs: Prefix SKL/APL-specific members
(stable-fixes).</li>
<li>ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet
5V (stable-fixes).</li>
<li>ASoC: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module
(stable-fixes).</li>
<li>ASoC: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE
(stable-fixes).</li>
<li>ASoC: SOF: pcm: Clear the susbstream pointer to NULL on close
(git-fixes).</li>
<li>ASoC: SOF: stream-ipc: Check for cstream nullity in
sof_ipc_msg_data() (git-fixes).</li>
<li>ASoC: amd: Add ACPI dependency to fix build error
(stable-fixes).</li>
<li>ASoC: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model
(stable-fixes).</li>
<li>ASoC: arizona/madera: use fsleep() in up/down DAPM event delays
(stable-fixes).</li>
<li>ASoC: codecs: wm0010: Fix error handling path in wm0010_spi_probe()
(git-fixes).</li>
<li>ASoC: cs35l41: check the return value from spi_setup()
(git-fixes).</li>
<li>ASoC: es8328: fix route from DAC to output (git-fixes).</li>
<li>ASoC: fsl_micfil: Enable default case in micfil_set_quality()
(git-fixes).</li>
<li>ASoC: ops: Consistently treat platform_max as control value
(git-fixes).</li>
<li>ASoC: rockchip: i2s-tdm: fix shift config for SND_SOC_DAIFMT_DSP_[AB]
(git-fixes).</li>
<li>ASoC: rt722-sdca: add missing readable registers
(git-fixes).</li>
<li>ASoC: tas2764: Fix power control mask (stable-fixes).</li>
<li>ASoC: tas2764: Set the SDOUT polarity correctly
(stable-fixes).</li>
<li>ASoC: tas2770: Fix volume scale (stable-fixes).</li>
<li>ASoC: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio
compatible (git-fixes).</li>
<li>Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()
(git-fixes).</li>
<li>Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name()
(git-fixes).</li>
<li>Bluetooth: Fix error code in chan_alloc_skb_cb()
(git-fixes).</li>
<li>Bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel
(git-fixes).</li>
<li>Bluetooth: Improve setsockopt() handling of malformed user input
(git-fixes).</li>
<li>Bluetooth: L2CAP: Fix L2CAP_ECRED_CONN_RSP response
(git-fixes).</li>
<li>Bluetooth: MGMT: Fix slab-use-after-free Read in
mgmt_remove_adv_monitor_sync (stable-fixes).</li>
<li>Bluetooth: hci_event: Fix connection regression between LE and non-LE
adapters (git-fixes).</li>
<li>Bluetooth: hci_event: Fix enabling passive scanning
(git-fixes).</li>
<li>Documentation: qat: fix auto_reset attribute details
(git-fixes).</li>
<li>Documentation: qat: fix auto_reset section (git-fixes).</li>
<li>Drivers: hv: vmbus: Do not release fb_mmio resource in
vmbus_free_mmio() (git-fixes).</li>
<li>Fix memory-hotplug regression (bsc#1237504)</li>
<li>Grab mm lock before grabbing pt lock (git-fixes).</li>
<li>HID: Enable playstation driver independently of sony driver
(git-fixes).</li>
<li>HID: Wacom: Add PCI Wacom device support (stable-fixes).</li>
<li>HID: apple: disable Fn key handling on the Omoton KB066
(git-fixes).</li>
<li>HID: apple: fix up the F6 key on the Omoton KB066 keyboard
(stable-fixes).</li>
<li>HID: appleir: Fix potential NULL dereference at raw event handle
(git-fixes).</li>
<li>HID: google: fix unused variable warning under !CONFIG_ACPI
(git-fixes).</li>
<li>HID: hid-apple: Apple Magic Keyboard a3203 USB-C support
(stable-fixes).</li>
<li>HID: hid-steam: Add Deck IMU support (stable-fixes).</li>
<li>HID: hid-steam: Add gamepad-only mode switched to by holding options
(stable-fixes).</li>
<li>HID: hid-steam: Avoid overwriting smoothing parameter
(stable-fixes).</li>
<li>HID: hid-steam: Clean up locking (stable-fixes).</li>
<li>HID: hid-steam: Disable watchdog instead of using a heartbeat
(stable-fixes).</li>
<li>HID: hid-steam: Do not use cancel_delayed_work_sync in IRQ context
(git-fixes).</li>
<li>HID: hid-steam: Fix cleanup in probe() (git-fixes).</li>
<li>HID: hid-steam: Fix use-after-free when detaching device
(git-fixes).</li>
<li>HID: hid-steam: Make sure rumble work is canceled on removal
(stable-fixes).</li>
<li>HID: hid-steam: Move hidraw input (un)registering to work
(git-fixes).</li>
<li>HID: hid-steam: Update list of identifiers from SDL
(stable-fixes).</li>
<li>HID: hid-steam: remove pointless error message
(stable-fixes).</li>
<li>HID: hid-thrustmaster: fix stack-out-of-bounds read in
usb_check_int_endpoints() (git-fixes).</li>
<li>HID: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system
suspend (stable-fixes).</li>
<li>HID: ignore non-functional sensor in HP 5MP Camera
(stable-fixes).</li>
<li>HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
(git-fixes).</li>
<li>HID: intel-ish-hid: Send clock sync message immediately after reset
(stable-fixes).</li>
<li>HID: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell
(stable-fixes).</li>
<li>HID: multitouch: Add NULL check in mt_input_configured
(git-fixes).</li>
<li>HID: remove superfluous (and wrong) Makefile entry for
CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes).</li>
<li>HID: topre: Fix n-key rollover on Realforce R3S TKL boards
(stable-fixes).</li>
<li>IB/mad: Check available slots before posting receive WRs
(git-fixes)</li>
<li>IB/mlx5: Set and get correct qp_num for a DCT QP
(git-fixes)</li>
<li>Input: ads7846 - fix gpiod allocation (git-fixes).</li>
<li>Input: allocate keycode for phone linking (stable-fixes).</li>
<li>Input: i8042 - add required quirks for missing old boardnames
(stable-fixes).</li>
<li>Input: i8042 - swap old quirk combination with new quirk for NHxxRZQ
(stable-fixes).</li>
<li>Input: i8042 - swap old quirk combination with new quirk for more
devices (stable-fixes).</li>
<li>Input: i8042 - swap old quirk combination with new quirk for several
devices (stable-fixes).</li>
<li>Input: iqs7222 - add support for Azoteq IQS7222D
(git-fixes).</li>
<li>Input: iqs7222 - add support for IQS7222D v1.1 and v1.2
(git-fixes).</li>
<li>Input: iqs7222 - preserve system status register
(git-fixes).</li>
<li>Input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE
controllers (stable-fixes).</li>
<li>Input: xpad - add multiple supported devices
(stable-fixes).</li>
<li>Input: xpad - add support for TECNO Pocket Go
(stable-fixes).</li>
<li>Input: xpad - add support for ZOTAC Gaming Zone
(stable-fixes).</li>
<li>Input: xpad - rename QH controller to Legion Go S
(stable-fixes).</li>
<li>KVM: VMX: Allow toggling bits in MSR_IA32_RTIT_CTL when enable bit is
cleared (git-fixes).</li>
<li>KVM: VMX: Fix comment of handle_vmx_instruction()
(git-fixes).</li>
<li>KVM: VMX: reset the segment cache after segment init in
vmx_vcpu_reset() (jsc#PED-348 git-fixes).</li>
<li>KVM: arm64: Do not eagerly teardown the vgic on init error
(git-fixes).</li>
<li>KVM: arm64: Ensure vgic_ready() is ordered against MMIO registration
(git-fixes).</li>
<li>KVM: arm64: Fix alignment of kvm_hyp_memcache allocations
(git-fixes).</li>
<li>KVM: arm64: Flush hyp bss section after initialization of variables
in bss (git-fixes).</li>
<li>KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state
(git-fixes)</li>
<li>KVM: arm64: vgic-v3: Sanitise guest writes to GICR_INVLPIR
(git-fixes).</li>
<li>KVM: nSVM: Enter guest mode before initializing nested NPT MMU
(git-fixes).</li>
<li>KVM: nVMX: Treat vpid01 as current if L2 is active, but with VPID
disabled (jsc#PED-348 git-fixes).</li>
<li>KVM: s390: vsie: fix some corner-cases when grabbing vsie pages
(git-fixes bsc#1237155).</li>
<li>KVM: x86/mmu: Skip the &quot;try unsync&quot; path iff the
old SPTE was a leaf SPTE (git-fixes).</li>
<li>KVM: x86: AMD&#x27;s IBPB is not equivalent to Intel&#x27;s
IBPB (git-fixes).</li>
<li>KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4
on VMX (git-fixes).</li>
<li>KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace
(git-fixes).</li>
<li>KVM: x86: Avoid double RDPKRU when loading host/guest PKRU
(git-fixes).</li>
<li>KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init
(git-fixes).</li>
<li>KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit()
(git-fixes).</li>
<li>KVM: x86: Reject Hyper-V&#x27;s SEND_IPI hypercalls if local APIC
isn&#x27;t in-kernel (git-fixes).</li>
<li>KVM: x86: Unconditionally set irr_pending when updating APICv state
(jsc#PED-348).</li>
<li>KVM: x86: Zero out PV features cache when the CPUID leaf is not
present (git-fixes).</li>
<li>Move upstreamed ACPI patch into sorted section</li>
<li>Move upstreamed PCI and initramfs patches into sorted
section</li>
<li>Move upstreamed nfsd and sunrpc patches into sorted
section</li>
<li>Move upstreamed powerpc and SCSI patches into sorted
section</li>
<li>PCI/ACS: Fix &#x27;pci=config_acs=&#x27; parameter
(git-fixes).</li>
<li>PCI/ASPM: Fix link state exit during switch upstream function removal
(git-fixes).</li>
<li>PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req()
(bsc#1237853)</li>
<li>PCI/DOE: Support discovery version 2 (bsc#1237853)</li>
<li>PCI/DPC: Quirk PIO log size for Intel Raptor Lake-P
(stable-fixes).</li>
<li>PCI/portdrv: Only disable pciehp interrupts early when needed
(git-fixes).</li>
<li>PCI: Avoid reset when disabled via sysfs (git-fixes).</li>
<li>PCI: Fix reference leak in pci_alloc_child_bus()
(git-fixes).</li>
<li>PCI: Remove stray put_device() in pci_register_host_bridge()
(git-fixes).</li>
<li>PCI: Use downstream bridges for distributing resources
(bsc#1237325).</li>
<li>PCI: brcmstb: Fix error path after a call to regulator_bulk_get()
(git-fixes).</li>
<li>PCI: brcmstb: Fix missing of_node_put() in brcm_pcie_probe()
(git-fixes).</li>
<li>PCI: brcmstb: Fix potential premature regulator disabling
(git-fixes).</li>
<li>PCI: brcmstb: Set generation limit before PCIe link up
(git-fixes).</li>
<li>PCI: brcmstb: Use internal register to change link capability
(git-fixes).</li>
<li>PCI: cadence-ep: Fix the driver to send MSG TLP for INTx without data
payload (git-fixes).</li>
<li>PCI: dwc: ep: Return -ENOMEM for allocation failures
(git-fixes).</li>
<li>PCI: hookup irq_get_affinity callback (bsc#1236896).</li>
<li>PCI: imx6: Simplify clock handling by using clk_bulk*() function
(git-fixes).</li>
<li>PCI: pciehp: Do not enable HPIE when resuming in poll mode
(git-fixes).</li>
<li>PCI: switchtec: Add Microchip PCI100X device IDs
(stable-fixes).</li>
<li>PCI: xilinx-cpm: Fix IRQ domain leak in error path of probe
(git-fixes).</li>
<li>PM: sleep: Adjust check before setting power.must_resume
(git-fixes).</li>
<li>PM: sleep: Fix handling devices with direct_complete set on errors
(git-fixes).</li>
<li>RAS: Avoid build errors when CONFIG_DEBUG_FS=n
(jsc#PED-7619).</li>
<li>RDMA/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx
(git-fixes)</li>
<li>RDMA/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path
(git-fixes)</li>
<li>RDMA/bnxt_re: Fix the page details for the srq created by kernel
consumers (git-fixes)</li>
<li>RDMA/bnxt_re: Fix the statistics for Gen P7 VF (git-fixes)</li>
<li>RDMA/core: Do not expose hw_counters outside of init net namespace
(git-fixes)</li>
<li>RDMA/efa: Reset device on probe failure (git-fixes)</li>
<li>RDMA/erdma: Prevent use-after-free in erdma_accept_newconn()
(git-fixes)</li>
<li>RDMA/hns: Fix a missing rollback in error path of
hns_roce_create_qp_common() (git-fixes)</li>
<li>RDMA/hns: Fix mbox timing out by adding retry mechanism
(git-fixes)</li>
<li>RDMA/hns: Fix missing xa_destroy() (git-fixes)</li>
<li>RDMA/hns: Fix soft lockup during bt pages loop (git-fixes)</li>
<li>RDMA/hns: Fix unmatched condition in error path of alloc_user_qp_db()
(git-fixes)</li>
<li>RDMA/hns: Fix wrong value of max_sge_rd (git-fixes)</li>
<li>RDMA/mana_ib: Allocate PAGE aligned doorbell index
(git-fixes).</li>
<li>RDMA/mana_ib: Prefer struct_size over open coded arithmetic
(bsc#1239016).</li>
<li>RDMA/mlx5: Fix AH static rate parsing (git-fixes)</li>
<li>RDMA/mlx5: Fix MR cache initialization error flow
(git-fixes)</li>
<li>RDMA/mlx5: Fix a WARN during dereg_mr for DM type
(git-fixes)</li>
<li>RDMA/mlx5: Fix a race for DMABUF MR which can lead to CQE with error
(git-fixes)</li>
<li>RDMA/mlx5: Fix bind QP error cleanup flow (git-fixes)</li>
<li>RDMA/mlx5: Fix cache entry update on dereg error
(git-fixes)</li>
<li>RDMA/mlx5: Fix calculation of total invalidated pages
(git-fixes)</li>
<li>RDMA/mlx5: Fix implicit ODP hang on parent deregistration
(git-fixes)</li>
<li>RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
(git-fixes)</li>
<li>RDMA/mlx5: Fix the recovery flow of the UMR QP (git-fixes)</li>
<li>RDMA/mlx5: Handle errors returned from mlx5r_ib_rate()
(git-fixes)</li>
<li>RDMA/rxe: Fix the failure of ibv_query_device() and
ibv_query_device_ex() tests (git-fixes)</li>
<li>RDMA/rxe: Improve newline in printing messages (git-fixes)</li>
<li>Reapply &quot;wifi: ath11k: restore country code during
resume&quot; (bsc#1207948).</li>
<li>Revert &quot;blk-throttle: Fix IO hang for a corner
case&quot; (git-fixes).</li>
<li>Revert &quot;dm: requeue IO if mapping table not yet
available&quot; (git-fixes).</li>
<li>Revert &quot;drivers/card_reader/rtsx_usb: Restore interrupt
based detection&quot; (git-fixes).</li>
<li>Revert &quot;drm/amd/display: Use HW lock mgr for PSR1&quot;
(stable-fixes).</li>
<li>Revert &quot;leds-pca955x: Remove the unused function
pca95xx_num_led_regs()&quot; (stable-fixes).</li>
<li>Revert &quot;wifi: ath11k: restore country code during
resume&quot; (bsc#1207948).</li>
<li>Revert &quot;wifi: ath11k: support hibernation&quot;
(bsc#1207948).</li>
<li>SUNRPC: Handle -ETIMEDOUT return from tlshd (git-fixes).</li>
<li>SUNRPC: Prevent looping due to rpc_signal_task() races
(git-fixes).</li>
<li>SUNRPC: convert RPC_TASK_* constants to enum (git-fixes).</li>
<li>UPSTREAM: tcp: fix DSACK undo in fast recovery to call
tcp_try_to_open() (git-fixes).</li>
<li>USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone
(stable-fixes).</li>
<li>USB: Fix the issue of task recovery failure caused by USB status when
S4 wakes up (git-fixes).</li>
<li>USB: cdc-acm: Fill in Renesas R-Car D3 USB Download mode quirk
(git-fixes).</li>
<li>USB: gadget: f_midi: f_midi_complete to call queue_work
(git-fixes).</li>
<li>USB: hub: Ignore non-compliant devices with too many configs or
interfaces (stable-fixes).</li>
<li>USB: pci-quirks: Fix HCCPARAMS register error for LS7A EHCI
(stable-fixes).</li>
<li>USB: quirks: add USB_QUIRK_NO_LPM quirk for Teclast dist
(stable-fixes).</li>
<li>USB: serial: ftdi_sio: add support for Altera USB Blaster 3
(stable-fixes).</li>
<li>USB: serial: option: add MeiG Smart SLM828 (stable-fixes).</li>
<li>USB: serial: option: add Telit Cinterion FE990B compositions
(stable-fixes).</li>
<li>USB: serial: option: add Telit Cinterion FN990B compositions
(stable-fixes).</li>
<li>USB: serial: option: drop MeiG Smart defines
(stable-fixes).</li>
<li>USB: serial: option: fix Telit Cinterion FE990A name
(stable-fixes).</li>
<li>USB: serial: option: fix Telit Cinterion FN990A name
(stable-fixes).</li>
<li>USB: serial: option: match on interface class for Telit FN990B
(stable-fixes).</li>
<li>Update &quot;drm/mgag200: Added support for the new device
G200eH5&quot; (jsc#PED-12094)</li>
<li>Use gcc-13 for build on SLE16 (jsc#PED-10028).</li>
<li>accel/qaic: Fix integer overflow in qaic_validate_req()
(git-fixes).</li>
<li>accel/qaic: Fix possible data corruption in BOs &gt; 2G
(git-fixes).</li>
<li>acct: block access to kernel internal filesystems
(git-fixes).</li>
<li>acct: perform last write from workqueue (git-fixes).</li>
<li>add nf_tables for iptables non-legacy network handling.</li>
<li>af_packet: do not call packet_read_pending() from
tpacket_destruct_skb() (bsc#1237849).</li>
<li>af_unix: Annotate data-race of sk-&gt;sk_state in
unix_stream_read_skb() (bsc#1239435).</li>
<li>af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash
(bsc#1239435).</li>
<li>af_unix: Remove put_pid()/put_cred() in copy_peercred()
(bsc#1240334).</li>
<li>amdgpu/pm/legacy: fix suspend/resume issues (git-fixes).</li>
<li>arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes)</li>
<li>arm64: Handle .ARM.attributes section in linker scripts
(git-fixes)</li>
<li>arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array
(git-fixes)</li>
<li>arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes)</li>
<li>arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to
(git-fixes)</li>
<li>arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply
(git-fixes)</li>
<li>arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi
(git-fixes)</li>
<li>arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board
(git-fixes)</li>
<li>arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes)</li>
<li>arm64: dts: rockchip: Remove bluetooth node from rock-3a
(git-fixes)</li>
<li>arm64: dts: rockchip: Remove undocumented sdmmc property from
(git-fixes)</li>
<li>arm64: dts: rockchip: add rs485 support on uart5 of
(git-fixes)</li>
<li>arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou
(git-fixes)</li>
<li>arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou
(git-fixes)</li>
<li>arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe
(git-fixes)</li>
<li>arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list
(git-fixes)</li>
<li>arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected()
(git-fixes)</li>
<li>arm64: errata: Assume that unknown CPUs <em>are</em>
vulnerable to Spectre (git-fixes)</li>
<li>arm64: hugetlb: Fix flush_hugetlb_tlb_range() invalidation level
(git-fixes)</li>
<li>arm64: hugetlb: Fix huge_ptep_get_and_clear() for non-present ptes
(git-fixes)</li>
<li>arm64: hugetlb: enable __HAVE_ARCH_FLUSH_HUGETLB_TLB_RANGE
(git-fixes)</li>
<li>arm64: mm: Populate vmemmap at the page level if not section aligned
(git-fixes)</li>
<li>arm64: tegra: Remove the Orin NX/Nano suspend key
(git-fixes)</li>
<li>ata: ahci: Add mask_port_map module parameter (git-fixes).</li>
<li>ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf
(git-fixes).</li>
<li>ata: libata-scsi: Remove redundant sense_buffer memsets
(git-fixes).</li>
<li>ata: libata-sff: Ensure that we cannot write outside the allocated
buffer (stable-fixes).</li>
<li>ata: libata: Fix NCQ Non-Data log not supported print
(git-fixes).</li>
<li>ata: pata_parport: add custom version of wait_after_reset
(git-fixes).</li>
<li>ata: pata_parport: fit3: implement IDE command set registers
(git-fixes).</li>
<li>ata: pata_serverworks: Do not use the term blacklist
(git-fixes).</li>
<li>ata: sata_highbank: fix OF node reference leak in
highbank_initialize_phys() (git-fixes).</li>
<li>ata: sata_sil: Rename sil_blacklist to sil_quirks
(git-fixes).</li>
<li>auxdisplay: panel: Fix an API misuse in panel.c
(git-fixes).</li>
<li>backlight: led_bl: Hold led_access lock when calling
led_sysfs_disable() (git-fixes).</li>
<li>batman-adv: Drop unmanaged ELP metric worker (git-fixes).</li>
<li>batman-adv: Ignore neighbor throughput metrics in error case
(stable-fixes).</li>
<li>batman-adv: Ignore own maximum aggregation size during RX
(git-fixes).</li>
<li>batman-adv: fix panic during interface removal
(git-fixes).</li>
<li>bio-integrity: do not restrict the size of integrity metadata
(git-fixes).</li>
<li>bitmap: introduce generic optimized bitmap_size()
(git-fixes).</li>
<li>blk-cgroup: Fix class @block_class&#x27;s subsystem refcount
leakage (bsc#1237558).</li>
<li>blk-cgroup: Properly propagate the iostat update up the hierarchy
(bsc#1225606).</li>
<li>blk-iocost: Avoid using clamp() on inuse in __propagate_weights()
(git-fixes).</li>
<li>blk-mq: Make blk_mq_quiesce_tagset() hold the tag list mutex less
long (git-fixes).</li>
<li>blk-mq: add number of queue calc helper (bsc#1236897).</li>
<li>blk-mq: create correct map for fallback case
(bsc#1236896).</li>
<li>blk-mq: do not count completed flush data request as inflight in case
of quiesce (git-fixes).</li>
<li>blk-mq: introduce blk_mq_map_hw_queues (bsc#1236896).</li>
<li>blk-mq: issue warning when offlining hctx with online isolcpus
(bsc#1236897).</li>
<li>blk-mq: move cpuhp callback registering out of q-&gt;sysfs_lock
(git-fixes).</li>
<li>blk-mq: register cpuhp callback after hctx is added to xarray table
(git-fixes).</li>
<li>blk-mq: use hk cpus only when isolcpus=managed_irq is enabled
(bsc#1236897).</li>
<li>blk_iocost: remove some duplicate irq disable/enables
(git-fixes).</li>
<li>block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()
(git-fixes).</li>
<li>block: Clear zone limits for a non-zoned stacked queue
(git-fixes).</li>
<li>block: Fix elevator_get_default() checking for NULL q-&gt;tag_set
(git-fixes).</li>
<li>block: Fix lockdep warning in blk_mq_mark_tag_wait
(git-fixes).</li>
<li>block: Fix page refcounts for unaligned buffers in
__bio_release_pages() (git-fixes).</li>
<li>block: Provide bdev_open_* functions (git-fixes).</li>
<li>block: Remove special-casing of compound pages
(git-fixes).</li>
<li>block: Set memalloc_noio to false on device_add_disk() error path
(git-fixes).</li>
<li>block: add a disk_has_partscan helper (git-fixes).</li>
<li>block: add a partscan sysfs attribute for disks
(git-fixes).</li>
<li>block: add check of &#x27;minors&#x27; and
&#x27;first_minor&#x27; in device_add_disk() (git-fixes).</li>
<li>block: avoid to reuse <code>hctx</code> not removed from
cpuhp callback list (git-fixes).</li>
<li>block: change rq_integrity_vec to respect the iterator
(git-fixes).</li>
<li>block: cleanup and fix batch completion adding conditions
(git-fixes).</li>
<li>block: copy back bounce buffer to user-space correctly in case of
split (git-fixes).</li>
<li>block: do not revert iter for -EIOCBQUEUED (git-fixes).</li>
<li>block: ensure we hold a queue reference when using queue limits
(git-fixes).</li>
<li>block: fix and simplify blkdevparts= cmdline parsing
(git-fixes).</li>
<li>block: fix bio_split_rw_at to take zone_write_granularity into
account (git-fixes).</li>
<li>block: fix integer overflow in BLKSECDISCARD (git-fixes).</li>
<li>block: fix missing dispatching request when queue is started or
unquiesced (git-fixes).</li>
<li>block: fix ordering between checking BLK_MQ_S_STOPPED request adding
(git-fixes).</li>
<li>block: fix ordering between checking QUEUE_FLAG_QUIESCED request
adding (git-fixes).</li>
<li>block: fix sanity checks in blk_rq_map_user_bvec
(git-fixes).</li>
<li>block: propagate partition scanning errors to the BLKRRPART ioctl
(git-fixes).</li>
<li>block: remove the blk_flush_integrity call in
blk_integrity_unregister (git-fixes).</li>
<li>block: retry call probe after request_module in blk_request_module
(git-fixes).</li>
<li>block: return unsigned int from bdev_io_min (git-fixes).</li>
<li>block: sed-opal: avoid possible wrong address reference in
read_sed_opal_key() (git-fixes).</li>
<li>block: support to account io_ticks precisely (git-fixes).</li>
<li>block: use the right type for stub rq_integrity_vec()
(git-fixes).</li>
<li>bluetooth: btusb: Initialize .owner field of force_poll_sync_fops
(git-fixes).</li>
<li>bnxt_en: Fix possible memory leak when hwrm_req_replace fails
(git-fixes).</li>
<li>bnxt_en: Refactor bnxt_ptp_init() (git-fixes).</li>
<li>bnxt_en: Unregister PTP during PCI shutdown and suspend
(git-fixes).</li>
<li>bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie
(git-fixes).</li>
<li>bpf: Fix a verifier verbose message (git-fixes).</li>
<li>bpf: Replace bpf_lpm_trie_key 0-length array with flexible array
(git-fixes).</li>
<li>bpf: Use -Wno-error in certain tests when building with GCC
(git-fixes).</li>
<li>bpf: prevent r10 register from being marked as precise
(git-fixes).</li>
<li>broadcom: fix supported flag check in periodic output function
(git-fixes).</li>
<li>btrfs: check delayed refs when we&#x27;re checking if a ref
exists (bsc#1239605).</li>
<li>btrfs: do not use btrfs_bio_ctrl for extent buffer writing
(bsc#1239045).</li>
<li>btrfs: drop the backref cache during relocation if we commit
(bsc#1239605).</li>
<li>btrfs: fix defrag not merging contiguous extents due to merged extent
maps (bsc#1237232).</li>
<li>btrfs: fix extent map merging not happening for adjacent extents
(bsc#1237232).</li>
<li>btrfs: remove the mirror_num argument to btrfs_submit_compressed_read
(bsc#1239045).</li>
<li>btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage
(bsc#1239045).</li>
<li>btrfs: use a separate end_io handler for extent_buffer writing
(bsc#1239045).</li>
<li>bus: mhi: host: Fix race between unprepare and queue_buf
(git-fixes).</li>
<li>bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid
deadlock (git-fixes).</li>
<li>bus: qcom-ssc-block-bus: Fix the error handling path of
qcom_ssc_block_bus_probe() (git-fixes).</li>
<li>bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls
(git-fixes).</li>
<li>bus: simple-pm-bus: fix forced runtime PM use (git-fixes).</li>
<li>can: c_can: fix unbalanced runtime PM disable in error path
(git-fixes).</li>
<li>can: ctucanfd: handle skb allocation failure (git-fixes).</li>
<li>can: etas_es58x: fix potential NULL pointer dereference on
udev-&gt;serial (git-fixes).</li>
<li>can: flexcan: disable transceiver during system PM
(git-fixes).</li>
<li>can: flexcan: only change CAN state when link up in system PM
(git-fixes).</li>
<li>can: j1939: j1939_sk_send_loop(): fix unable to send messages with
data length zero (git-fixes).</li>
<li>can: rcar_canfd: Fix page entries in the AFL list
(git-fixes).</li>
<li>can: ucan: fix out of bound read in strscpy() source
(git-fixes).</li>
<li>cdx: Fix possible UAF error in driver_override_show()
(git-fixes).</li>
<li>char: misc: deallocate static minor in error path
(git-fixes).</li>
<li>chelsio/chtls: prevent potential integer overflow on 32bit
(git-fixes).</li>
<li>cifs: Fix parsing reparse point with native symlink in SMB1
non-UNICODE session (git-fixes).</li>
<li>cifs: Remove intermediate object of failed create reparse call
(git-fixes).</li>
<li>cifs: commands that are retried should have replay flag set
(bsc#1231432).</li>
<li>cifs: fix potential null pointer use in destroy_workqueue in
init_cifs error path (bsc#1231432).</li>
<li>cifs: helper function to check replayable error codes
(bsc#1231432).</li>
<li>cifs: new mount option called retrans (bsc#1231432).</li>
<li>cifs: open_cached_dir should not rely on primary channel
(bsc#1231432).</li>
<li>cifs: open_cached_dir(): add FILE_READ_EA to desired access
(git-fixes).</li>
<li>cifs: update desired access while requesting for directory lease
(git-fixes).</li>
<li>cifs: update the same create_guid on replay (git-fixes).</li>
<li>clk: mediatek: mt2701-aud: fix conversion to mtk_clk_simple_probe
(git-fixes).</li>
<li>clk: mediatek: mt2701-bdp: add missing dummy clk
(git-fixes).</li>
<li>clk: mediatek: mt2701-img: add missing dummy clk
(git-fixes).</li>
<li>clk: mediatek: mt2701-mm: add missing dummy clk
(git-fixes).</li>
<li>clk: mediatek: mt2701-vdec: fix conversion to mtk_clk_simple_probe
(git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: fix alpha mode configuration
(git-fixes).</li>
<li>clk: qcom: clk-rpmh: prevent integer overflow in recalc_rate
(git-fixes).</li>
<li>clk: qcom: dispcc-sm6350: Add missing parent_map for a clock
(git-fixes).</li>
<li>clk: qcom: gcc-mdm9607: Fix cmd_rcgr offset for blsp1_uart6 rcg
(git-fixes).</li>
<li>clk: qcom: gcc-sm6350: Add missing parent_map for two clocks
(git-fixes).</li>
<li>clk: qcom: gcc-sm8550: Do not turn off PCIe GDSCs during
gdsc_disable() (git-fixes).</li>
<li>clk: sunxi-ng: a100: enable MMC clock reparenting
(git-fixes).</li>
<li>clockevents/drivers/i8253: Fix stop sequence for timer 0
(git-fixes).</li>
<li>config: Set gcc version (jsc#PED-12251).</li>
<li>coredump: Fixes core_pipe_limit sysctl proc_handler
(git-fixes).</li>
<li>cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged
(bsc#1237856)</li>
<li>cpu/hotplug: Do not offline the last non-isolated CPU
(bsc#1237562).</li>
<li>cpu/hotplug: Prevent self deadlock on CPU hot-unplug
(bsc#1237562).</li>
<li>cpufreq/amd-pstate: Fix max_perf updation with schedutil
(bsc#1239707).</li>
<li>cpufreq/cppc: Do not compare desired_perf in target()
(bsc#1237856)</li>
<li>cpufreq/cppc: Move and rename (bsc#1237856)</li>
<li>cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create
(bsc#1237856)</li>
<li>cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error
(bsc#1237856)</li>
<li>cpufreq: imx6q: Do not disable 792 Mhz OPP unnecessarily
(git-fixes).</li>
<li>cpufreq: imx6q: do not warn for disabling a non-existing frequency
(git-fixes).</li>
<li>cpufreq: mediatek-hw: Do not error out if supply is not found
(git-fixes).</li>
<li>cpufreq: mediatek-hw: Wait for CPU supplies before probing
(git-fixes).</li>
<li>cpufreq: qcom-nvmem: Enable virtual power domain devices
(git-fixes).</li>
<li>cpufreq: qcom-nvmem: Simplify driver data allocation
(stable-fixes).</li>
<li>cpufreq: qcom-nvmem: add support for IPQ8064 (git-fixes).</li>
<li>cpufreq: qcom-nvmem: drop pvs_ver for format a fuses
(git-fixes).</li>
<li>cpufreq: qcom-nvmem: fix memory leaks in probe error paths
(git-fixes).</li>
<li>cpufreq: qcom-nvmem: use SoC ID-s from bindings
(git-fixes).</li>
<li>cpufreq: qcom-nvmem: use helper to get SMEM SoC ID
(git-fixes).</li>
<li>cpufreq: qcom: Fix qcom_cpufreq_hw_recalc_rate() to query LUT if LMh
IRQ is not available (git-fixes).</li>
<li>cpufreq: qcom: Implement clk_ops::determine_rate() for qcom_cpufreq*
clocks (git-fixes).</li>
<li>cpufreq: s3c64xx: Fix compilation warning (stable-fixes).</li>
<li>cpumask: add cpumask_weight_andnot() (bsc#1239015).</li>
<li>cpumask: define cleanup function for cpumasks
(bsc#1239015).</li>
<li>crypto: ccp - Fix check for the primary ASP device
(git-fixes).</li>
<li>crypto: ccp - Fix uAPI definitions of PSP errors
(git-fixes).</li>
<li>crypto: hisilicon/sec2 - fix for aead auth key length
(git-fixes).</li>
<li>crypto: hisilicon/sec2 - fix for aead authsize alignment
(git-fixes).</li>
<li>crypto: hisilicon/sec2 - fix for aead icv error
(git-fixes).</li>
<li>crypto: hisilicon/sec2 - fix for aead invalid authsize
(git-fixes).</li>
<li>crypto: hisilicon/sec2 - fix for sec spec check
(git-fixes).</li>
<li>crypto: hisilicon/sec2 - optimize the error return process
(stable-fixes).</li>
<li>crypto: iaa - Add global_stats file and remove individual stat files
(jsc#PED-12416).</li>
<li>crypto: iaa - Change desc-&gt;priv to 0
(jsc#PED-12416).</li>
<li>crypto: iaa - Change iaa statistics to atomic64_t
(jsc#PED-12416).</li>
<li>crypto: iaa - Fix comp/decomp delay statistics
(jsc#PED-12416).</li>
<li>crypto: iaa - Remove comp/decomp delay statistics
(jsc#PED-12416).</li>
<li>crypto: iaa - Remove header table code (jsc#PED-12416).</li>
<li>crypto: iaa - Remove potential infinite loop in check_completion()
(jsc#PED-12416).</li>
<li>crypto: iaa - Remove unnecessary debugfs_create_dir() error check in
iaa_crypto_debugfs_init() (jsc#PED-12416).</li>
<li>crypto: iaa - Remove unneeded newline in
update_max_adecomp_delay_ns() (jsc#PED-12416).</li>
<li>crypto: iaa - Test the correct request flag (git-fixes).</li>
<li>crypto: iaa - Use cpumask_weight() when rebalancing
(jsc#PED-12416).</li>
<li>crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
(jsc#PED-12416).</li>
<li>crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416).</li>
<li>crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags
(jsc#PED-12416).</li>
<li>crypto: iaa - remove unneeded semicolon (jsc#PED-12416).</li>
<li>crypto: nx - Fix uninitialised hv_nxc on error
(git-fixes).</li>
<li>crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
(jsc#PED-12416).</li>
<li>crypto: qat - Constify struct pm_status_row
(jsc#PED-12416).</li>
<li>crypto: qat - Fix missing destroy_workqueue in adf_init_aer()
(jsc#PED-12416).</li>
<li>crypto: qat - Fix spelling mistake &quot;Invalide&quot;
-&gt; &quot;Invalid&quot; (jsc#PED-12416).</li>
<li>crypto: qat - Fix typo &quot;accelaration&quot;
(jsc#PED-12416).</li>
<li>crypto: qat - Fix typo (jsc#PED-12416).</li>
<li>crypto: qat - Remove trailing space after \n newline
(jsc#PED-12416).</li>
<li>crypto: qat - Use static_assert() to check struct sizes
(jsc#PED-12416).</li>
<li>crypto: qat - add admin msgs for telemetry
(jsc#PED-12416).</li>
<li>crypto: qat - add auto reset on error (jsc#PED-12416).</li>
<li>crypto: qat - add bank save and restore flows
(jsc#PED-12416).</li>
<li>crypto: qat - add fatal error notification
(jsc#PED-12416).</li>
<li>crypto: qat - add fatal error notify method
(jsc#PED-12416).</li>
<li>crypto: qat - add heartbeat error simulator
(jsc#PED-12416).</li>
<li>crypto: qat - add interface for live migration
(jsc#PED-12416).</li>
<li>crypto: qat - add support for 420xx devices
(jsc#PED-12416).</li>
<li>crypto: qat - add support for device telemetry
(jsc#PED-12416).</li>
<li>crypto: qat - add support for ring pair level telemetry
(jsc#PED-12416).</li>
<li>crypto: qat - adf_get_etr_base() helper (jsc#PED-12416).</li>
<li>crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416).</li>
<li>crypto: qat - avoid memcpy() overflow warning
(jsc#PED-12416).</li>
<li>crypto: qat - change signature of uof_get_num_objs()
(jsc#PED-12416).</li>
<li>crypto: qat - disable arbitration before reset
(jsc#PED-12416).</li>
<li>crypto: qat - ensure correct order in VF restarting handler
(jsc#PED-12416).</li>
<li>crypto: qat - expand CSR operations for QAT GEN4 devices
(jsc#PED-12416).</li>
<li>crypto: qat - fix &quot;Full Going True&quot; macro
definition (jsc#PED-12416).</li>
<li>crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
(jsc#PED-12416).</li>
<li>crypto: qat - fix comment structure (jsc#PED-12416).</li>
<li>crypto: qat - fix linking errors when PCI_IOV is disabled
(jsc#PED-12416).</li>
<li>crypto: qat - fix recovery flow for VFs (jsc#PED-12416).</li>
<li>crypto: qat - fix ring to service map for dcc in 420xx
(jsc#PED-12416).</li>
<li>crypto: qat - generate dynamically arbiter mappings
(jsc#PED-12416).</li>
<li>crypto: qat - implement dh fallback for primes &gt; 4K
(jsc#PED-12416).</li>
<li>crypto: qat - implement interface for live migration
(jsc#PED-12416).</li>
<li>crypto: qat - improve aer error reset handling
(jsc#PED-12416).</li>
<li>crypto: qat - improve error message in adf_get_arbiter_mapping()
(jsc#PED-12416).</li>
<li>crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416).</li>
<li>crypto: qat - initialize user_input.lock for rate_limiting
(jsc#PED-12416).</li>
<li>crypto: qat - limit heartbeat notifications
(jsc#PED-12416).</li>
<li>crypto: qat - make adf_ctl_class constant (jsc#PED-12416).</li>
<li>crypto: qat - make ring to service map common for QAT GEN4
(jsc#PED-12416).</li>
<li>crypto: qat - move PFVF compat checker to a function
(jsc#PED-12416).</li>
<li>crypto: qat - move fw config related structures
(jsc#PED-12416).</li>
<li>crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416).</li>
<li>crypto: qat - re-enable sriov after pf reset
(jsc#PED-12416).</li>
<li>crypto: qat - relocate CSR access code (jsc#PED-12416).</li>
<li>crypto: qat - relocate and rename 4xxx PF2VM definitions
(jsc#PED-12416).</li>
<li>crypto: qat - relocate portions of qat_4xxx code
(jsc#PED-12416).</li>
<li>crypto: qat - remove access to parity register for QAT GEN4
(git-fixes).</li>
<li>crypto: qat - remove unnecessary description from comment
(jsc#PED-12416).</li>
<li>crypto: qat - remove unused adf_devmgr_get_first
(jsc#PED-12416).</li>
<li>crypto: qat - rename get_sla_arr_of_type()
(jsc#PED-12416).</li>
<li>crypto: qat - set parity error mask for qat_420xx
(git-fixes).</li>
<li>crypto: qat - uninitialized variable in adf_hb_error_inject_write()
(jsc#PED-12416).</li>
<li>crypto: qat - update PFVF protocol for recovery
(jsc#PED-12416).</li>
<li>crypto: qat - use kcalloc_node() instead of kzalloc_node()
(jsc#PED-12416).</li>
<li>crypto: qat - validate slices count returned by FW
(jsc#PED-12416).</li>
<li>crypto: qat/qat_420xx - fix off by one in uof_get_name()
(jsc#PED-12416).</li>
<li>cxgb4: Avoid removal of uninserted tid (git-fixes).</li>
<li>cxgb4: use port number to set mac addr (git-fixes).</li>
<li>devlink: avoid potential loop in devlink_rel_nested_in_notify_work()
(bsc#1237234).</li>
<li>dlm: fix srcu_read_lock() return type to int (git-fixes).</li>
<li>dlm: prevent NPD when writing a positive value to event_done
(git-fixes).</li>
<li>dm array: fix cursor index when skipping across block boundaries
(git-fixes).</li>
<li>dm array: fix unreleased btree blocks on closing a faulty array
cursor (git-fixes).</li>
<li>dm init: Handle minors larger than 255 (git-fixes).</li>
<li>dm integrity: fix out-of-range warning (git-fixes).</li>
<li>dm persistent data: fix memory allocation failure
(git-fixes).</li>
<li>dm resume: do not return EINVAL when signalled
(git-fixes).</li>
<li>dm suspend: return -ERESTARTSYS instead of -EINTR
(git-fixes).</li>
<li>dm thin: Add missing destroy_work_on_stack() (git-fixes).</li>
<li>dm-crypt: do not update io-&gt;sector after
kcryptd_crypt_write_io_submit() (git-fixes).</li>
<li>dm-crypt: track tag_offset in convert_context (git-fixes).</li>
<li>dm-delay: fix hung task introduced by kthread mode
(git-fixes).</li>
<li>dm-delay: fix max_delay calculations (git-fixes).</li>
<li>dm-delay: fix workqueue delay_timer race (git-fixes).</li>
<li>dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY
(git-fixes).</li>
<li>dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature
(git-fixes).</li>
<li>dm-integrity: align the outgoing bio in integrity_recheck
(git-fixes).</li>
<li>dm-integrity: fix a race condition when accessing recalc_sector
(git-fixes).</li>
<li>dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume
(git-fixes).</li>
<li>dm-unstriped: cast an operand to sector_t to prevent potential
uint32_t overflow (git-fixes).</li>
<li>dm-verity FEC: Fix RS FEC repair for roots unaligned to block size
(take 2) (git-fixes).</li>
<li>dm: Fix typo in error message (git-fixes).</li>
<li>dma: kmsan: export kmsan_handle_dma() for modules
(git-fixes).</li>
<li>doc/README.SUSE: Point to the updated version of LKMPG</li>
<li>doc: update managed_irq documentation (bsc#1236897).</li>
<li>driver core: Remove needless return in void API device_remove_group()
(git-fixes).</li>
<li>driver core: bus: add irq_get_affinity callback to bus_type
(bsc#1236896).</li>
<li>drivers: core: fix device leak in __fw_devlink_relax_cycles()
(git-fixes).</li>
<li>drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in
pmcmd_ioctl (git-fixes).</li>
<li>drm/amd/display: Assign normalized_pix_clk when color depth = 14
(stable-fixes).</li>
<li>drm/amd/display: Disable PSR-SU on eDP panels
(stable-fixes).</li>
<li>drm/amd/display: Disable unneeded hpd interrupts during dm_init
(stable-fixes).</li>
<li>drm/amd/display: Fix HPD after gpu reset (stable-fixes).</li>
<li>drm/amd/display: Fix Mode Cutoff in DSC Passthrough to DP2.1 Monitor
(stable-fixes).</li>
<li>drm/amd/display: Fix null check for pipe_ctx-&gt;plane_state in
resource_build_scaling_params (git-fixes).</li>
<li>drm/amd/display: Fix slab-use-after-free on hdcp_work
(git-fixes).</li>
<li>drm/amd/display: Restore correct backlight brightness after a GPU
reset (stable-fixes).</li>
<li>drm/amd/display: Use HW lock mgr for PSR1 when only one eDP
(git-fixes).</li>
<li>drm/amd/display: avoid NPD when ASIC does not support DMUB
(git-fixes).</li>
<li>drm/amd/display: fix type mismatch in
CalculateDynamicMetadataParameters() (git-fixes).</li>
<li>drm/amd/pm: Mark MM activity as unsupported
(stable-fixes).</li>
<li>drm/amdgpu/umsch: declare umsch firmware (git-fixes).</li>
<li>drm/amdgpu: Check extended configuration space register when system
uses large bar (stable-fixes).</li>
<li>drm/amdgpu: Fix JPEG video caps max size for navi1x and raven
(stable-fixes).</li>
<li>drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size
(stable-fixes).</li>
<li>drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to
avoid Priority Inversion in SRIOV (git-fixes).</li>
<li>drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
(stable-fixes).</li>
<li>drm/amdgpu: bail out when failed to load fw in
psp_init_cap_microcode() (git-fixes).</li>
<li>drm/amdgpu: disable BAR resize on Dell G5 SE (git-fixes).</li>
<li>drm/amdgpu: fix UVD contiguous CS mapping problem
(bsc#1236759).</li>
<li>drm/amdkfd: Fix Circular Locking Dependency in
&#x27;svm_range_cpu_invalidate_pagetables&#x27; (git-fixes).</li>
<li>drm/amdkfd: only flush the validate MES contex
(stable-fixes).</li>
<li>drm/atomic: Filter out redundant DPMS calls
(stable-fixes).</li>
<li>drm/bridge: Fix spelling mistake &quot;gettin&quot; -&gt;
&quot;getting&quot; (git-fixes).</li>
<li>drm/bridge: it6505: Change definition MAX_HDCP_DOWN_STREAM_COUNT
(stable-fixes).</li>
<li>drm/bridge: it6505: fix HDCP Bstatus check (stable-fixes).</li>
<li>drm/bridge: it6505: fix HDCP CTS KSV list wait timer
(stable-fixes).</li>
<li>drm/bridge: it6505: fix HDCP CTS compare V matching
(stable-fixes).</li>
<li>drm/bridge: it6505: fix HDCP V match check is not performed correctly
(git-fixes).</li>
<li>drm/bridge: it6505: fix HDCP encryption when R0 ready
(stable-fixes).</li>
<li>drm/bridge: ti-sn65dsi86: Fix multiple instances
(git-fixes).</li>
<li>drm/dp_mst: Fix drm RAD print (git-fixes).</li>
<li>drm/dp_mst: Fix locking when skipping CSN before topology probing
(git-fixes).</li>
<li>drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data()
(git-fixes).</li>
<li>drm/hyperv: Fix address space leak when Hyper-V DRM device is removed
(git-fixes).</li>
<li>drm/i915/cdclk: Do cdclk post plane programming later
(stable-fixes).</li>
<li>drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL
(git-fixes).</li>
<li>drm/i915/dp: Fix error handling during 128b/132b link training
(stable-fixes).</li>
<li>drm/i915/dp: Iterate DSC BPP from high to low on all platforms
(git-fixes).</li>
<li>drm/i915/dsi: Use TRANS_DDI_FUNC_CTL&#x27;s own port width macro
(git-fixes).</li>
<li>drm/i915/guc: Debug print LRC state entries only if the context is
pinned (git-fixes).</li>
<li>drm/i915/pmu: Fix zero delta busyness issue (git-fixes).</li>
<li>drm/i915/selftests: avoid using uninitialized context
(git-fixes).</li>
<li>drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes).</li>
<li>drm/i915: Drop 64bpp YUV formats from ICL+ SDR planes
(stable-fixes).</li>
<li>drm/i915: Fix page cleanup on DMA remap failure
(git-fixes).</li>
<li>drm/i915: Make sure all planes in use by the joiner have their crtc
included (stable-fixes).</li>
<li>drm/komeda: Add check for komeda_get_layer_fourcc_list()
(git-fixes).</li>
<li>drm/mediatek: dp: drm_err =&gt; dev_err in HPD path to avoid NULL
ptr (git-fixes).</li>
<li>drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer()
(git-fixes).</li>
<li>drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member
(git-fixes).</li>
<li>drm/mediatek: mtk_hdmi: Unregister audio platform device on failure
(git-fixes).</li>
<li>drm/mgag200: Added support for the new device G200eH5
(jsc#PED-12094)</li>
<li>drm/modeset: Handle tiled displays in pan_display_atomic
(stable-fixes).</li>
<li>drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump
(git-fixes).</li>
<li>drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes).</li>
<li>drm/msm/dpu: Disable dither in phys encoder cleanup
(git-fixes).</li>
<li>drm/msm/dpu: Do not leak bits_per_component into random DSC_ENC
fields (git-fixes).</li>
<li>drm/msm/dpu: do not use active in atomic_check()
(git-fixes).</li>
<li>drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host
(git-fixes).</li>
<li>drm/msm/dsi: Use existing per-interface slice count in DSC timing
(git-fixes).</li>
<li>drm/msm/gem: Demote userspace errors to DRM_UT_DRIVER
(stable-fixes).</li>
<li>drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit()
(git-fixes).</li>
<li>drm/msm: Avoid rounding up to one jiffy (git-fixes).</li>
<li>drm/nouveau/pmu: Fix gp10b firmware guard (git-fixes).</li>
<li>drm/nouveau: Do not override forced connector status
(stable-fixes).</li>
<li>drm/panel: ilitek-ili9882t: fix GPIO name in error message
(git-fixes).</li>
<li>drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables
(git-fixes).</li>
<li>drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M
(stable-fixes).</li>
<li>drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()
(git-fixes).</li>
<li>drm/repaper: fix integer overflows in repeat functions
(git-fixes).</li>
<li>drm/rockchip: move output interface related definition to
rockchip_drm_drv.h (stable-fixes).</li>
<li>drm/rockchip: vop2: Fix the windows switch between different layers
(git-fixes).</li>
<li>drm/rockchip: vop2: Set YUV/RGB overlay mode
(stable-fixes).</li>
<li>drm/rockchip: vop2: include rockchip_drm_drv.h
(git-fixes).</li>
<li>drm/rockchip: vop2: set bg dly and prescan dly at vop2_post_config
(stable-fixes).</li>
<li>drm/sched: Fix fence reference count leak (git-fixes).</li>
<li>drm/sched: Fix preprocessor guard (git-fixes).</li>
<li>drm/ssd130x: Set SPI .id_table to prevent an SPI core warning
(git-fixes).</li>
<li>drm/ssd130x: ensure ssd132x pitch is correct (git-fixes).</li>
<li>drm/ssd130x: fix ssd132x encoding (git-fixes).</li>
<li>drm/v3d: Do not run jobs that have errors flagged in its fence
(git-fixes).</li>
<li>drm/virtio: New fence for every plane update
(stable-fixes).</li>
<li>drm/vkms: Fix use after free and double free on init error
(git-fixes).</li>
<li>drm/vkms: Round fixp2int conversion in lerp_u16
(stable-fixes).</li>
<li>drm: xlnx: zynqmp: Fix max dma segment size (git-fixes).</li>
<li>dummycon: fix default rows/cols (git-fixes).</li>
<li>eeprom: digsy_mtc: Make GPIO lookup table match the device
(git-fixes).</li>
<li>efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32
(bsc#1239349).</li>
<li>efi: Avoid cold plugged memory for placing the kernel
(stable-fixes).</li>
<li>efi: libstub: Use &#x27;-std=gnu11&#x27; to fix build with
GCC 15 (stable-fixes).</li>
<li>eth: gve: use appropriate helper to set xdp_features
(git-fixes).</li>
<li>exfat: convert to ctime accessor functions (git-fixes).</li>
<li>exfat: do not zero the extended part (bsc#1237356).</li>
<li>exfat: fix appending discontinuous clusters to empty file
(bsc#1237356).</li>
<li>exfat: fix file being changed by unaligned direct write
(git-fixes).</li>
<li>exfat: fix timing of synchronizing bitmap and inode
(bsc#1237356).</li>
<li>exfat: fix zero the unwritten part for dio read
(git-fixes).</li>
<li>fbdev: au1100fb: Move a variable assignment behind a null pointer
check (git-fixes).</li>
<li>fbdev: omap: use threaded IRQ for LCD DMA (stable-fixes).</li>
<li>fbdev: pxafb: Fix possible use after free in pxafb_task()
(stable-fixes).</li>
<li>fbdev: sm501fb: Add some geometry checks (git-fixes).</li>
<li>firmware: arm_ffa: Explicitly cast return value from FFA_VERSION
before comparison (git-fixes).</li>
<li>firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo()
(git-fixes).</li>
<li>firmware: cs_dsp: Remove async regmap writes (git-fixes).</li>
<li>firmware: imx-scu: fix OF node leak in .probe()
(git-fixes).</li>
<li>firmware: iscsi_ibft: fix ISCSI_IBFT Kconfig entry
(git-fixes).</li>
<li>flow_dissector: use RCU protection to fetch dev_net()
(bsc#1239994).</li>
<li>futex: Do not include process MM in futex key on no-MMU
(git-fixes).</li>
<li>gpio: aggregator: protect driver attr handlers against module unload
(git-fixes).</li>
<li>gpio: bcm-kona: Add missing newline to dev_err format string
(git-fixes).</li>
<li>gpio: bcm-kona: Fix GPIO lock/unlock for banks above bank 0
(git-fixes).</li>
<li>gpio: bcm-kona: Make sure GPIO bits are unlocked when requesting IRQ
(git-fixes).</li>
<li>gpio: pca953x: Improve interrupt support (git-fixes).</li>
<li>gpio: rcar: Fix missing of_node_put() call (git-fixes).</li>
<li>gpio: rcar: Use raw_spinlock to protect register access
(stable-fixes).</li>
<li>gpio: stmpe: Check return value of stmpe_reg_read in
stmpe_gpio_irq_sync_unlock (git-fixes).</li>
<li>gpiolib: acpi: Add a quirk for Acer Nitro ANV14
(stable-fixes).</li>
<li>gpu: drm_dp_cec: fix broken CEC adapter properties check
(git-fixes).</li>
<li>gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU
(git-fixes).</li>
<li>gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp()
(git-fixes).</li>
<li>gup: make the stack expansion warning a bit more targeted
(bsc#1238214).</li>
<li>hfs: Sanity check the root record (git-fixes).</li>
<li>hwmon: (ad7314) Validate leading zero bits and return error
(git-fixes).</li>
<li>hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table
(git-fixes).</li>
<li>hwmon: (pmbus) Initialise page count in pmbus_identify()
(git-fixes).</li>
<li>hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe()
(git-fixes).</li>
<li>i2c: Force ELAN06FA touchpad I2C bus freq to 100KHz
(stable-fixes).</li>
<li>i2c: ali1535: Fix an error handling path in ali1535_probe()
(git-fixes).</li>
<li>i2c: ali15x3: Fix an error handling path in ali15x3_probe()
(git-fixes).</li>
<li>i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq
(git-fixes).</li>
<li>i2c: ls2x: Fix frequency division register access
(git-fixes).</li>
<li>i2c: npcm: disable interrupt enable bit before devm_request_irq
(git-fixes).</li>
<li>i2c: omap: fix IRQ storms (git-fixes).</li>
<li>i2c: sis630: Fix an error handling path in sis630_probe()
(git-fixes).</li>
<li>i3c: Add NULL pointer check in i3c_master_queue_ibi()
(git-fixes).</li>
<li>i3c: master: svc: Fix missing the IBI rules (git-fixes).</li>
<li>i3c: master: svc: Use readsb helper for reading MDB
(git-fixes).</li>
<li>iavf: allow changing VLAN state without calling PF
(git-fixes).</li>
<li>ice: Remove and readd netdev during devlink reload (bsc#1230497
bsc#1239518).</li>
<li>ice: Skip PTP HW writes during PTP reset procedure
(git-fixes).</li>
<li>ice: add ice_adapter for shared data across PFs on the same NIC
(bsc#1237415).</li>
<li>ice: avoid the PTP hardware semaphore in gettimex64 path
(bsc#1237415).</li>
<li>ice: check ICE_VSI_DOWN under rtnl_lock when preparing for reset
(git-fixes).</li>
<li>ice: fix incorrect PHY settings for 100 GB/s (git-fixes).</li>
<li>ice: fix max values for dpll pin phase adjust (git-fixes).</li>
<li>ice: fold ice_ptp_read_time into ice_ptp_gettimex64
(bsc#1237415).</li>
<li>ice: gather page_count()&#x27;s of each frag right before XDP
prog call (git-fixes).</li>
<li>ice: pass VSI pointer into ice_vc_isvalid_q_id (bsc#1237848
bsc#1230497).</li>
<li>ice: put Rx buffers after being done with current frame
(git-fixes).</li>
<li>ice: stop storing XDP verdict within ice_rx_buf
(git-fixes).</li>
<li>ice: use internal pf id instead of function number
(git-fixes).</li>
<li>idpf: add read memory barrier when checking descriptor done bit
(git-fixes).</li>
<li>idpf: call set_real_num_queues in idpf_open (bsc#1236661).</li>
<li>idpf: convert workqueues to unbound (git-fixes).</li>
<li>idpf: fix VF dynamic interrupt ctl register initialization
(git-fixes).</li>
<li>idpf: fix handling rsc packet with a single segment
(git-fixes).</li>
<li>igc: Fix HW RX timestamp when passed by ZC XDP
(git-fixes).</li>
<li>igc: Set buffer type for empty frames in igc_init_empty_frame
(git-fixes).</li>
<li>igc: return early when failing to read EECD register
(git-fixes).</li>
<li>iio: accel: mma8452: Ensure error return on failure to matching
oversampling ratio (git-fixes).</li>
<li>iio: accel: msa311: Fix failure to release runtime pm if direct mode
claim fails (git-fixes).</li>
<li>iio: adc: ad4130: Fix comparison of channel setups
(git-fixes).</li>
<li>iio: adc: ad7124: Fix comparison of channel configs
(git-fixes).</li>
<li>iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value
(git-fixes).</li>
<li>iio: dac: ad3552r: clear reset status flag (git-fixes).</li>
<li>iio: filter: admv8818: Force initialization of SDO
(git-fixes).</li>
<li>include/linux/mmzone.h: clean up watermark accessors
(bsc#1239600).</li>
<li>include: net: add static inline dst_dev_overhead() to dst.h
(git-fixes).</li>
<li>init: add initramfs_internal.h (bsc#1232848).</li>
<li>initcall_blacklist: Does not allow kernel_lockdown be blacklisted
(bsc#1237521).</li>
<li>initramfs: allocate heap buffers together (bsc#1232848).</li>
<li>initramfs: fix hardlink hash leak without TRAILER
(bsc#1232848).</li>
<li>intel_idle: Add ibrs_off module parameter to force-disable IBRS
(git-fixes).</li>
<li>intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs()
(git-fixes).</li>
<li>intel_th: pci: Add Arrow Lake support (stable-fixes).</li>
<li>intel_th: pci: Add Panther Lake-H support (stable-fixes).</li>
<li>intel_th: pci: Add Panther Lake-P/U support
(stable-fixes).</li>
<li>ioam6: improve checks on user data (git-fixes).</li>
<li>iommu/arm-smmu-v3: Clean up more on probe failure
(stable-fixes).</li>
<li>iommu/vt-d: Fix suspicious RCU usage (git-fixes).</li>
<li>ipv4: add RCU protection to ip4_dst_hoplimit()
(bsc#1239994).</li>
<li>ipv4: use RCU protection in inet_select_addr()
(bsc#1239994).</li>
<li>ipv4: use RCU protection in ip_dst_mtu_maybe_forward()
(bsc#1239994).</li>
<li>ipv4: use RCU protection in ipv4_default_advmss()
(bsc#1239994).</li>
<li>ipv4: use RCU protection in rt_is_expired() (bsc#1239994).</li>
<li>ipv6: Ensure natural alignment of const ipv6 loopback and router
addresses (git-fixes).</li>
<li>ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw()
(git-fixes).</li>
<li>ipv6: Set errno after ip_fib_metrics_init() in
ip6_route_info_create() (git-fixes).</li>
<li>ipv6: Use RCU in ip6_input() (bsc#1239994).</li>
<li>ipv6: annotate data-races around cnf.disable_ipv6
(git-fixes).</li>
<li>ipv6: avoid atomic fragment on GSO packets (git-fixes).</li>
<li>ipv6: fib6_rules: flush route cache when rule is changed
(git-fixes).</li>
<li>ipv6: fib: hide unused &#x27;pn&#x27; variable
(git-fixes).</li>
<li>ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes).</li>
<li>ipv6: fix potential NULL deref in fib6_add() (git-fixes).</li>
<li>ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).</li>
<li>ipv6: introduce dst_rt6_info() helper (git-fixes).</li>
<li>ipv6: ioam: block BH from ioam6_output() (git-fixes).</li>
<li>ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid
(git-fixes).</li>
<li>ipv6: remove hard coded limitation on ipv6_pinfo
(git-fixes).</li>
<li>ipv6: sr: add missing seg6_local_exit (git-fixes).</li>
<li>ipv6: sr: block BH in seg6_output_core() and seg6_input_core()
(git-fixes).</li>
<li>ipv6: take care of scope when choosing the src addr
(git-fixes).</li>
<li>jfs: add check read-only before truncation in jfs_truncate_nolock()
(git-fixes).</li>
<li>jfs: add check read-only before txBeginAnon() call
(git-fixes).</li>
<li>jfs: add index corruption check to DT_GETPAGE()
(git-fixes).</li>
<li>jfs: fix slab-out-of-bounds read in ea_get() (git-fixes).</li>
<li>jfs: reject on-disk inodes of an unsupported type
(git-fixes).</li>
<li>kABI fix for RDMA/core: Do not expose hw_counters outside
(git-fixes)</li>
<li>kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo
(git-fixes).</li>
<li>kABI fix for net: ipv6: support reporting otherwise unknown prefix
flags in RTM_NEWPREFIX (git-fixes).</li>
<li>kABI fix for netlink: terminate outstanding dump on socket close
(git-fixes).</li>
<li>kABI fix for tcp: fix cookie_init_timestamp() overflows
(git-fixes).</li>
<li>kABI fix for tcp: replace tcp_time_stamp_raw()
(git-fixes).</li>
<li>kABI workaround for intel-ish-hid (git-fixes).</li>
<li>kABI workaround for soc_mixer_control changes (git-fixes).</li>
<li>kabi: fix bus type (bsc#1236896).</li>
<li>kabi: fix group_cpus_evenly (bsc#1236897).</li>
<li>kabi: hide adding RCU head into struct netdev_name_node
(bsc#1233749).</li>
<li>kasan: do not call find_vm_area() in a PREEMPT_RT kernel
(git-fixes).</li>
<li>kbuild: hdrcheck: fix cross build with clang (git-fixes).</li>
<li>kbuild: userprogs: fix bitsize and target detection on clang
(git-fixes).</li>
<li>kernel-source: Also replace bin/env</li>
<li>kunit: qemu_configs: sparc: use Zilog console (git-fixes).</li>
<li>l2tp: fix ICMP error handling for UDP-encap sockets
(git-fixes).</li>
<li>l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt()
function (git-fixes).</li>
<li>l2tp: fix lockdep splat (git-fixes).</li>
<li>leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs
(git-fixes).</li>
<li>leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs
(git-fixes).</li>
<li>lib/group_cpus: honor housekeeping config when grouping CPUs
(bsc#1236897).</li>
<li>lib/group_cpus: let group_cpu_evenly return number initialized masks
(bsc#1236897).</li>
<li>lib/iov_iter: fix import_iovec_ubuf iovec management
(git-fixes).</li>
<li>lib: 842: Improve error handling in sw842_compress()
(git-fixes).</li>
<li>lib: stackinit: hide never-taken branch from compiler
(stable-fixes).</li>
<li>lockdep: Do not disable interrupts on RT in
disable_irq_nosync_lockdep.*() (git-fixes).</li>
<li>lockdep: Fix upper limit for LOCKDEP_*_BITS configs
(stable-fixes).</li>
<li>lockdep: fix deadlock issue between lockdep and rcu
(git-fixes).</li>
<li>locking/lockdep: Avoid creating new name string literals in
lockdep_set_subclass() (git-fixes).</li>
<li>locking/rwsem: Add __always_inline annotation to
__down_write_common() and inlined callers (git-fixes).</li>
<li>loop: do not set QUEUE_FLAG_NOMERGES (git-fixes).</li>
<li>md/md-bitmap: Add missing destroy_work_on_stack()
(git-fixes).</li>
<li>md/md-bitmap: add &#x27;sync_size&#x27; into struct
md_bitmap_stats (git-fixes).</li>
<li>md/md-bitmap: replace md_bitmap_status() with a new helper
md_bitmap_get_stats() (git-fixes).</li>
<li>md/md-cluster: fix spares warnings for __le64 (git-fixes).</li>
<li>md/raid0: do not free conf on raid0_run failure
(git-fixes).</li>
<li>md/raid1: do not free conf on raid0_run failure
(git-fixes).</li>
<li>md/raid5: Wait sync io to finish before changing group cnt
(git-fixes).</li>
<li>md: Do not flush sync_work in md_write_start()
(git-fixes).</li>
<li>md: convert comma to semicolon (git-fixes).</li>
<li>mdacon: rework dependency list (git-fixes).</li>
<li>media: cxd2841er: fix 64-bit division on gcc-9
(stable-fixes).</li>
<li>media: dvb: mb86a16: check the return value of mb86a16_read()
(git-fixes).</li>
<li>media: firewire: firedtv-avc.c: replace BUG with proper, error return
(git-fixes).</li>
<li>media: i2c: adv748x: Fix test pattern selection mask
(git-fixes).</li>
<li>media: i2c: ccs: Set the device&#x27;s runtime PM status
correctly in remove (git-fixes).</li>
<li>media: i2c: ov7251: Introduce 1 ms delay between regulators and en
GPIO (git-fixes).</li>
<li>media: i2c: ov7251: Set enable GPIO low in probe
(git-fixes).</li>
<li>media: ov08x40: Fix hblank out of range issue (git-fixes).</li>
<li>media: platform: allgro-dvt: unregister v4l2_device on the error path
(git-fixes).</li>
<li>media: platform: stm32: Add check for clk_enable()
(git-fixes).</li>
<li>media: siano: Fix error handling in smsdvb_module_init()
(git-fixes).</li>
<li>media: streamzap: fix race between device disconnection and urb
callback (git-fixes).</li>
<li>media: streamzap: prevent processing IR data on URB failure
(git-fixes).</li>
<li>media: uvcvideo: Add Kurokesu C1 PRO camera
(stable-fixes).</li>
<li>media: uvcvideo: Add new quirk definition for the Sonix Technology
Co. 292a camera (stable-fixes).</li>
<li>media: uvcvideo: Implement dual stream quirk to fix loss of usb
packets (stable-fixes).</li>
<li>media: v4l2-dv-timings: prevent possible overflow in
v4l2_detect_gtf() (git-fixes).</li>
<li>media: venus: hfi: add a check to handle OOB in sfr region
(git-fixes).</li>
<li>media: venus: hfi: add check to handle incorrect queue size
(git-fixes).</li>
<li>media: venus: hfi_parser: add check to avoid out of bound access
(git-fixes).</li>
<li>media: venus: hfi_parser: refactor hfi packet parsing logic
(git-fixes).</li>
<li>media: verisilicon: HEVC: Initialize start_bit field
(git-fixes).</li>
<li>media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
(stable-fixes).</li>
<li>media: vim2m: print device name after registering device
(git-fixes).</li>
<li>media: visl: Fix ERANGE error when setting enum controls
(git-fixes).</li>
<li>mei: me: add panther lake P DID (stable-fixes).</li>
<li>memblock tests: fix warning: &quot;__ALIGN_KERNEL&quot;
redefined (git-fixes).</li>
<li>memory: mtk-smi: Add ostd setting for mt8192 (git-fixes).</li>
<li>memstick: rtsx_usb_ms: Fix slab-use-after-free in
rtsx_usb_ms_drv_remove (git-fixes).</li>
<li>mfd: ene-kb3930: Fix a potential NULL pointer dereference
(git-fixes).</li>
<li>mfd: lpc_ich: Add another Gemini Lake ISA bridge PCI device-id
(stable-fixes).</li>
<li>mfd: sm501: Switch to BIT() to mitigate integer overflows
(git-fixes).</li>
<li>mfd: syscon: Add of_syscon_register_regmap() API
(stable-fixes).</li>
<li>mfd: syscon: Fix race in device_node_get_regmap()
(git-fixes).</li>
<li>mfd: syscon: Remove extern from function prototypes
(stable-fixes).</li>
<li>mfd: syscon: Use scoped variables with memory allocators to simplify
error paths (stable-fixes).</li>
<li>mm/compaction: fix UBSAN shift-out-of-bounds warning (git fixes
(mm/compaction)).</li>
<li>mm/page_alloc: fix memory accept before watermarks gets initialized
(bsc#1239600).</li>
<li>mm: accept to promo watermark (bsc#1239600).</li>
<li>mm: create promo_wmark_pages and clean up open-coded sites
(bsc#1239600).</li>
<li>mm: fix endless reclaim on machines with unaccepted memory
(bsc#1239600).</li>
<li>mm: hugetlb: Add huge page size param to huge_ptep_get_and_clear()
(git-fixes)</li>
<li>mm: zswap: move allocations during CPU init outside the lock
(git-fixes).</li>
<li>mmc: atmel-mci: Add missing clk_disable_unprepare()
(git-fixes).</li>
<li>mmc: core: Respect quirk_max_rate for non-UHS SDIO card
(stable-fixes).</li>
<li>mmc: mtk-sd: Fix register settings for hs400(es) mode
(git-fixes).</li>
<li>mmc: omap: Fix memory leak in mmc_omap_new_slot
(git-fixes).</li>
<li>mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops
(git-fixes).</li>
<li>mmc: sdhci-msm: Correctly set the load for the regulator
(stable-fixes).</li>
<li>mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD
(git-fixes).</li>
<li>mptcp: export local_address (git-fixes)</li>
<li>mptcp: fix NL PM announced address accounting (git-fixes)</li>
<li>mptcp: fix data races on local_id (git-fixes)</li>
<li>mptcp: fix inconsistent state on fastopen race
(bsc#1222672).</li>
<li>mptcp: fix recvbuffer adjust on sleeping rcvmsg
(git-fixes)</li>
<li>mptcp: fully established after ADD_ADDR echo on MPJ
(git-fixes)</li>
<li>mptcp: pass addr to mptcp_pm_alloc_anno_list (git-fixes)</li>
<li>mptcp: pm: check add_addr_accept_max before accepting new ADD_ADDR
(git-fixes)</li>
<li>mptcp: pm: deny endp with signal + subflow + port
(git-fixes)</li>
<li>mptcp: pm: do not ignore &#x27;subflow&#x27; if
&#x27;signal&#x27; flag is also set (git-fixes)</li>
<li>mptcp: pm: do not try to create sf if alloc failed
(git-fixes)</li>
<li>mptcp: pm: fullmesh: select the right ID later (git-fixes)</li>
<li>mptcp: pm: inc RmAddr MIB counter once per RM_ADDR ID
(git-fixes)</li>
<li>mptcp: pm: only in-kernel cannot have entries with ID 0
(git-fixes)</li>
<li>mptcp: pm: re-using ID of unused flushed subflows
(git-fixes)</li>
<li>mptcp: pm: re-using ID of unused removed ADD_ADDR
(git-fixes)</li>
<li>mptcp: pm: re-using ID of unused removed subflows
(git-fixes)</li>
<li>mptcp: pm: reduce indentation blocks (git-fixes)</li>
<li>mptcp: pm: remove mptcp_pm_remove_subflow (git-fixes)</li>
<li>mptcp: unify pm get_flags_and_ifindex_by_id (git-fixes)</li>
<li>mptcp: unify pm get_local_id interfaces (git-fixes)</li>
<li>mptcp: unify pm set_flags interfaces (git-fixes)</li>
<li>mtd: Add check for devm_kcalloc() (git-fixes).</li>
<li>mtd: Replace kcalloc() with devm_kcalloc() (git-fixes).</li>
<li>mtd: nand: Fix a kdoc comment (git-fixes).</li>
<li>mtd: rawnand: brcmnand: fix PM resume warning (git-fixes).</li>
<li>mtd: rawnand: cadence: fix error code in cadence_nand_init()
(git-fixes).</li>
<li>mtd: rawnand: cadence: fix incorrect device in dma_unmap_single
(git-fixes).</li>
<li>mtd: rawnand: cadence: fix unchecked dereference
(git-fixes).</li>
<li>mtd: rawnand: cadence: use dma_map_resource for sdma address
(git-fixes).</li>
<li>nbd: Fix signal handling (git-fixes).</li>
<li>nbd: Improve the documentation of the locking assumptions
(git-fixes).</li>
<li>nbd: do not allow reconnect after disconnect (git-fixes).</li>
<li>ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu()
(bsc#1239994).</li>
<li>ndisc: use RCU protection in ndisc_alloc_skb()
(bsc#1239994).</li>
<li>net l2tp: drop flow hash on forward (git-fixes).</li>
<li>net/mlx5: Correct TASR typo into TSAR (git-fixes).</li>
<li>net/mlx5: Fix RDMA TX steering prio (git-fixes).</li>
<li>net/mlx5: Fix msix vectors to respect platform limit
(bsc#1225981).</li>
<li>net/mlx5: SF, Fix add port error handling (git-fixes).</li>
<li>net/mlx5: Verify support for scheduling element and TSAR type
(git-fixes).</li>
<li>net/mlx5e: Always start IPsec sequence number from 1
(git-fixes).</li>
<li>net/mlx5e: Rely on reqid in IPsec tunnel mode (git-fixes).</li>
<li>net/mlx5e: macsec: Maintain TX SA from encoding_sa
(git-fixes).</li>
<li>net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions
created by classifiers (git-fixes).</li>
<li>net/sched: act_api: rely on rcu in tcf_idr_check_alloc
(git-fixes).</li>
<li>net/sched: adjust device watchdog timer to detect stopped queue at
right time (git-fixes).</li>
<li>net/sched: cbs: Fix integer overflow in cbs_set_port_rate()
(git-fixes).</li>
<li>net/sched: cls_u32: replace int refcounts with proper refcounts
(git-fixes).</li>
<li>net/sched: flower: Add lock protection when remove filter handle
(git-fixes).</li>
<li>net/sched: taprio: make q-&gt;picos_per_byte available to
fill_sched_entry() (git-fixes).</li>
<li>net/sched: tbf: correct backlog statistic for GSO packets
(git-fixes).</li>
<li>net/smc: support ipv4 mapped ipv6 addr client for smc-r v2
(bsc#1236994).</li>
<li>net: Fix undefined behavior in netdev name allocation
(bsc#1233749).</li>
<li>net: add dev_net_rcu() helper (bsc#1239994).</li>
<li>net: avoid UAF on deleted altname (bsc#1233749).</li>
<li>net: check for altname conflicts when changing netdev&#x27;s
netns (bsc#1233749).</li>
<li>net: constify sk_dst_get() and __sk_dst_get() argument
(git-fixes).</li>
<li>net: core: Use the bitmap API to allocate bitmaps
(bsc#1233749).</li>
<li>net: do not send a MOVE event when netdev changes netns
(bsc#1233749).</li>
<li>net: do not use input buffer of __dev_alloc_name() as a scratch space
(bsc#1233749).</li>
<li>net: fix ifname in netlink ntf during netns move
(bsc#1233749).</li>
<li>net: fix removing a namespace with conflicting altnames
(bsc#1233749).</li>
<li>net: free altname using an RCU callback (bsc#1233749).</li>
<li>net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes).</li>
<li>net: ipv6: fix dst ref loop on input in rpl lwt
(git-fixes).</li>
<li>net: ipv6: fix dst ref loop on input in seg6 lwt
(git-fixes).</li>
<li>net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels
(git-fixes).</li>
<li>net: ipv6: fix missing dst ref drop in ila lwtunnel
(git-fixes).</li>
<li>net: ipv6: fix wrong start position when receive hop-by-hop fragment
(git-fixes).</li>
<li>net: ipv6: ioam6: code alignment (git-fixes).</li>
<li>net: ipv6: ioam6: new feature tunsrc (git-fixes).</li>
<li>net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue
(git-fixes).</li>
<li>net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input
(git-fixes).</li>
<li>net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input()
(git-fixes).</li>
<li>net: ipv6: rpl_iptunnel: mitigate 2-realloc issue
(git-fixes).</li>
<li>net: ipv6: seg6_iptunnel: mitigate 2-realloc issue
(git-fixes).</li>
<li>net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL
(git-fixes).</li>
<li>net: ipv6: support reporting otherwise unknown prefix flags in
RTM_NEWPREFIX (git-fixes).</li>
<li>net: make dev_alloc_name() call dev_prep_valid_name()
(bsc#1233749).</li>
<li>net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2
(bsc#1239016).</li>
<li>net: mana: Add get_link and get_link_ksettings in ethtool
(bsc#1236761).</li>
<li>net: mana: Allow variable size indirection table
(bsc#1239016).</li>
<li>net: mana: Assigning IRQ affinity on HT cores
(bsc#1239015).</li>
<li>net: mana: Avoid open coded arithmetic (bsc#1239016).</li>
<li>net: mana: Cleanup &quot;mana&quot; debugfs dir after cleanup
of all children (bsc#1236760).</li>
<li>net: mana: Enable debugfs files for MANA device
(bsc#1236758).</li>
<li>net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs
(bsc#1239015).</li>
<li>net: mana: Fix memory leak in mana_gd_setup_irqs
(bsc#1239015).</li>
<li>net: mana: Support holes in device list reply msg
(git-fixes).</li>
<li>net: mana: add a function to spread IRQs per CPUs
(bsc#1239015).</li>
<li>net: mana: cleanup mana struct after debugfs_remove()
(git-fixes).</li>
<li>net: move altnames together with the netdevice
(bsc#1233749).</li>
<li>net: netvsc: Update default VMBus channels (bsc#1236757).</li>
<li>net: reduce indentation of __dev_alloc_name()
(bsc#1233749).</li>
<li>net: remove dev_valid_name() check from __dev_alloc_name()
(bsc#1233749).</li>
<li>net: remove else after return in dev_prep_valid_name()
(bsc#1233749).</li>
<li>net: rose: lock the socket in rose_bind() (git-fixes).</li>
<li>net: sfc: Correct key_len for efx_tc_ct_zone_ht_params
(git-fixes).</li>
<li>net: smc: fix spurious error message from __sock_release()
(bsc#1237126).</li>
<li>net: trust the bitmap in __dev_alloc_name() (bsc#1233749).</li>
<li>net: usb: usbnet: restore usb%d name exception for local mac
addresses (bsc#1234480).</li>
<li>net: use unrcu_pointer() helper (git-fixes).</li>
<li>net: wwan: iosm: Fix hibernation by re-binding the driver around it
(stable-fixes).</li>
<li>net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors
(stable-fixes).</li>
<li>net_sched: Prevent creation of classes with TC_H_ROOT
(git-fixes).</li>
<li>net_sched: sch_sfq: annotate data-races around
q-&gt;perturb_period (git-fixes).</li>
<li>net_sched: sch_sfq: handle bigger packets (git-fixes).</li>
<li>nfsd: clear acl_access/acl_default after releasing them
(git-fixes).</li>
<li>nouveau/svm: fix missing folio unlock + put after
make_device_exclusive_range() (git-fixes).</li>
<li>null_blk: Do not allow runt zone with zone capacity smaller then zone
size (git-fixes).</li>
<li>null_blk: Fix missing mutex_destroy() at module removal
(git-fixes).</li>
<li>null_blk: Fix the WARNING: modpost: missing MODULE_DESCRIPTION()
(git-fixes).</li>
<li>null_blk: Print correct max open zones limit in null_init_zoned_dev()
(git-fixes).</li>
<li>null_blk: Remove usage of the deprecated ida_simple_xx() API
(git-fixes).</li>
<li>null_blk: do not cap max_hw_sectors to BLK_DEF_MAX_SECTORS
(git-fixes).</li>
<li>null_blk: fix validation of block size (git-fixes).</li>
<li>nvme-fc: do not ignore connectivity loss during connecting (git-fixes
bsc#1222649).</li>
<li>nvme-fc: go straight to connecting state when initializing (git-fixes
bsc#1222649).</li>
<li>nvme-fc: rely on state transitions to handle connectivity loss
(git-fixes bsc#1222649).</li>
<li>nvme-fc: use ctrl state getter (git-fixes).</li>
<li>nvme-ioctl: fix leaked requests on mapping error
(git-fixes).</li>
<li>nvme-pci: Add TUXEDO IBP Gen9 to Samsung sleep quirk
(git-fixes).</li>
<li>nvme-pci: Add TUXEDO InfinityFlex to Samsung sleep quirk
(git-fixes).</li>
<li>nvme-pci: quirk Acer FA100 for non-uniqueue identifiers
(git-fixes).</li>
<li>nvme-pci: remove stale comment (git-fixes).</li>
<li>nvme-pci: use block layer helpers to calculate num of queues
(bsc#1236897).</li>
<li>nvme-tcp: Fix a C2HTermReq error message (git-fixes).</li>
<li>nvme-tcp: add basic support for the C2HTermReq PDU
(git-fixes).</li>
<li>nvme-tcp: fix connect failure on receiving partial ICResp PDU
(git-fixes).</li>
<li>nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
(git-fixes).</li>
<li>nvme-tcp: fix signedness bug in nvme_tcp_init_connection()
(git-fixes).</li>
<li>nvme/ioctl: add missing space in err message (git-fixes).</li>
<li>nvme: handle connectivity loss in nvme_set_queue_count
(git-fixes).</li>
<li>nvme: introduce nvme_disk_is_ns_head helper (git-fixes).</li>
<li>nvme: make nvme_tls_attrs_group static (git-fixes).</li>
<li>nvme: move error logging from nvme_end_req() to __nvme_end_req()
(git-fixes).</li>
<li>nvme: move passthrough logging attribute to head
(git-fixes).</li>
<li>nvme: only allow entering LIVE from CONNECTING state (git-fixes
bsc#1222649).</li>
<li>nvme: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues
(bsc#1236896).</li>
<li>nvme: tcp: Fix compilation warning with W=1 (git-fixes).</li>
<li>nvmet-fc: Remove unused functions (git-fixes).</li>
<li>nvmet-rdma: recheck queue state is LIVE in state lock in recv done
(git-fixes).</li>
<li>nvmet-tcp: Fix a possible sporadic response drops in weakly ordered
arch (git-fixes).</li>
<li>nvmet: Fix crash when a namespace is disabled (git-fixes).</li>
<li>nvmet: remove old function prototype (git-fixes).</li>
<li>ocfs2: check dir i_size in ocfs2_find_entry (git-fixes).</li>
<li>ocfs2: fix deadlock in ocfs2_get_system_file_inode
(git-fixes).</li>
<li>ocfs2: fix incorrect CPU endianness conversion causing mount failure
(bsc#1236138).</li>
<li>ocfs2: handle a symlink read error correctly (git-fixes).</li>
<li>ocfs2: mark dquot as inactive if failed to start trans while
releasing dquot (git-fixes).</li>
<li>ocfs2: update seq_file index in ocfs2_dlm_seq_next
(git-fixes).</li>
<li>orangefs: fix a oob in orangefs_debug_write (git-fixes).</li>
<li>padata: Clean up in padata_do_multithreaded()
(bsc#1237563).</li>
<li>padata: Honor the caller&#x27;s alignment in case of chunk_size 0
(bsc#1237563).</li>
<li>padata: fix sysfs store callback check (git-fixes).</li>
<li>partitions: ldm: remove the initial kernel-doc notation
(git-fixes).</li>
<li>partitions: mac: fix handling of bogus partition table
(git-fixes).</li>
<li>phy: exynos5-usbdrd: fix MPLL_MULTIPLIER and SSC_REFCLKSEL masks in
refclk (git-fixes).</li>
<li>phy: rockchip: naneng-combphy: compatible reset with old DT
(git-fixes).</li>
<li>phy: tegra: xusb: reset VBUS &amp; ID OVERRIDE
(git-fixes).</li>
<li>pinctrl: bcm281xx: Fix incorrect regmap max_registers value
(git-fixes).</li>
<li>pinctrl: cy8c95x0: Respect IRQ trigger settings from firmware
(git-fixes).</li>
<li>pinctrl: intel: Fix wrong bypass assignment in
intel_pinctrl_probe_pwm() (git-fixes).</li>
<li>pinctrl: qcom: Clear latched interrupt status when changing IRQ type
(git-fixes).</li>
<li>pinctrl: renesas: rza2: Fix missing of_node_put() call
(git-fixes).</li>
<li>pinctrl: renesas: rzv2m: Fix missing of_node_put() call
(git-fixes).</li>
<li>pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes).</li>
<li>platform/x86/intel-uncore-freq: Ignore minor version change
(bsc#1237452).</li>
<li>platform/x86/intel-uncore-freq: Increase minor number support
(bsc#1237452).</li>
<li>platform/x86/intel/tpmi: Add defines to get version information
(bsc#1237452).</li>
<li>platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show()
(stable-fixes).</li>
<li>platform/x86: ISST: Ignore minor version change
(bsc#1237452).</li>
<li>platform/x86: acer-wmi: Ignore AC events (stable-fixes).</li>
<li>platform/x86: dell-ddv: Fix temperature calculation
(git-fixes).</li>
<li>platform/x86: int3472: Check for adev == NULL
(stable-fixes).</li>
<li>platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e
(stable-fixes).</li>
<li>platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e
(stable-fixes).</li>
<li>platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles
(stable-fixes).</li>
<li>pnfs/flexfiles: retry getting layout segment for reads
(git-fixes).</li>
<li>power: supply: da9150-fg: fix potential overflow
(git-fixes).</li>
<li>power: supply: max77693: Fix wrong conversion of charge input
threshold value (git-fixes).</li>
<li>powerpc/64s/mm: Move __real_pte stubs into hash-4k.h
(bsc#1215199).</li>
<li>powerpc/64s: Rewrite __real_pte() and __rpte_to_hidx() as static
inline (bsc#1215199).</li>
<li>powerpc/code-patching: Disable KASAN report during patching via
temporary mm (bsc#1215199).</li>
<li>powerpc/code-patching: Fix KASAN hit by not flagging text patching
area as VM_ALLOC (bsc#1215199).</li>
<li>powerpc/pseries/eeh: Fix pseries_eeh_err_inject
(bsc#1239573).</li>
<li>powerpc/pseries/eeh: move pseries_eeh_err_inject() outside
CONFIG_DEBUG_FS block (bsc#1239573).</li>
<li>powerpc/pseries/iommu: Split Dynamic DMA Window to be used in Hybrid
mode (ltc#210895 bsc#1235933 ltc#210896
bsc#1235932).</li>
<li>powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for
pmemory (bsc#1239167 ltc#211055).</li>
<li>powerpc/trace: Add support for HAVE_FUNCTION_ARG_ACCESS_API
(bsc#1236967 ltc#210988).</li>
<li>powerpc: Stop using no_llseek (bsc#1239573).</li>
<li>printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX
(bsc#1237950).</li>
<li>r8169: enable SG/TSO on selected chip versions per default
(bsc#1235874).</li>
<li>rapidio: add check for rio_add_net() in rio_scan_alloc_net()
(git-fixes).</li>
<li>rapidio: fix an API misues when rio_add_net() fails
(git-fixes).</li>
<li>rbd: do not assume RBD_LOCK_STATE_LOCKED for exclusive mappings
(git-fixes).</li>
<li>rbd: do not assume rbd_is_lock_owner() for exclusive mappings
(git-fixes).</li>
<li>rbd: do not move requests to the running list on errors
(git-fixes).</li>
<li>rbd: rename RBD_LOCK_STATE_RELEASING and releasing_wait
(git-fixes).</li>
<li>regmap-irq: Add missing kfree() (git-fixes).</li>
<li>regulator: check that dummy regulator has been probed before using it
(stable-fixes).</li>
<li>regulator: core: Fix deadlock in create_regulator()
(git-fixes).</li>
<li>regulator: dummy: force synchronous probing (git-fixes).</li>
<li>rndis_host: Flag RNDIS modems as WWAN devices (git-fixes).</li>
<li>rpm/kernel-docs.spec.in: Workaround for reproducible builds
(bsc#1238303)</li>
<li>rpm/release-projects: Update the ALP projects again
(bsc#1231293).</li>
<li>rpm/split-modules: Fix optional splitting with usrmerge
(bsc#1238570)</li>
<li>s390/cio: rename bitmap_size() -&gt; idset_bitmap_size()
(git-fixes bsc#1236205).</li>
<li>s390/futex: Fix FUTEX_OP_ANDN implementation (git-fixes
bsc#1237158).</li>
<li>s390/iucv: fix receive buffer virtual vs physical address confusion
(git-fixes bsc#1236200).</li>
<li>s390/pci: Fix SR-IOV for PFs initially in standby (git-fixes
bsc#1236752).</li>
<li>s390/pci: Fix handling of isolated VFs (git-fixes
bsc#1238368).</li>
<li>s390/pci: Fix leak of struct zpci_dev when zpci_add_device() fails
(bsc#1236752).</li>
<li>s390/pci: Ignore RID for isolated VFs (bsc#1236752).</li>
<li>s390/pci: Pull search for parent PF out of zpci_iov_setup_virtfn()
(git-fixes bsc#1238368).</li>
<li>s390/pci: Sort PCI functions prior to creating virtual busses
(bsc#1236752).</li>
<li>s390/pci: Use topology ID for multi-function devices
(bsc#1236752).</li>
<li>s390/smp,mcck: fix early IPI handling (git-fixes
bsc#1236199).</li>
<li>s390/stackleak: Use exrl instead of ex in __stackleak_poison()
(git-fixes bsc#1239594).</li>
<li>s390/topology: Improve topology detection (bsc#1236591).</li>
<li>s390/traps: Fix test_monitor_call() inline assembly (git-fixes
bsc#1239595).</li>
<li>s390/vfio-ap: Remove gmap_convert_to_secure() from vfio_ap_ops
(git-fixes bsc#1236203).</li>
<li>sched/membarrier: Fix redundant load of membarrier_state
(bsc#1232743).</li>
<li>scripts/gdb: fix aarch64 userspace detection in get_current_task
(stable-fixes).</li>
<li>scsi: core: Clear driver private data when retrying request
(git-fixes).</li>
<li>scsi: core: Do not retry I/Os during depopulation
(git-fixes).</li>
<li>scsi: core: Handle depopulation and restoration in progress
(git-fixes).</li>
<li>scsi: hisi_sas: Allocate DFX memory during dump trigger
(git-fixes).</li>
<li>scsi: hisi_sas: Directly call register snapshot instead of using
workqueue (git-fixes).</li>
<li>scsi: hisi_sas: Enable all PHYs that are not disabled by user during
controller reset (git-fixes).</li>
<li>scsi: hisi_sas: Fix a deadlock issue related to automatic dump
(git-fixes).</li>
<li>scsi: hisi_sas: Remove redundant checks for automatic debugfs dump
(git-fixes).</li>
<li>scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS
request (git-fixes).</li>
<li>scsi: lpfc: Copyright updates for 14.4.0.8 patches
(bsc#1238347).</li>
<li>scsi: lpfc: Free phba irq in lpfc_sli4_enable_msi() when
pci_irq_vector() fails (bsc#1238347).</li>
<li>scsi: lpfc: Handle duplicate D_IDs in ndlp search-by D_ID routine
(bsc#1238347).</li>
<li>scsi: lpfc: Ignore ndlp rport mismatch in dev_loss_tmo callbk
(bsc#1238347).</li>
<li>scsi: lpfc: Reduce log message generation during ELS ring clean up
(bsc#1238347).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.8 (bsc#1238347).</li>
<li>scsi: megaraid_sas: Fix for a potential deadlock
(git-fixes).</li>
<li>scsi: mpi3mr: Fix possible crash when setting up bsg fails
(git-fixes).</li>
<li>scsi: mpi3mr: Start controller indexing from 0
(git-fixes).</li>
<li>scsi: mpi3mr: Use ida to manage mrioc ID (git-fixes).</li>
<li>scsi: mpt3sas: Diag-Reset when Doorbell-In-Use bit is set during
driver load time (jsc#PED-11253).</li>
<li>scsi: myrb: Remove dead code (git-fixes).</li>
<li>scsi: qedi: Fix potential deadlock on
&amp;qedi_percpu-&gt;p_work_lock (git-fixes).</li>
<li>scsi: qla1280: Fix hw revision numbering for ISP1020/1040
(git-fixes).</li>
<li>scsi: replace blk_mq_pci_map_queues with blk_mq_map_hw_queues
(bsc#1236896).</li>
<li>scsi: scsi_debug: Fix hrtimer support for ndelay
(git-fixes).</li>
<li>scsi: sg: Enable runtime power management (git-fixes).</li>
<li>scsi: st: Add MTIOCGET and MTLOAD to ioctls allowed after device
reset (git-fixes).</li>
<li>scsi: st: Do not modify unknown block number in MTIOCGET
(git-fixes).</li>
<li>scsi: storvsc: Set correct data length for sending SCSI command
without payload (git-fixes).</li>
<li>scsi: use block layer helpers to calculate num of queues
(bsc#1236897).</li>
<li>selftest: hugetlb_dio: fix test naming (git-fixes).</li>
<li>selftest: mm: Test if hugepage does not get leaked during
__bio_release_pages() (git-fixes).</li>
<li>selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute
(git-fixes).</li>
<li>selftests/bpf: Fix flaky test btf_map_in_map/lookup_update
(git-fixes).</li>
<li>selftests/bpf: Prevent client connect before server bind in
test_tc_tunnel.sh (git-fixes).</li>
<li>selftests/bpf: add fp-leaking precise subprog result tests
(git-fixes).</li>
<li>selftests/futex: pass _GNU_SOURCE without a value to the compiler
(git-fixes).</li>
<li>selftests/mm/cow: fix the incorrect error handling
(git-fixes).</li>
<li>selftests/net/ipsec: Fix Null pointer dereference in rtattr_pack()
(stable-fixes).</li>
<li>selftests/x86/syscall: Fix coccinelle WARNING recommending the use of
ARRAY_SIZE() (git-fixes).</li>
<li>selftests: gpio: gpio-sim: Fix missing chip disablements
(stable-fixes).</li>
<li>selftests: hugetlb_dio: check for initial conditions to skip in the
start (git-fixes).</li>
<li>selftests: hugetlb_dio: fixup check for initial conditions to skip in
the start (git-fixes).</li>
<li>selftests: mptcp: close fd_in before returning in main_loop
(git-fixes).</li>
<li>selftests: mptcp: connect: -f: no reconnect (git-fixes).</li>
<li>selftests: mptcp: fix incorrect fd checks in main_loop
(git-fixes).</li>
<li>selftests: rtnetlink: update netdevsim ipsec output format
(stable-fixes).</li>
<li>seq_file: add helper macro to define attribute for rw file
(jsc#PED-12416).</li>
<li>serial: 8250: Fix fifo underflow on flush (git-fixes).</li>
<li>serial: sc16is7xx: use device_property APIs when configuring irda
mode (stable-fixes).</li>
<li>slimbus: messaging: Free transaction ID in delayed interrupt scenario
(git-fixes).</li>
<li>smb3: fix creating FIFOs when mounting with &quot;sfu&quot;
mount option (git-fixes).</li>
<li>smb3: request handle caching when caching directories
(bsc#1231432).</li>
<li>smb3: retrying on failed server close (bsc#1231432).</li>
<li>smb: cached directories can be more than root file handle
(bsc#1231432).</li>
<li>smb: cilent: set reparse mount points as automounts
(git-fixes).</li>
<li>smb: client: Fix a NULL vs IS_ERR() check in wsl_set_xattrs()
(git-fixes).</li>
<li>smb: client: Fix minor whitespace errors and warnings
(git-fixes).</li>
<li>smb: client: Fix netns refcount imbalance causing leaks and
use-after-free (git-fixes).</li>
<li>smb: client: add support for WSL reparse points
(git-fixes).</li>
<li>smb: client: allow creating special files via reparse points
(git-fixes).</li>
<li>smb: client: allow creating symlinks via reparse points
(git-fixes).</li>
<li>smb: client: cleanup smb2_query_reparse_point()
(git-fixes).</li>
<li>smb: client: destroy cfid_put_wq on module exit
(git-fixes).</li>
<li>smb: client: do not query reparse points twice on symlinks
(git-fixes).</li>
<li>smb: client: extend smb2_compound_op() to accept more commands
(bsc#1231432).</li>
<li>smb: client: fix OOB in SMB2_query_info_init()
(bsc#1231432).</li>
<li>smb: client: fix OOB in smb2_query_reparse_point()
(git-fixes).</li>
<li>smb: client: fix corruption in cifs_extend_writeback
(bsc#1235609).</li>
<li>smb: client: fix double put of @cfile in smb2_rename_path()
(git-fixes).</li>
<li>smb: client: fix double put of @cfile in smb2_set_path_size()
(git-fixes).</li>
<li>smb: client: fix hardlinking of reparse points
(git-fixes).</li>
<li>smb: client: fix missing mode bits for SMB symlinks
(git-fixes).</li>
<li>smb: client: fix possible double free in smb2_set_ea()
(git-fixes).</li>
<li>smb: client: fix potential broken compound request
(git-fixes).</li>
<li>smb: client: fix renaming of reparse points (git-fixes).</li>
<li>smb: client: get rid of smb311_posix_query_path_info()
(git-fixes).</li>
<li>smb: client: handle STATUS_IO_REPARSE_TAG_NOT_HANDLED
(git-fixes).</li>
<li>smb: client: handle lack of FSCTL_GET_REPARSE_POINT support
(git-fixes).</li>
<li>smb: client: handle path separator of created SMB symlinks
(git-fixes).</li>
<li>smb: client: handle special files and symlinks in SMB3 POSIX
(git-fixes).</li>
<li>smb: client: ignore unhandled reparse tags (git-fixes).</li>
<li>smb: client: implement -&gt;query_reparse_point() for SMB1
(git-fixes).</li>
<li>smb: client: instantiate when creating SFU files
(git-fixes).</li>
<li>smb: client: introduce -&gt;parse_reparse_point()
(git-fixes).</li>
<li>smb: client: introduce SMB2_OP_QUERY_WSL_EA (git-fixes).</li>
<li>smb: client: introduce cifs_sfu_make_node() (git-fixes).</li>
<li>smb: client: introduce reparse mount option (git-fixes).</li>
<li>smb: client: make smb2_compound_op() return resp buffer on success
(bsc#1231432).</li>
<li>smb: client: move most of reparse point handling code to common file
(git-fixes).</li>
<li>smb: client: move some params to cifs_open_info_data
(bsc#1231432).</li>
<li>smb: client: optimise reparse point querying (git-fixes).</li>
<li>smb: client: parse owner/group when creating reparse points
(git-fixes).</li>
<li>smb: client: parse reparse point flag in create response
(bsc#1231432).</li>
<li>smb: client: parse uid, gid, mode and dev from WSL reparse points
(git-fixes).</li>
<li>smb: client: properly close cfids on umount (bsc#1231432,
bsc#1232299, bsc#1235599, bsc#1234896).</li>
<li>smb: client: reduce number of parameters in smb2_compound_op()
(git-fixes).</li>
<li>smb: client: reduce stack usage in smb2_query_info_compound()
(bsc#1231432).</li>
<li>smb: client: reduce stack usage in smb2_query_reparse_point()
(git-fixes).</li>
<li>smb: client: reduce stack usage in smb2_set_ea()
(bsc#1231432).</li>
<li>smb: client: retry compound request without reusing lease
(git-fixes).</li>
<li>smb: client: return reparse type in /proc/mounts
(git-fixes).</li>
<li>smb: client: reuse file lease key in compound operations
(git-fixes).</li>
<li>smb: client: set correct d_type for reparse DFS/DFSR and mount point
(git-fixes).</li>
<li>smb: client: set correct file type from NFS reparse points
(git-fixes).</li>
<li>smb: client: stop revalidating reparse points unnecessarily
(git-fixes).</li>
<li>smb: use kernel_connect() and kernel_bind() (git-fixes).</li>
<li>soc/mediatek: mtk-devapc: Convert to platform remove callback
returning void (stable-fixes).</li>
<li>soc/tegra: fuse: Update Tegra234 nvmem keepout list
(stable-fixes).</li>
<li>soc: imx8m: Remove global soc_uid (stable-fixes).</li>
<li>soc: imx8m: Unregister cpufreq and soc dev in cleanup path
(git-fixes).</li>
<li>soc: imx8m: Use devm_* to simplify probe failure handling
(stable-fixes).</li>
<li>soc: loongson: loongson2_guts: Add check for devm_kstrdup()
(git-fixes).</li>
<li>soc: mediatek: mt8167-mmsys: Fix missing regval in all entries
(git-fixes).</li>
<li>soc: mediatek: mt8365-mmsys: Fix routing table masks and values
(git-fixes).</li>
<li>soc: mediatek: mtk-devapc: Fix leaking IO map on driver remove
(git-fixes).</li>
<li>soc: qcom: pdr: Fix the potential deadlock (git-fixes).</li>
<li>soc: qcom: smem: introduce qcom_smem_get_soc_id()
(git-fixes).</li>
<li>soc: qcom: socinfo: move SMEM item struct and defines to a header
(git-fixes).</li>
<li>soc: samsung: exynos-chipid: Add NULL pointer check in
exynos_chipid_probe() (git-fixes).</li>
<li>soundwire: slave: fix an OF node reference leak in soundwire slave
device (git-fixes).</li>
<li>spi: atmel-qspi: Memory barriers after memory-mapped I/O
(git-fixes).</li>
<li>spi: atmel-quadspi: Create <code>atmel_qspi_ops</code> to
support newer SoC families (stable-fixes).</li>
<li>spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes).</li>
<li>spi: microchip-core: Clean up redundant dev_err_probe()
(git-fixes).</li>
<li>spi: microchip-core: Use helper function devm_clk_get_enabled()
(git-fixes).</li>
<li>spi: sn-f-ospi: Fix division by zero (git-fixes).</li>
<li>splice: do not checksum AF_UNIX sockets (bsc#1240333).</li>
<li>sunrpc: suppress warnings for unused procfs functions
(git-fixes).</li>
<li>supported.conf: add now-included qat_420xx (external,
intel)</li>
<li>tcp: Add memory barrier to tcp_push() (git-fixes).</li>
<li>tcp: Adjust clamping window for applications specifying SO_RCVBUF
(git-fixes).</li>
<li>tcp: Annotate data-race around sk-&gt;sk_mark in
tcp_v4_send_reset (git-fixes).</li>
<li>tcp: Defer ts_recent changes until req is owned
(git-fixes).</li>
<li>tcp: Do not drop SYN+ACK for simultaneous connect()
(git-fixes).</li>
<li>tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge()
(git-fixes).</li>
<li>tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6)
non-wildcard addresses (git-fixes).</li>
<li>tcp: Update window clamping condition (git-fixes).</li>
<li>tcp: add tcp_done_with_error() helper (git-fixes).</li>
<li>tcp: adjust rcvq_space after updating scaling ratio
(git-fixes).</li>
<li>tcp: annotate data-races around tp-&gt;window_clamp
(git-fixes).</li>
<li>tcp: avoid premature drops in tcp_add_backlog()
(git-fixes).</li>
<li>tcp: avoid reusing FIN_WAIT2 when trying to find port in connect()
process (git-fixes).</li>
<li>tcp: check mptcp-level constraints for backlog coalescing
(git-fixes).</li>
<li>tcp: check space before adding MPTCP SYN options
(git-fixes).</li>
<li>tcp: clear tp-&gt;retrans_stamp in tcp_rcv_fastopen_synack()
(git-fixes).</li>
<li>tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB
(git-fixes).</li>
<li>tcp: define initial scaling factor value as a macro
(git-fixes).</li>
<li>tcp: derive delack_max from rto_min (git-fixes).</li>
<li>tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out
(git-fixes).</li>
<li>tcp: fix cookie_init_timestamp() overflows (git-fixes).</li>
<li>tcp: fix forever orphan socket caused by tcp_abort
(git-fixes).</li>
<li>tcp: fix incorrect parameter validation in the do_tcp_getsockopt()
function (git-fixes).</li>
<li>tcp: fix incorrect undo caused by DSACK of TLP retransmit
(git-fixes).</li>
<li>tcp: fix mid stream window clamp (git-fixes).</li>
<li>tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes).</li>
<li>tcp: fix race in tcp_write_err() (git-fixes).</li>
<li>tcp: fix races in tcp_abort() (git-fixes).</li>
<li>tcp: fix races in tcp_v_err() (git-fixes).</li>
<li>tcp: fix tcp_enter_recovery() to zero retrans_stamp when
it&#x27;s safe (git-fixes).</li>
<li>tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed
TFO (git-fixes).</li>
<li>tcp: fix to allow timestamp undo if no retransmits were sent
(git-fixes).</li>
<li>tcp: increase the default TCP scaling ratio (git-fixes).</li>
<li>tcp: introduce tcp_clock_ms() (git-fixes).</li>
<li>tcp: process the 3rd ACK with sk_socket for TFO/MPTCP
(git-fixes).</li>
<li>tcp: reduce accepted window in NEW_SYN_RECV state
(git-fixes).</li>
<li>tcp: remove 64 KByte limit for initial tp-&gt;rcv_wnd value
(git-fixes).</li>
<li>tcp: replace tcp_time_stamp_raw() (git-fixes).</li>
<li>tg3: Disable tg3 PCIe AER on system reboot (bsc#1219367).</li>
<li>thermal/drivers/rockchip: Add missing rk3328 mapping entry
(git-fixes).</li>
<li>thermal: int340x: Add NULL check for adev (git-fixes).</li>
<li>tomoyo: do not emit warning in tomoyo_write_control()
(stable-fixes).</li>
<li>tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server
bind (git-fixes).</li>
<li>tools: fix annoying &quot;mkdir -p ...&quot; logs when
building tools in parallel (git-fixes).</li>
<li>tpm, tpm_tis: Fix timeout handling when waiting for TPM status
(git-fixes).</li>
<li>tpm: do not start chip while suspended (git-fixes).</li>
<li>tpm: send_data: Wait longer for the TPM to become ready
(bsc#1235870).</li>
<li>tty: xilinx_uartps: split sysrq handling (git-fixes).</li>
<li>ubi: Add a check for ubi_num (git-fixes).</li>
<li>ubi: block: Fix use-after-free in ubiblock_cleanup
(git-fixes).</li>
<li>ubi: block: fix null-pointer-dereference in ubiblock_create()
(git-fixes).</li>
<li>ubi: correct the calculation of fastmap size
(stable-fixes).</li>
<li>ubi: eba: properly rollback inside self_check_eba
(git-fixes).</li>
<li>ubi: fastmap: Fix missed ec updating after erasing old fastmap data
block (git-fixes).</li>
<li>ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor
exists (git-fixes).</li>
<li>ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty
(git-fixes).</li>
<li>ubi: wl: Put source PEB into correct list if trying locking LEB
failed (git-fixes).</li>
<li>ublk: fix error code for unsupported command (git-fixes).</li>
<li>ublk: fix ublk_ch_mmap() for 64K page size (git-fixes).</li>
<li>ublk: move ublk_cancel_dev() out of ub-&gt;mutex
(git-fixes).</li>
<li>ublk: move zone report data out of request pdu
(git-fixes).</li>
<li>usb: atm: cxacru: fix a flaw in existing endpoint checks
(git-fixes).</li>
<li>usb: cdc-acm: Check control transfer buffer size before access
(git-fixes).</li>
<li>usb: cdc-acm: Fix handling of oversized fragments
(git-fixes).</li>
<li>usb: chipidea: ci_hdrc_imx: decrement device&#x27;s refcount in
.remove() and in the error path of .probe() (git-fixes).</li>
<li>usb: core: fix pipe creation for get_bMaxPacketSize0
(git-fixes).</li>
<li>usb: dwc2: gadget: remove of_node reference upon udc_stop
(git-fixes).</li>
<li>usb: dwc3: Fix timeout issue during controller enter/exit from halt
state (git-fixes).</li>
<li>usb: dwc3: core: Defer the probe until USB power supply ready
(git-fixes).</li>
<li>usb: dwc3: gadget: Prevent irq storm when TH re-executes
(git-fixes).</li>
<li>usb: gadget: Check bmAttributes only if configuration is valid
(git-fixes).</li>
<li>usb: gadget: Fix setting self-powered state on suspend
(git-fixes).</li>
<li>usb: gadget: Set self-powered based on MaxPower and bmAttributes
(git-fixes).</li>
<li>usb: gadget: core: flush gadget workqueue after device removal
(git-fixes).</li>
<li>usb: gadget: f_midi: Fixing wMaxPacketSize exceeded issue during MIDI
bind retries (git-fixes).</li>
<li>usb: gadget: f_midi: fix MIDI Streaming descriptor lengths
(git-fixes).</li>
<li>usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails
(git-fixes).</li>
<li>usb: gadget: udc: renesas_usb3: Fix compiler warning
(git-fixes).</li>
<li>usb: hub: lack of clearing xHC resources (git-fixes).</li>
<li>usb: phy: generic: Use proper helper for property detection
(stable-fixes).</li>
<li>usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card
Reader (stable-fixes).</li>
<li>usb: quirks: Add NO_LPM quirk for TOSHIBA TransMemory-Mx device
(git-fixes).</li>
<li>usb: renesas_usbhs: Call clk_put() (git-fixes).</li>
<li>usb: renesas_usbhs: Flush the notify_hotplug_work
(git-fixes).</li>
<li>usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes).</li>
<li>usb: roles: set switch registered flag early on
(git-fixes).</li>
<li>usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix
functionality (git-fixes).</li>
<li>usb: typec: ucsi: Fix NULL pointer access (git-fixes).</li>
<li>usb: typec: ucsi: increase timeout for PPM reset operations
(git-fixes).</li>
<li>usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host
(git-fixes).</li>
<li>usb: xhci: Enable the TRB overfetch quirk on VIA VL805
(git-fixes).</li>
<li>usb: xhci: Fix NULL pointer dereference on certain command aborts
(git-fixes).</li>
<li>usb: xhci: remove &#x27;retval&#x27; from xhci_pci_resume()
(git-fixes).</li>
<li>usbnet: gl620a: fix endpoint checking in genelink_bind()
(git-fixes).</li>
<li>usbnet: ipheth: document scope of NCM implementation
(stable-fixes).</li>
<li>util_macros.h: fix/rework find_closest() macros
(git-fixes).</li>
<li>vboxsf: fix building with GCC 15 (stable-fixes).</li>
<li>vfio/pci: Lock external INTx masking ops (bsc#1222803).</li>
<li>vhost/net: Set num_buffers for virtio 1.0 (git-fixes).</li>
<li>virtio-mem: check if the config changed before fake offlining memory
(git-fixes).</li>
<li>virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY
(git-fixes).</li>
<li>virtio-mem: keep retrying on offline_and_remove_memory() errors in
Sub Block Mode (SBM) (git-fixes).</li>
<li>virtio-mem: remove unsafe unplug in Big Block Mode (BBM)
(git-fixes).</li>
<li>virtio: blk/scsi: replace blk_mq_virtio_map_queues with
blk_mq_map_hw_queues (bsc#1236896).</li>
<li>virtio: blk/scsi: use block layer helpers to calculate num of queues
(bsc#1236897).</li>
<li>virtio: hookup irq_get_affinity callback (bsc#1236896).</li>
<li>virtio_blk: reverse request order in virtio_queue_rqs
(git-fixes).</li>
<li>vsock/virtio: cancel close work in the destructor
(git-fixes)</li>
<li>vsock: Keep the binding until socket destruction
(git-fixes)</li>
<li>vsock: reset socket state when de-assigning the transport
(git-fixes)</li>
<li>wifi: ath11k: Clear affinity hint before calling
ath11k_pcic_free_irq() in error path (git-fixes).</li>
<li>wifi: ath11k: add srng-&gt;lock for ath11k_hal_srng_* in monitor
mode (git-fixes).</li>
<li>wifi: ath11k: choose default PM policy for hibernation
(bsc#1207948).</li>
<li>wifi: ath11k: determine PM policy based on machine model
(bsc#1207948).</li>
<li>wifi: ath11k: fix RCU stall while reaping monitor destination ring
(git-fixes).</li>
<li>wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability
(git-fixes).</li>
<li>wifi: ath11k: introduce ath11k_core_continue_suspend_resume()
(bsc#1207948).</li>
<li>wifi: ath11k: refactor ath11k_core_suspend/_resume()
(bsc#1207948).</li>
<li>wifi: ath11k: support non-WoWLAN mode suspend as well
(bsc#1207948).</li>
<li>wifi: ath12k: Clear affinity hint before calling
ath12k_pci_free_irq() in error path (git-fixes).</li>
<li>wifi: ath12k: encode max Tx power in scan channel list command
(git-fixes).</li>
<li>wifi: ath12k: fix handling of 6 GHz rules (git-fixes).</li>
<li>wifi: ath9k: do not submit zero bytes to the entropy pool
(git-fixes).</li>
<li>wifi: brcmfmac: Check the return value of
of_property_read_string_index() (stable-fixes).</li>
<li>wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()
(stable-fixes).</li>
<li>wifi: brcmsmac: add gain range check to
wlc_phy_iqcal_gainparams_nphy() (stable-fixes).</li>
<li>wifi: cfg80211: cancel wiphy_work before freeing wiphy
(git-fixes).</li>
<li>wifi: cfg80211: init wiphy_work before allocating rfkill fails
(git-fixes).</li>
<li>wifi: cfg80211: regulatory: improve invalid hints checking
(git-fixes).</li>
<li>wifi: iwlwifi: avoid memory leak (stable-fixes).</li>
<li>wifi: iwlwifi: limit printed string from FW file
(git-fixes).</li>
<li>wifi: iwlwifi: mvm: do not try to talk to a dead firmware
(git-fixes).</li>
<li>wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms
(git-fixes).</li>
<li>wifi: mac80211: fix integer overflow in hwmp_route_info_get()
(git-fixes).</li>
<li>wifi: mt76: Add check for devm_kstrdup() (git-fixes).</li>
<li>wifi: mt76: connac: move mt7615_mcu_del_wtbl_all to connac
(stable-fixes).</li>
<li>wifi: mt76: mt7915: fix omac index assignment after hardware reset
(git-fixes).</li>
<li>wifi: mt76: mt7915: fix possible integer overflows in
mt7915_muru_stats_show() (git-fixes).</li>
<li>wifi: mt76: mt7915: improve hardware restart reliability
(stable-fixes).</li>
<li>wifi: mt76: mt7921u: Add VID/PID for TP-Link TXE50UH
(stable-fixes).</li>
<li>wifi: mt76: mt7925: ensure wow pattern command align fw format
(git-fixes).</li>
<li>wifi: mt76: mt7925: fix country count limitation for CLC
(git-fixes).</li>
<li>wifi: mt76: mt7925: remove unused acpi function for clc
(git-fixes).</li>
<li>wifi: mwifiex: Fix premature release of RF calibration data
(git-fixes).</li>
<li>wifi: nl80211: reject cooked mode if it is set along with other flags
(git-fixes).</li>
<li>wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled
(git-fixes).</li>
<li>wifi: rtw88: sdio: Fix disconnection after beacon loss
(stable-fixes).</li>
<li>wifi: rtw89: add crystal_cap check to avoid setting as overflow value
(stable-fixes).</li>
<li>wifi: rtw89: fw: correct debug message format in
rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes).</li>
<li>wifi: rtw89: pci: correct ISR RDU bit for 8922AE
(git-fixes).</li>
<li>x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB
(git-fixes).</li>
<li>x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes).</li>
<li>x86/asm: Make serialize() always_inline (git-fixes).</li>
<li>x86/boot/32: De-uglify the 2/3 level paging difference in
mk_early_pgtbl_32() (git-fixes).</li>
<li>x86/boot/32: Disable stackprotector and tracing for
mk_early_pgtbl_32() (git-fixes).</li>
<li>x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes).</li>
<li>x86/boot/32: Temporarily map initrd for microcode loading
(git-fixes).</li>
<li>x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32()
(git-fixes).</li>
<li>x86/bugs: Add SRSO_USER_KERNEL_NO support (git-fixes).</li>
<li>x86/coco: Replace &#x27;static const cc_mask&#x27; with the
newly introduced cc_get_mask() function (git-fixes).</li>
<li>x86/cpu/intel: Detect TME keyid bits before setting MTRR mask
registers (git-fixes).</li>
<li>x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit
(git-fixes).</li>
<li>x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR
implementation (git-fixes).</li>
<li>x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu()
(git-fixes).</li>
<li>x86/entry: Add __init to ia32_emulation_override_cmdline()
(git-fixes).</li>
<li>x86/fpu: Fix guest FPU state buffer allocation size
(git-fixes).</li>
<li>x86/hyperv/vtl: Stop kernel from probing VTL0 low memory
(git-fixes).</li>
<li>x86/hyperv: Fix output argument to hypercall that changes page
visibility (git-fixes).</li>
<li>x86/idle: Disable IBRS when CPU is offline to improve single-threaded
performance (git-fixes).</li>
<li>x86/microcode/32: Move early loading after paging enable
(git-fixes).</li>
<li>x86/microcode/amd: Cache builtin microcode too
(git-fixes).</li>
<li>x86/microcode/amd: Cache builtin/initrd microcode early
(git-fixes).</li>
<li>x86/microcode/amd: Use cached microcode for AP load
(git-fixes).</li>
<li>x86/microcode/amd: Use correct per CPU ucode_cpu_info
(git-fixes).</li>
<li>x86/microcode/intel: Add a minimum required revision for late loading
(git-fixes).</li>
<li>x86/microcode/intel: Cleanup code further (git-fixes).</li>
<li>x86/microcode/intel: Move microcode functions out of cpu/intel.c
(git-fixes).</li>
<li>x86/microcode/intel: Remove debug code (git-fixes).</li>
<li>x86/microcode/intel: Remove pointless mutex (git-fixes).</li>
<li>x86/microcode/intel: Rename get_datasize() since its used externally
(git-fixes).</li>
<li>x86/microcode/intel: Reuse intel_cpu_collect_info()
git-fixes).</li>
<li>x86/microcode/intel: Rework intel_cpu_collect_info()
(git-fixes).</li>
<li>x86/microcode/intel: Rework intel_find_matching_signature()
(git-fixes).</li>
<li>x86/microcode/intel: Rip out mixed stepping support for Intel CPUs
(git-fixes).</li>
<li>x86/microcode/intel: Save the microcode only after a successful
late-load (git-fixes).</li>
<li>x86/microcode/intel: Simplify and rename generic_load_microcode()
(git-fixes).</li>
<li>x86/microcode/intel: Simplify early loading (git-fixes).</li>
<li>x86/microcode/intel: Simplify scan_microcode()
(git-fixes).</li>
<li>x86/microcode/intel: Switch to kvmalloc() (git-fixes).</li>
<li>x86/microcode/intel: Unify microcode apply() functions
(git-fixes).</li>
<li>x86/microcode: Add per CPU control field (git-fixes).</li>
<li>x86/microcode: Add per CPU result state (git-fixes).</li>
<li>x86/microcode: Clarify the late load logic (git-fixes).</li>
<li>x86/microcode: Clean up mc_cpu_down_prep() (git-fixes).</li>
<li>x86/microcode: Get rid of the schedule work indirection
(git-fixes).</li>
<li>x86/microcode: Handle &quot;nosmt&quot; correctly
(git-fixes).</li>
<li>x86/microcode: Handle &quot;offline&quot; CPUs correctly
(git-fixes).</li>
<li>x86/microcode: Hide the config knob (git-fixes).</li>
<li>x86/microcode: Include vendor headers into microcode.h
(git-fixes).</li>
<li>x86/microcode: Make reload_early_microcode() static
(git-fixes).</li>
<li>x86/microcode: Mop up early loading leftovers (git-fixes).</li>
<li>x86/microcode: Move core specific defines to local header
(git-fixes).</li>
<li>x86/microcode: Prepare for minimal revision check
(git-fixes).</li>
<li>x86/microcode: Protect against instrumentation
(git-fixes).</li>
<li>x86/microcode: Provide CONFIG_MICROCODE_INITRD32
(git-fixes).</li>
<li>x86/microcode: Provide new control functions (git-fixes).</li>
<li>x86/microcode: Remove microcode_mutex (git-fixes).</li>
<li>x86/microcode: Remove pointless apply() invocation
(git-fixes).</li>
<li>x86/microcode: Rendezvous and load in NMI (git-fixes).</li>
<li>x86/microcode: Replace the all-in-one rendevous handler
(git-fixes).</li>
<li>x86/microcode: Sanitize __wait_for_cpus() (git-fixes).</li>
<li>x86/mm: Carve out INVLPG inline asm for use by others
(git-fixes).</li>
<li>x86/mm: Remove unused microcode.h include (git-fixes).</li>
<li>x86/platform/olpc: Remove unused variable &#x27;len&#x27; in
olpc_dt_compatible_match() (git-fixes).</li>
<li>x86/speculation: Add __update_spec_ctrl() helper
(git-fixes).</li>
<li>x86/usercopy: Fix kernel-doc func param name in
clean_cache_range()&#x27;s description (git-fixes).</li>
<li>x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).</li>
<li>x86/xen: allow larger contiguous memory regions in PV guests
(git-fixes).</li>
<li>x86/xen: fix xen_hypercall_hvm() to not clobber %rbx
(git-fixes).</li>
<li>xen/swiotlb: relax alignment requirements (git-fixes).</li>
<li>xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL
(git-fixes).</li>
<li>xhci: Cleanup Candence controller PCI device and vendor ID usage
(git-fixes).</li>
<li>xhci: Combine two if statements for Etron xHCI host
(jsc#PED-10701).</li>
<li>xhci: Do not issue Reset Device command to Etron xHCI host
(jsc#PED-10701).</li>
<li>xhci: Do not perform Soft Retry for Etron xHCI host
(git-fixes).</li>
<li>xhci: dbc: Check for errors first in xhci_dbc_stop()
(git-fixes).</li>
<li>xhci: dbc: Convert to use sysfs_streq() (git-fixes).</li>
<li>xhci: dbc: Drop duplicate checks for dma_free_coherent()
(git-fixes).</li>
<li>xhci: dbc: Fix STALL transfer event handling (git-fixes).</li>
<li>xhci: dbc: Replace custom return value with proper Linux error code
(git-fixes).</li>
<li>xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes).</li>
<li>xhci: dbc: Use sysfs_emit() to instead of scnprintf()
(git-fixes).</li>
<li>xhci: dbgtty: remove kfifo_out() wrapper (git-fixes).</li>
<li>xhci: pci: Fix indentation in the PCI device ID definitions
(stable-fixes).</li>
<li>xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes).</li>
<li>xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes).</li>
<li>xhci: pci: Use full names in PCI IDs for Intel platforms
(git-fixes).</li>
<li>xhci: pci: Use standard pattern for device IDs
(git-fixes).</li>
<li>zram: clear IDLE flag after recompression (git-fixes).</li>
<li>zram: clear IDLE flag in mark_idle() (git-fixes).</li>
<li>zram: do not mark idle slots that cannot be idle
(git-fixes).</li>
<li>zram: fix potential UAF of zram table (git-fixes).</li>
<li>zram: fix uninitialized ZRAM not releasing backing device
(git-fixes).</li>
<li>zram: refuse to use zero sized block device as backing device
(git-fixes).</li>
<li>zram: split memory-tracking and ac-time tracking
(git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Micro 6.1


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-6.1-kernel-8=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Micro 6.1 (noarch)
<ul>

<li>kernel-devel-rt-6.4.0-28.1</li>

<li>kernel-source-rt-6.4.0-28.1</li>

</ul>
</li>

<li>
SUSE Linux Micro 6.1 (aarch64 nosrc x86_64)
<ul>

<li>kernel-rt-6.4.0-28.1</li>

</ul>
</li>

<li>
SUSE Linux Micro 6.1 (aarch64 x86_64)
<ul>


<li>kernel-rt-debugsource-6.4.0-28.1</li>

<li>kernel-rt-debuginfo-6.4.0-28.1</li>

<li>kernel-rt-devel-6.4.0-28.1</li>

</ul>
</li>

<li>
SUSE Linux Micro 6.1 (x86_64)
<ul>


<li>kernel-livepatch-6_4_0-28-rt-1-3.1</li>


<li>kernel-rt-devel-debuginfo-6.4.0-28.1</li>


<li>kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-1-3.1</li>


<li>kernel-livepatch-6_4_0-28-rt-debuginfo-1-3.1</li>

<li>kernel-rt-livepatch-6.4.0-28.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52831.html">https://www.suse.com/security/cve/CVE-2023-52831.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52924.html">https://www.suse.com/security/cve/CVE-2023-52924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52925.html">https://www.suse.com/security/cve/CVE-2023-52925.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52926.html">https://www.suse.com/security/cve/CVE-2023-52926.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52927.html">https://www.suse.com/security/cve/CVE-2023-52927.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26634.html">https://www.suse.com/security/cve/CVE-2024-26634.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26708.html">https://www.suse.com/security/cve/CVE-2024-26708.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26810.html">https://www.suse.com/security/cve/CVE-2024-26810.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26873.html">https://www.suse.com/security/cve/CVE-2024-26873.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35826.html">https://www.suse.com/security/cve/CVE-2024-35826.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-35910.html">https://www.suse.com/security/cve/CVE-2024-35910.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38606.html">https://www.suse.com/security/cve/CVE-2024-38606.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40980.html">https://www.suse.com/security/cve/CVE-2024-40980.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41005.html">https://www.suse.com/security/cve/CVE-2024-41005.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41055.html">https://www.suse.com/security/cve/CVE-2024-41055.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41077.html">https://www.suse.com/security/cve/CVE-2024-41077.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-41149.html">https://www.suse.com/security/cve/CVE-2024-41149.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42307.html">https://www.suse.com/security/cve/CVE-2024-42307.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43820.html">https://www.suse.com/security/cve/CVE-2024-43820.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44974.html">https://www.suse.com/security/cve/CVE-2024-44974.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45009.html">https://www.suse.com/security/cve/CVE-2024-45009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45010.html">https://www.suse.com/security/cve/CVE-2024-45010.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46736.html">https://www.suse.com/security/cve/CVE-2024-46736.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46782.html">https://www.suse.com/security/cve/CVE-2024-46782.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46796.html">https://www.suse.com/security/cve/CVE-2024-46796.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46858.html">https://www.suse.com/security/cve/CVE-2024-46858.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47408.html">https://www.suse.com/security/cve/CVE-2024-47408.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47701.html">https://www.suse.com/security/cve/CVE-2024-47701.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-47794.html">https://www.suse.com/security/cve/CVE-2024-47794.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49571.html">https://www.suse.com/security/cve/CVE-2024-49571.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49884.html">https://www.suse.com/security/cve/CVE-2024-49884.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49924.html">https://www.suse.com/security/cve/CVE-2024-49924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49940.html">https://www.suse.com/security/cve/CVE-2024-49940.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49950.html">https://www.suse.com/security/cve/CVE-2024-49950.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49994.html">https://www.suse.com/security/cve/CVE-2024-49994.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50029.html">https://www.suse.com/security/cve/CVE-2024-50029.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50036.html">https://www.suse.com/security/cve/CVE-2024-50036.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50056.html">https://www.suse.com/security/cve/CVE-2024-50056.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50073.html">https://www.suse.com/security/cve/CVE-2024-50073.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50085.html">https://www.suse.com/security/cve/CVE-2024-50085.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">https://www.suse.com/security/cve/CVE-2024-50115.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50126.html">https://www.suse.com/security/cve/CVE-2024-50126.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50140.html">https://www.suse.com/security/cve/CVE-2024-50140.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50142.html">https://www.suse.com/security/cve/CVE-2024-50142.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50152.html">https://www.suse.com/security/cve/CVE-2024-50152.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50185.html">https://www.suse.com/security/cve/CVE-2024-50185.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50251.html">https://www.suse.com/security/cve/CVE-2024-50251.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50258.html">https://www.suse.com/security/cve/CVE-2024-50258.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">https://www.suse.com/security/cve/CVE-2024-50290.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50294.html">https://www.suse.com/security/cve/CVE-2024-50294.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50304.html">https://www.suse.com/security/cve/CVE-2024-50304.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-52559.html">https://www.suse.com/security/cve/CVE-2024-52559.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53057.html">https://www.suse.com/security/cve/CVE-2024-53057.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">https://www.suse.com/security/cve/CVE-2024-53063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53123.html">https://www.suse.com/security/cve/CVE-2024-53123.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53140.html">https://www.suse.com/security/cve/CVE-2024-53140.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53147.html">https://www.suse.com/security/cve/CVE-2024-53147.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53163.html">https://www.suse.com/security/cve/CVE-2024-53163.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53173.html">https://www.suse.com/security/cve/CVE-2024-53173.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53176.html">https://www.suse.com/security/cve/CVE-2024-53176.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53177.html">https://www.suse.com/security/cve/CVE-2024-53177.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53178.html">https://www.suse.com/security/cve/CVE-2024-53178.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53226.html">https://www.suse.com/security/cve/CVE-2024-53226.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53239.html">https://www.suse.com/security/cve/CVE-2024-53239.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53680.html">https://www.suse.com/security/cve/CVE-2024-53680.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-54683.html">https://www.suse.com/security/cve/CVE-2024-54683.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56539.html">https://www.suse.com/security/cve/CVE-2024-56539.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56548.html">https://www.suse.com/security/cve/CVE-2024-56548.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56579.html">https://www.suse.com/security/cve/CVE-2024-56579.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56592.html">https://www.suse.com/security/cve/CVE-2024-56592.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56605.html">https://www.suse.com/security/cve/CVE-2024-56605.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56633.html">https://www.suse.com/security/cve/CVE-2024-56633.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56638.html">https://www.suse.com/security/cve/CVE-2024-56638.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56640.html">https://www.suse.com/security/cve/CVE-2024-56640.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56647.html">https://www.suse.com/security/cve/CVE-2024-56647.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56658.html">https://www.suse.com/security/cve/CVE-2024-56658.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56702.html">https://www.suse.com/security/cve/CVE-2024-56702.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56703.html">https://www.suse.com/security/cve/CVE-2024-56703.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56718.html">https://www.suse.com/security/cve/CVE-2024-56718.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56719.html">https://www.suse.com/security/cve/CVE-2024-56719.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56720.html">https://www.suse.com/security/cve/CVE-2024-56720.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56751.html">https://www.suse.com/security/cve/CVE-2024-56751.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56758.html">https://www.suse.com/security/cve/CVE-2024-56758.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56770.html">https://www.suse.com/security/cve/CVE-2024-56770.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57807.html">https://www.suse.com/security/cve/CVE-2024-57807.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57834.html">https://www.suse.com/security/cve/CVE-2024-57834.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57882.html">https://www.suse.com/security/cve/CVE-2024-57882.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57889.html">https://www.suse.com/security/cve/CVE-2024-57889.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57900.html">https://www.suse.com/security/cve/CVE-2024-57900.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57947.html">https://www.suse.com/security/cve/CVE-2024-57947.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57948.html">https://www.suse.com/security/cve/CVE-2024-57948.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57973.html">https://www.suse.com/security/cve/CVE-2024-57973.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57974.html">https://www.suse.com/security/cve/CVE-2024-57974.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57978.html">https://www.suse.com/security/cve/CVE-2024-57978.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57979.html">https://www.suse.com/security/cve/CVE-2024-57979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57980.html">https://www.suse.com/security/cve/CVE-2024-57980.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57981.html">https://www.suse.com/security/cve/CVE-2024-57981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57986.html">https://www.suse.com/security/cve/CVE-2024-57986.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57990.html">https://www.suse.com/security/cve/CVE-2024-57990.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57993.html">https://www.suse.com/security/cve/CVE-2024-57993.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57994.html">https://www.suse.com/security/cve/CVE-2024-57994.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57996.html">https://www.suse.com/security/cve/CVE-2024-57996.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57997.html">https://www.suse.com/security/cve/CVE-2024-57997.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57999.html">https://www.suse.com/security/cve/CVE-2024-57999.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58002.html">https://www.suse.com/security/cve/CVE-2024-58002.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58005.html">https://www.suse.com/security/cve/CVE-2024-58005.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58006.html">https://www.suse.com/security/cve/CVE-2024-58006.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58007.html">https://www.suse.com/security/cve/CVE-2024-58007.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58009.html">https://www.suse.com/security/cve/CVE-2024-58009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58011.html">https://www.suse.com/security/cve/CVE-2024-58011.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58012.html">https://www.suse.com/security/cve/CVE-2024-58012.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58013.html">https://www.suse.com/security/cve/CVE-2024-58013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58014.html">https://www.suse.com/security/cve/CVE-2024-58014.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58017.html">https://www.suse.com/security/cve/CVE-2024-58017.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58019.html">https://www.suse.com/security/cve/CVE-2024-58019.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58020.html">https://www.suse.com/security/cve/CVE-2024-58020.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58034.html">https://www.suse.com/security/cve/CVE-2024-58034.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58051.html">https://www.suse.com/security/cve/CVE-2024-58051.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58052.html">https://www.suse.com/security/cve/CVE-2024-58052.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58054.html">https://www.suse.com/security/cve/CVE-2024-58054.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58055.html">https://www.suse.com/security/cve/CVE-2024-58055.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58056.html">https://www.suse.com/security/cve/CVE-2024-58056.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58057.html">https://www.suse.com/security/cve/CVE-2024-58057.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58058.html">https://www.suse.com/security/cve/CVE-2024-58058.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58061.html">https://www.suse.com/security/cve/CVE-2024-58061.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58063.html">https://www.suse.com/security/cve/CVE-2024-58063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58069.html">https://www.suse.com/security/cve/CVE-2024-58069.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58072.html">https://www.suse.com/security/cve/CVE-2024-58072.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58076.html">https://www.suse.com/security/cve/CVE-2024-58076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58078.html">https://www.suse.com/security/cve/CVE-2024-58078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58079.html">https://www.suse.com/security/cve/CVE-2024-58079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58080.html">https://www.suse.com/security/cve/CVE-2024-58080.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58083.html">https://www.suse.com/security/cve/CVE-2024-58083.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58085.html">https://www.suse.com/security/cve/CVE-2024-58085.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58086.html">https://www.suse.com/security/cve/CVE-2024-58086.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21631.html">https://www.suse.com/security/cve/CVE-2025-21631.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21635.html">https://www.suse.com/security/cve/CVE-2025-21635.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21636.html">https://www.suse.com/security/cve/CVE-2025-21636.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21637.html">https://www.suse.com/security/cve/CVE-2025-21637.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21638.html">https://www.suse.com/security/cve/CVE-2025-21638.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21639.html">https://www.suse.com/security/cve/CVE-2025-21639.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21640.html">https://www.suse.com/security/cve/CVE-2025-21640.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21647.html">https://www.suse.com/security/cve/CVE-2025-21647.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21659.html">https://www.suse.com/security/cve/CVE-2025-21659.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21665.html">https://www.suse.com/security/cve/CVE-2025-21665.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21666.html">https://www.suse.com/security/cve/CVE-2025-21666.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21667.html">https://www.suse.com/security/cve/CVE-2025-21667.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21668.html">https://www.suse.com/security/cve/CVE-2025-21668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21669.html">https://www.suse.com/security/cve/CVE-2025-21669.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21670.html">https://www.suse.com/security/cve/CVE-2025-21670.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21671.html">https://www.suse.com/security/cve/CVE-2025-21671.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21673.html">https://www.suse.com/security/cve/CVE-2025-21673.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21675.html">https://www.suse.com/security/cve/CVE-2025-21675.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21678.html">https://www.suse.com/security/cve/CVE-2025-21678.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21680.html">https://www.suse.com/security/cve/CVE-2025-21680.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21681.html">https://www.suse.com/security/cve/CVE-2025-21681.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21684.html">https://www.suse.com/security/cve/CVE-2025-21684.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21687.html">https://www.suse.com/security/cve/CVE-2025-21687.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21688.html">https://www.suse.com/security/cve/CVE-2025-21688.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21689.html">https://www.suse.com/security/cve/CVE-2025-21689.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21690.html">https://www.suse.com/security/cve/CVE-2025-21690.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21692.html">https://www.suse.com/security/cve/CVE-2025-21692.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21693.html">https://www.suse.com/security/cve/CVE-2025-21693.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21697.html">https://www.suse.com/security/cve/CVE-2025-21697.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21699.html">https://www.suse.com/security/cve/CVE-2025-21699.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21700.html">https://www.suse.com/security/cve/CVE-2025-21700.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21701.html">https://www.suse.com/security/cve/CVE-2025-21701.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21703.html">https://www.suse.com/security/cve/CVE-2025-21703.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21704.html">https://www.suse.com/security/cve/CVE-2025-21704.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21705.html">https://www.suse.com/security/cve/CVE-2025-21705.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21706.html">https://www.suse.com/security/cve/CVE-2025-21706.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21708.html">https://www.suse.com/security/cve/CVE-2025-21708.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21711.html">https://www.suse.com/security/cve/CVE-2025-21711.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21714.html">https://www.suse.com/security/cve/CVE-2025-21714.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21715.html">https://www.suse.com/security/cve/CVE-2025-21715.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21716.html">https://www.suse.com/security/cve/CVE-2025-21716.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21718.html">https://www.suse.com/security/cve/CVE-2025-21718.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21719.html">https://www.suse.com/security/cve/CVE-2025-21719.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21723.html">https://www.suse.com/security/cve/CVE-2025-21723.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21724.html">https://www.suse.com/security/cve/CVE-2025-21724.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21725.html">https://www.suse.com/security/cve/CVE-2025-21725.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21726.html">https://www.suse.com/security/cve/CVE-2025-21726.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21727.html">https://www.suse.com/security/cve/CVE-2025-21727.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21728.html">https://www.suse.com/security/cve/CVE-2025-21728.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21731.html">https://www.suse.com/security/cve/CVE-2025-21731.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21732.html">https://www.suse.com/security/cve/CVE-2025-21732.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21733.html">https://www.suse.com/security/cve/CVE-2025-21733.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21734.html">https://www.suse.com/security/cve/CVE-2025-21734.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21735.html">https://www.suse.com/security/cve/CVE-2025-21735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21736.html">https://www.suse.com/security/cve/CVE-2025-21736.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21738.html">https://www.suse.com/security/cve/CVE-2025-21738.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21739.html">https://www.suse.com/security/cve/CVE-2025-21739.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21741.html">https://www.suse.com/security/cve/CVE-2025-21741.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21742.html">https://www.suse.com/security/cve/CVE-2025-21742.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21743.html">https://www.suse.com/security/cve/CVE-2025-21743.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21744.html">https://www.suse.com/security/cve/CVE-2025-21744.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21745.html">https://www.suse.com/security/cve/CVE-2025-21745.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21749.html">https://www.suse.com/security/cve/CVE-2025-21749.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21750.html">https://www.suse.com/security/cve/CVE-2025-21750.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21753.html">https://www.suse.com/security/cve/CVE-2025-21753.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21754.html">https://www.suse.com/security/cve/CVE-2025-21754.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21756.html">https://www.suse.com/security/cve/CVE-2025-21756.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21759.html">https://www.suse.com/security/cve/CVE-2025-21759.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21760.html">https://www.suse.com/security/cve/CVE-2025-21760.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21761.html">https://www.suse.com/security/cve/CVE-2025-21761.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21762.html">https://www.suse.com/security/cve/CVE-2025-21762.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21763.html">https://www.suse.com/security/cve/CVE-2025-21763.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21764.html">https://www.suse.com/security/cve/CVE-2025-21764.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21765.html">https://www.suse.com/security/cve/CVE-2025-21765.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21766.html">https://www.suse.com/security/cve/CVE-2025-21766.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21767.html">https://www.suse.com/security/cve/CVE-2025-21767.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21772.html">https://www.suse.com/security/cve/CVE-2025-21772.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21773.html">https://www.suse.com/security/cve/CVE-2025-21773.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21775.html">https://www.suse.com/security/cve/CVE-2025-21775.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21776.html">https://www.suse.com/security/cve/CVE-2025-21776.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21779.html">https://www.suse.com/security/cve/CVE-2025-21779.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21780.html">https://www.suse.com/security/cve/CVE-2025-21780.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21781.html">https://www.suse.com/security/cve/CVE-2025-21781.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21782.html">https://www.suse.com/security/cve/CVE-2025-21782.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21784.html">https://www.suse.com/security/cve/CVE-2025-21784.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21785.html">https://www.suse.com/security/cve/CVE-2025-21785.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21790.html">https://www.suse.com/security/cve/CVE-2025-21790.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21791.html">https://www.suse.com/security/cve/CVE-2025-21791.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21793.html">https://www.suse.com/security/cve/CVE-2025-21793.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21794.html">https://www.suse.com/security/cve/CVE-2025-21794.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21795.html">https://www.suse.com/security/cve/CVE-2025-21795.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21796.html">https://www.suse.com/security/cve/CVE-2025-21796.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21799.html">https://www.suse.com/security/cve/CVE-2025-21799.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21802.html">https://www.suse.com/security/cve/CVE-2025-21802.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21804.html">https://www.suse.com/security/cve/CVE-2025-21804.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21810.html">https://www.suse.com/security/cve/CVE-2025-21810.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21815.html">https://www.suse.com/security/cve/CVE-2025-21815.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21819.html">https://www.suse.com/security/cve/CVE-2025-21819.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21820.html">https://www.suse.com/security/cve/CVE-2025-21820.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21821.html">https://www.suse.com/security/cve/CVE-2025-21821.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21823.html">https://www.suse.com/security/cve/CVE-2025-21823.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21825.html">https://www.suse.com/security/cve/CVE-2025-21825.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21828.html">https://www.suse.com/security/cve/CVE-2025-21828.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21829.html">https://www.suse.com/security/cve/CVE-2025-21829.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21830.html">https://www.suse.com/security/cve/CVE-2025-21830.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21831.html">https://www.suse.com/security/cve/CVE-2025-21831.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21832.html">https://www.suse.com/security/cve/CVE-2025-21832.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21835.html">https://www.suse.com/security/cve/CVE-2025-21835.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21838.html">https://www.suse.com/security/cve/CVE-2025-21838.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21844.html">https://www.suse.com/security/cve/CVE-2025-21844.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21846.html">https://www.suse.com/security/cve/CVE-2025-21846.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21847.html">https://www.suse.com/security/cve/CVE-2025-21847.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21848.html">https://www.suse.com/security/cve/CVE-2025-21848.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21850.html">https://www.suse.com/security/cve/CVE-2025-21850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21855.html">https://www.suse.com/security/cve/CVE-2025-21855.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21856.html">https://www.suse.com/security/cve/CVE-2025-21856.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21857.html">https://www.suse.com/security/cve/CVE-2025-21857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21858.html">https://www.suse.com/security/cve/CVE-2025-21858.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21859.html">https://www.suse.com/security/cve/CVE-2025-21859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21861.html">https://www.suse.com/security/cve/CVE-2025-21861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21862.html">https://www.suse.com/security/cve/CVE-2025-21862.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21864.html">https://www.suse.com/security/cve/CVE-2025-21864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21865.html">https://www.suse.com/security/cve/CVE-2025-21865.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21866.html">https://www.suse.com/security/cve/CVE-2025-21866.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21869.html">https://www.suse.com/security/cve/CVE-2025-21869.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21870.html">https://www.suse.com/security/cve/CVE-2025-21870.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21871.html">https://www.suse.com/security/cve/CVE-2025-21871.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21876.html">https://www.suse.com/security/cve/CVE-2025-21876.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21877.html">https://www.suse.com/security/cve/CVE-2025-21877.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21878.html">https://www.suse.com/security/cve/CVE-2025-21878.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21883.html">https://www.suse.com/security/cve/CVE-2025-21883.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21885.html">https://www.suse.com/security/cve/CVE-2025-21885.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21886.html">https://www.suse.com/security/cve/CVE-2025-21886.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21888.html">https://www.suse.com/security/cve/CVE-2025-21888.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21890.html">https://www.suse.com/security/cve/CVE-2025-21890.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21891.html">https://www.suse.com/security/cve/CVE-2025-21891.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21892.html">https://www.suse.com/security/cve/CVE-2025-21892.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">https://bugzilla.suse.com/show_bug.cgi?id=1207948</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215211">https://bugzilla.suse.com/show_bug.cgi?id=1215211</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218470">https://bugzilla.suse.com/show_bug.cgi?id=1218470</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219367">https://bugzilla.suse.com/show_bug.cgi?id=1219367</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221651">https://bugzilla.suse.com/show_bug.cgi?id=1221651</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222649">https://bugzilla.suse.com/show_bug.cgi?id=1222649</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222672">https://bugzilla.suse.com/show_bug.cgi?id=1222672</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222803">https://bugzilla.suse.com/show_bug.cgi?id=1222803</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223047">https://bugzilla.suse.com/show_bug.cgi?id=1223047</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224049">https://bugzilla.suse.com/show_bug.cgi?id=1224049</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224489">https://bugzilla.suse.com/show_bug.cgi?id=1224489</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224610">https://bugzilla.suse.com/show_bug.cgi?id=1224610</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225533">https://bugzilla.suse.com/show_bug.cgi?id=1225533</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225606">https://bugzilla.suse.com/show_bug.cgi?id=1225606</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225770">https://bugzilla.suse.com/show_bug.cgi?id=1225770</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225981">https://bugzilla.suse.com/show_bug.cgi?id=1225981</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226871">https://bugzilla.suse.com/show_bug.cgi?id=1226871</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227858">https://bugzilla.suse.com/show_bug.cgi?id=1227858</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227937">https://bugzilla.suse.com/show_bug.cgi?id=1227937</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228521">https://bugzilla.suse.com/show_bug.cgi?id=1228521</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228653">https://bugzilla.suse.com/show_bug.cgi?id=1228653</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229311">https://bugzilla.suse.com/show_bug.cgi?id=1229311</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229361">https://bugzilla.suse.com/show_bug.cgi?id=1229361</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230235">https://bugzilla.suse.com/show_bug.cgi?id=1230235</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230438">https://bugzilla.suse.com/show_bug.cgi?id=1230438</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230439">https://bugzilla.suse.com/show_bug.cgi?id=1230439</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230497">https://bugzilla.suse.com/show_bug.cgi?id=1230497</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230728">https://bugzilla.suse.com/show_bug.cgi?id=1230728</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230769">https://bugzilla.suse.com/show_bug.cgi?id=1230769</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230832">https://bugzilla.suse.com/show_bug.cgi?id=1230832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231088">https://bugzilla.suse.com/show_bug.cgi?id=1231088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231293">https://bugzilla.suse.com/show_bug.cgi?id=1231293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231432">https://bugzilla.suse.com/show_bug.cgi?id=1231432</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231912">https://bugzilla.suse.com/show_bug.cgi?id=1231912</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231920">https://bugzilla.suse.com/show_bug.cgi?id=1231920</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231949">https://bugzilla.suse.com/show_bug.cgi?id=1231949</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232159">https://bugzilla.suse.com/show_bug.cgi?id=1232159</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232198">https://bugzilla.suse.com/show_bug.cgi?id=1232198</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232201">https://bugzilla.suse.com/show_bug.cgi?id=1232201</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232299">https://bugzilla.suse.com/show_bug.cgi?id=1232299</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232364">https://bugzilla.suse.com/show_bug.cgi?id=1232364</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232389">https://bugzilla.suse.com/show_bug.cgi?id=1232389</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232421">https://bugzilla.suse.com/show_bug.cgi?id=1232421</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232508">https://bugzilla.suse.com/show_bug.cgi?id=1232508</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232520">https://bugzilla.suse.com/show_bug.cgi?id=1232520</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232743">https://bugzilla.suse.com/show_bug.cgi?id=1232743</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232812">https://bugzilla.suse.com/show_bug.cgi?id=1232812</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232848">https://bugzilla.suse.com/show_bug.cgi?id=1232848</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232895">https://bugzilla.suse.com/show_bug.cgi?id=1232895</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">https://bugzilla.suse.com/show_bug.cgi?id=1232919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233028">https://bugzilla.suse.com/show_bug.cgi?id=1233028</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233033">https://bugzilla.suse.com/show_bug.cgi?id=1233033</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233060">https://bugzilla.suse.com/show_bug.cgi?id=1233060</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233109">https://bugzilla.suse.com/show_bug.cgi?id=1233109</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233221">https://bugzilla.suse.com/show_bug.cgi?id=1233221</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233248">https://bugzilla.suse.com/show_bug.cgi?id=1233248</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233259">https://bugzilla.suse.com/show_bug.cgi?id=1233259</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233260">https://bugzilla.suse.com/show_bug.cgi?id=1233260</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">https://bugzilla.suse.com/show_bug.cgi?id=1233479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233483">https://bugzilla.suse.com/show_bug.cgi?id=1233483</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233522">https://bugzilla.suse.com/show_bug.cgi?id=1233522</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233551">https://bugzilla.suse.com/show_bug.cgi?id=1233551</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">https://bugzilla.suse.com/show_bug.cgi?id=1233557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233749">https://bugzilla.suse.com/show_bug.cgi?id=1233749</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234070">https://bugzilla.suse.com/show_bug.cgi?id=1234070</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234222">https://bugzilla.suse.com/show_bug.cgi?id=1234222</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234480">https://bugzilla.suse.com/show_bug.cgi?id=1234480</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234828">https://bugzilla.suse.com/show_bug.cgi?id=1234828</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">https://bugzilla.suse.com/show_bug.cgi?id=1234853</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234857">https://bugzilla.suse.com/show_bug.cgi?id=1234857</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">https://bugzilla.suse.com/show_bug.cgi?id=1234891</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234894">https://bugzilla.suse.com/show_bug.cgi?id=1234894</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234895">https://bugzilla.suse.com/show_bug.cgi?id=1234895</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234896">https://bugzilla.suse.com/show_bug.cgi?id=1234896</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234936">https://bugzilla.suse.com/show_bug.cgi?id=1234936</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">https://bugzilla.suse.com/show_bug.cgi?id=1234963</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">https://bugzilla.suse.com/show_bug.cgi?id=1235054</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">https://bugzilla.suse.com/show_bug.cgi?id=1235061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">https://bugzilla.suse.com/show_bug.cgi?id=1235073</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235244">https://bugzilla.suse.com/show_bug.cgi?id=1235244</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235435">https://bugzilla.suse.com/show_bug.cgi?id=1235435</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235436">https://bugzilla.suse.com/show_bug.cgi?id=1235436</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235441">https://bugzilla.suse.com/show_bug.cgi?id=1235441</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235455">https://bugzilla.suse.com/show_bug.cgi?id=1235455</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235485">https://bugzilla.suse.com/show_bug.cgi?id=1235485</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235501">https://bugzilla.suse.com/show_bug.cgi?id=1235501</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235524">https://bugzilla.suse.com/show_bug.cgi?id=1235524</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235589">https://bugzilla.suse.com/show_bug.cgi?id=1235589</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235591">https://bugzilla.suse.com/show_bug.cgi?id=1235591</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235592">https://bugzilla.suse.com/show_bug.cgi?id=1235592</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235599">https://bugzilla.suse.com/show_bug.cgi?id=1235599</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235609">https://bugzilla.suse.com/show_bug.cgi?id=1235609</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235621">https://bugzilla.suse.com/show_bug.cgi?id=1235621</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235637">https://bugzilla.suse.com/show_bug.cgi?id=1235637</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235698">https://bugzilla.suse.com/show_bug.cgi?id=1235698</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235711">https://bugzilla.suse.com/show_bug.cgi?id=1235711</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235712">https://bugzilla.suse.com/show_bug.cgi?id=1235712</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235715">https://bugzilla.suse.com/show_bug.cgi?id=1235715</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235729">https://bugzilla.suse.com/show_bug.cgi?id=1235729</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235733">https://bugzilla.suse.com/show_bug.cgi?id=1235733</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235761">https://bugzilla.suse.com/show_bug.cgi?id=1235761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235870">https://bugzilla.suse.com/show_bug.cgi?id=1235870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235874">https://bugzilla.suse.com/show_bug.cgi?id=1235874</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235914">https://bugzilla.suse.com/show_bug.cgi?id=1235914</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235932">https://bugzilla.suse.com/show_bug.cgi?id=1235932</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235933">https://bugzilla.suse.com/show_bug.cgi?id=1235933</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235973">https://bugzilla.suse.com/show_bug.cgi?id=1235973</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236099">https://bugzilla.suse.com/show_bug.cgi?id=1236099</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236111">https://bugzilla.suse.com/show_bug.cgi?id=1236111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236113">https://bugzilla.suse.com/show_bug.cgi?id=1236113</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236114">https://bugzilla.suse.com/show_bug.cgi?id=1236114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236115">https://bugzilla.suse.com/show_bug.cgi?id=1236115</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236122">https://bugzilla.suse.com/show_bug.cgi?id=1236122</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236123">https://bugzilla.suse.com/show_bug.cgi?id=1236123</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">https://bugzilla.suse.com/show_bug.cgi?id=1236133</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236138">https://bugzilla.suse.com/show_bug.cgi?id=1236138</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236199">https://bugzilla.suse.com/show_bug.cgi?id=1236199</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236200">https://bugzilla.suse.com/show_bug.cgi?id=1236200</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236203">https://bugzilla.suse.com/show_bug.cgi?id=1236203</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236205">https://bugzilla.suse.com/show_bug.cgi?id=1236205</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236206">https://bugzilla.suse.com/show_bug.cgi?id=1236206</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236333">https://bugzilla.suse.com/show_bug.cgi?id=1236333</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236573">https://bugzilla.suse.com/show_bug.cgi?id=1236573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236575">https://bugzilla.suse.com/show_bug.cgi?id=1236575</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">https://bugzilla.suse.com/show_bug.cgi?id=1236576</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236591">https://bugzilla.suse.com/show_bug.cgi?id=1236591</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">https://bugzilla.suse.com/show_bug.cgi?id=1236661</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">https://bugzilla.suse.com/show_bug.cgi?id=1236677</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236680">https://bugzilla.suse.com/show_bug.cgi?id=1236680</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236681">https://bugzilla.suse.com/show_bug.cgi?id=1236681</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236682">https://bugzilla.suse.com/show_bug.cgi?id=1236682</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236683">https://bugzilla.suse.com/show_bug.cgi?id=1236683</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236684">https://bugzilla.suse.com/show_bug.cgi?id=1236684</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236685">https://bugzilla.suse.com/show_bug.cgi?id=1236685</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236689">https://bugzilla.suse.com/show_bug.cgi?id=1236689</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236692">https://bugzilla.suse.com/show_bug.cgi?id=1236692</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236694">https://bugzilla.suse.com/show_bug.cgi?id=1236694</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236698">https://bugzilla.suse.com/show_bug.cgi?id=1236698</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236700">https://bugzilla.suse.com/show_bug.cgi?id=1236700</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236702">https://bugzilla.suse.com/show_bug.cgi?id=1236702</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236752">https://bugzilla.suse.com/show_bug.cgi?id=1236752</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236757">https://bugzilla.suse.com/show_bug.cgi?id=1236757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236758">https://bugzilla.suse.com/show_bug.cgi?id=1236758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236759">https://bugzilla.suse.com/show_bug.cgi?id=1236759</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236760">https://bugzilla.suse.com/show_bug.cgi?id=1236760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236761">https://bugzilla.suse.com/show_bug.cgi?id=1236761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236821">https://bugzilla.suse.com/show_bug.cgi?id=1236821</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236822">https://bugzilla.suse.com/show_bug.cgi?id=1236822</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236896">https://bugzilla.suse.com/show_bug.cgi?id=1236896</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236897">https://bugzilla.suse.com/show_bug.cgi?id=1236897</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236952">https://bugzilla.suse.com/show_bug.cgi?id=1236952</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236967">https://bugzilla.suse.com/show_bug.cgi?id=1236967</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236994">https://bugzilla.suse.com/show_bug.cgi?id=1236994</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237007">https://bugzilla.suse.com/show_bug.cgi?id=1237007</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237017">https://bugzilla.suse.com/show_bug.cgi?id=1237017</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">https://bugzilla.suse.com/show_bug.cgi?id=1237025</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">https://bugzilla.suse.com/show_bug.cgi?id=1237028</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237029">https://bugzilla.suse.com/show_bug.cgi?id=1237029</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237045">https://bugzilla.suse.com/show_bug.cgi?id=1237045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237126">https://bugzilla.suse.com/show_bug.cgi?id=1237126</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237132">https://bugzilla.suse.com/show_bug.cgi?id=1237132</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">https://bugzilla.suse.com/show_bug.cgi?id=1237139</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237155">https://bugzilla.suse.com/show_bug.cgi?id=1237155</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237158">https://bugzilla.suse.com/show_bug.cgi?id=1237158</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237159">https://bugzilla.suse.com/show_bug.cgi?id=1237159</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237164">https://bugzilla.suse.com/show_bug.cgi?id=1237164</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237232">https://bugzilla.suse.com/show_bug.cgi?id=1237232</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237234">https://bugzilla.suse.com/show_bug.cgi?id=1237234</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237313">https://bugzilla.suse.com/show_bug.cgi?id=1237313</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237325">https://bugzilla.suse.com/show_bug.cgi?id=1237325</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237356">https://bugzilla.suse.com/show_bug.cgi?id=1237356</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237415">https://bugzilla.suse.com/show_bug.cgi?id=1237415</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237452">https://bugzilla.suse.com/show_bug.cgi?id=1237452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237504">https://bugzilla.suse.com/show_bug.cgi?id=1237504</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237521">https://bugzilla.suse.com/show_bug.cgi?id=1237521</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237530">https://bugzilla.suse.com/show_bug.cgi?id=1237530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237558">https://bugzilla.suse.com/show_bug.cgi?id=1237558</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237562">https://bugzilla.suse.com/show_bug.cgi?id=1237562</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237563">https://bugzilla.suse.com/show_bug.cgi?id=1237563</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237565">https://bugzilla.suse.com/show_bug.cgi?id=1237565</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237571">https://bugzilla.suse.com/show_bug.cgi?id=1237571</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237848">https://bugzilla.suse.com/show_bug.cgi?id=1237848</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237849">https://bugzilla.suse.com/show_bug.cgi?id=1237849</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237853">https://bugzilla.suse.com/show_bug.cgi?id=1237853</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237856">https://bugzilla.suse.com/show_bug.cgi?id=1237856</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237873">https://bugzilla.suse.com/show_bug.cgi?id=1237873</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237875">https://bugzilla.suse.com/show_bug.cgi?id=1237875</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237876">https://bugzilla.suse.com/show_bug.cgi?id=1237876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237877">https://bugzilla.suse.com/show_bug.cgi?id=1237877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237879">https://bugzilla.suse.com/show_bug.cgi?id=1237879</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237881">https://bugzilla.suse.com/show_bug.cgi?id=1237881</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237885">https://bugzilla.suse.com/show_bug.cgi?id=1237885</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237889">https://bugzilla.suse.com/show_bug.cgi?id=1237889</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237890">https://bugzilla.suse.com/show_bug.cgi?id=1237890</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237891">https://bugzilla.suse.com/show_bug.cgi?id=1237891</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237894">https://bugzilla.suse.com/show_bug.cgi?id=1237894</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237897">https://bugzilla.suse.com/show_bug.cgi?id=1237897</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237900">https://bugzilla.suse.com/show_bug.cgi?id=1237900</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237901">https://bugzilla.suse.com/show_bug.cgi?id=1237901</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237906">https://bugzilla.suse.com/show_bug.cgi?id=1237906</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237907">https://bugzilla.suse.com/show_bug.cgi?id=1237907</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237911">https://bugzilla.suse.com/show_bug.cgi?id=1237911</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237912">https://bugzilla.suse.com/show_bug.cgi?id=1237912</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237950">https://bugzilla.suse.com/show_bug.cgi?id=1237950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238212">https://bugzilla.suse.com/show_bug.cgi?id=1238212</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238214">https://bugzilla.suse.com/show_bug.cgi?id=1238214</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238303">https://bugzilla.suse.com/show_bug.cgi?id=1238303</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238347">https://bugzilla.suse.com/show_bug.cgi?id=1238347</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238368">https://bugzilla.suse.com/show_bug.cgi?id=1238368</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238474">https://bugzilla.suse.com/show_bug.cgi?id=1238474</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238475">https://bugzilla.suse.com/show_bug.cgi?id=1238475</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238479">https://bugzilla.suse.com/show_bug.cgi?id=1238479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238494">https://bugzilla.suse.com/show_bug.cgi?id=1238494</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238496">https://bugzilla.suse.com/show_bug.cgi?id=1238496</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238497">https://bugzilla.suse.com/show_bug.cgi?id=1238497</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238500">https://bugzilla.suse.com/show_bug.cgi?id=1238500</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238501">https://bugzilla.suse.com/show_bug.cgi?id=1238501</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238502">https://bugzilla.suse.com/show_bug.cgi?id=1238502</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238503">https://bugzilla.suse.com/show_bug.cgi?id=1238503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238506">https://bugzilla.suse.com/show_bug.cgi?id=1238506</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238507">https://bugzilla.suse.com/show_bug.cgi?id=1238507</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238509">https://bugzilla.suse.com/show_bug.cgi?id=1238509</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238510">https://bugzilla.suse.com/show_bug.cgi?id=1238510</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238511">https://bugzilla.suse.com/show_bug.cgi?id=1238511</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238512">https://bugzilla.suse.com/show_bug.cgi?id=1238512</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238521">https://bugzilla.suse.com/show_bug.cgi?id=1238521</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238523">https://bugzilla.suse.com/show_bug.cgi?id=1238523</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238525">https://bugzilla.suse.com/show_bug.cgi?id=1238525</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238526">https://bugzilla.suse.com/show_bug.cgi?id=1238526</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238528">https://bugzilla.suse.com/show_bug.cgi?id=1238528</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238529">https://bugzilla.suse.com/show_bug.cgi?id=1238529</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238531">https://bugzilla.suse.com/show_bug.cgi?id=1238531</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238532">https://bugzilla.suse.com/show_bug.cgi?id=1238532</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238570">https://bugzilla.suse.com/show_bug.cgi?id=1238570</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238715">https://bugzilla.suse.com/show_bug.cgi?id=1238715</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238716">https://bugzilla.suse.com/show_bug.cgi?id=1238716</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238734">https://bugzilla.suse.com/show_bug.cgi?id=1238734</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238735">https://bugzilla.suse.com/show_bug.cgi?id=1238735</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238736">https://bugzilla.suse.com/show_bug.cgi?id=1238736</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238738">https://bugzilla.suse.com/show_bug.cgi?id=1238738</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238739">https://bugzilla.suse.com/show_bug.cgi?id=1238739</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238747">https://bugzilla.suse.com/show_bug.cgi?id=1238747</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238751">https://bugzilla.suse.com/show_bug.cgi?id=1238751</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238753">https://bugzilla.suse.com/show_bug.cgi?id=1238753</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238754">https://bugzilla.suse.com/show_bug.cgi?id=1238754</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238757">https://bugzilla.suse.com/show_bug.cgi?id=1238757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238759">https://bugzilla.suse.com/show_bug.cgi?id=1238759</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238760">https://bugzilla.suse.com/show_bug.cgi?id=1238760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238762">https://bugzilla.suse.com/show_bug.cgi?id=1238762</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238763">https://bugzilla.suse.com/show_bug.cgi?id=1238763</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238767">https://bugzilla.suse.com/show_bug.cgi?id=1238767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238768">https://bugzilla.suse.com/show_bug.cgi?id=1238768</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238771">https://bugzilla.suse.com/show_bug.cgi?id=1238771</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238772">https://bugzilla.suse.com/show_bug.cgi?id=1238772</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238773">https://bugzilla.suse.com/show_bug.cgi?id=1238773</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238775">https://bugzilla.suse.com/show_bug.cgi?id=1238775</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238780">https://bugzilla.suse.com/show_bug.cgi?id=1238780</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238781">https://bugzilla.suse.com/show_bug.cgi?id=1238781</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238785">https://bugzilla.suse.com/show_bug.cgi?id=1238785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238860">https://bugzilla.suse.com/show_bug.cgi?id=1238860</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238863">https://bugzilla.suse.com/show_bug.cgi?id=1238863</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238864">https://bugzilla.suse.com/show_bug.cgi?id=1238864</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238865">https://bugzilla.suse.com/show_bug.cgi?id=1238865</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238876">https://bugzilla.suse.com/show_bug.cgi?id=1238876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238877">https://bugzilla.suse.com/show_bug.cgi?id=1238877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238903">https://bugzilla.suse.com/show_bug.cgi?id=1238903</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238904">https://bugzilla.suse.com/show_bug.cgi?id=1238904</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238905">https://bugzilla.suse.com/show_bug.cgi?id=1238905</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238909">https://bugzilla.suse.com/show_bug.cgi?id=1238909</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238911">https://bugzilla.suse.com/show_bug.cgi?id=1238911</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238917">https://bugzilla.suse.com/show_bug.cgi?id=1238917</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238958">https://bugzilla.suse.com/show_bug.cgi?id=1238958</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238959">https://bugzilla.suse.com/show_bug.cgi?id=1238959</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238963">https://bugzilla.suse.com/show_bug.cgi?id=1238963</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238964">https://bugzilla.suse.com/show_bug.cgi?id=1238964</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238969">https://bugzilla.suse.com/show_bug.cgi?id=1238969</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238971">https://bugzilla.suse.com/show_bug.cgi?id=1238971</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238973">https://bugzilla.suse.com/show_bug.cgi?id=1238973</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238975">https://bugzilla.suse.com/show_bug.cgi?id=1238975</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238978">https://bugzilla.suse.com/show_bug.cgi?id=1238978</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238979">https://bugzilla.suse.com/show_bug.cgi?id=1238979</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238981">https://bugzilla.suse.com/show_bug.cgi?id=1238981</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238984">https://bugzilla.suse.com/show_bug.cgi?id=1238984</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238986">https://bugzilla.suse.com/show_bug.cgi?id=1238986</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238993">https://bugzilla.suse.com/show_bug.cgi?id=1238993</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238994">https://bugzilla.suse.com/show_bug.cgi?id=1238994</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238997">https://bugzilla.suse.com/show_bug.cgi?id=1238997</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239015">https://bugzilla.suse.com/show_bug.cgi?id=1239015</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239016">https://bugzilla.suse.com/show_bug.cgi?id=1239016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239027">https://bugzilla.suse.com/show_bug.cgi?id=1239027</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239029">https://bugzilla.suse.com/show_bug.cgi?id=1239029</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239030">https://bugzilla.suse.com/show_bug.cgi?id=1239030</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239033">https://bugzilla.suse.com/show_bug.cgi?id=1239033</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239034">https://bugzilla.suse.com/show_bug.cgi?id=1239034</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239036">https://bugzilla.suse.com/show_bug.cgi?id=1239036</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239037">https://bugzilla.suse.com/show_bug.cgi?id=1239037</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239038">https://bugzilla.suse.com/show_bug.cgi?id=1239038</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239039">https://bugzilla.suse.com/show_bug.cgi?id=1239039</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239045">https://bugzilla.suse.com/show_bug.cgi?id=1239045</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239065">https://bugzilla.suse.com/show_bug.cgi?id=1239065</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239068">https://bugzilla.suse.com/show_bug.cgi?id=1239068</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239073">https://bugzilla.suse.com/show_bug.cgi?id=1239073</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239076">https://bugzilla.suse.com/show_bug.cgi?id=1239076</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239080">https://bugzilla.suse.com/show_bug.cgi?id=1239080</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239085">https://bugzilla.suse.com/show_bug.cgi?id=1239085</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239087">https://bugzilla.suse.com/show_bug.cgi?id=1239087</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239095">https://bugzilla.suse.com/show_bug.cgi?id=1239095</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239104">https://bugzilla.suse.com/show_bug.cgi?id=1239104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239105">https://bugzilla.suse.com/show_bug.cgi?id=1239105</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239109">https://bugzilla.suse.com/show_bug.cgi?id=1239109</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239112">https://bugzilla.suse.com/show_bug.cgi?id=1239112</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239114">https://bugzilla.suse.com/show_bug.cgi?id=1239114</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239115">https://bugzilla.suse.com/show_bug.cgi?id=1239115</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239117">https://bugzilla.suse.com/show_bug.cgi?id=1239117</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239167">https://bugzilla.suse.com/show_bug.cgi?id=1239167</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239174">https://bugzilla.suse.com/show_bug.cgi?id=1239174</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239346">https://bugzilla.suse.com/show_bug.cgi?id=1239346</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239349">https://bugzilla.suse.com/show_bug.cgi?id=1239349</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239435">https://bugzilla.suse.com/show_bug.cgi?id=1239435</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239467">https://bugzilla.suse.com/show_bug.cgi?id=1239467</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239468">https://bugzilla.suse.com/show_bug.cgi?id=1239468</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239471">https://bugzilla.suse.com/show_bug.cgi?id=1239471</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239473">https://bugzilla.suse.com/show_bug.cgi?id=1239473</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239474">https://bugzilla.suse.com/show_bug.cgi?id=1239474</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239477">https://bugzilla.suse.com/show_bug.cgi?id=1239477</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239478">https://bugzilla.suse.com/show_bug.cgi?id=1239478</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239479">https://bugzilla.suse.com/show_bug.cgi?id=1239479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239481">https://bugzilla.suse.com/show_bug.cgi?id=1239481</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239482">https://bugzilla.suse.com/show_bug.cgi?id=1239482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239483">https://bugzilla.suse.com/show_bug.cgi?id=1239483</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239484">https://bugzilla.suse.com/show_bug.cgi?id=1239484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239486">https://bugzilla.suse.com/show_bug.cgi?id=1239486</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239508">https://bugzilla.suse.com/show_bug.cgi?id=1239508</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239512">https://bugzilla.suse.com/show_bug.cgi?id=1239512</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239518">https://bugzilla.suse.com/show_bug.cgi?id=1239518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239573">https://bugzilla.suse.com/show_bug.cgi?id=1239573</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239594">https://bugzilla.suse.com/show_bug.cgi?id=1239594</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239595">https://bugzilla.suse.com/show_bug.cgi?id=1239595</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239600">https://bugzilla.suse.com/show_bug.cgi?id=1239600</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239605">https://bugzilla.suse.com/show_bug.cgi?id=1239605</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239615">https://bugzilla.suse.com/show_bug.cgi?id=1239615</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239644">https://bugzilla.suse.com/show_bug.cgi?id=1239644</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239707">https://bugzilla.suse.com/show_bug.cgi?id=1239707</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239986">https://bugzilla.suse.com/show_bug.cgi?id=1239986</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239994">https://bugzilla.suse.com/show_bug.cgi?id=1239994</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240169">https://bugzilla.suse.com/show_bug.cgi?id=1240169</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240172">https://bugzilla.suse.com/show_bug.cgi?id=1240172</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240173">https://bugzilla.suse.com/show_bug.cgi?id=1240173</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240175">https://bugzilla.suse.com/show_bug.cgi?id=1240175</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240177">https://bugzilla.suse.com/show_bug.cgi?id=1240177</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240179">https://bugzilla.suse.com/show_bug.cgi?id=1240179</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240182">https://bugzilla.suse.com/show_bug.cgi?id=1240182</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240183">https://bugzilla.suse.com/show_bug.cgi?id=1240183</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240186">https://bugzilla.suse.com/show_bug.cgi?id=1240186</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240188">https://bugzilla.suse.com/show_bug.cgi?id=1240188</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240189">https://bugzilla.suse.com/show_bug.cgi?id=1240189</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240191">https://bugzilla.suse.com/show_bug.cgi?id=1240191</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240192">https://bugzilla.suse.com/show_bug.cgi?id=1240192</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240333">https://bugzilla.suse.com/show_bug.cgi?id=1240333</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240334">https://bugzilla.suse.com/show_bug.cgi?id=1240334</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10028">https://jira.suse.com/browse/PED-10028</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-10701">https://jira.suse.com/browse/PED-10701</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-11253">https://jira.suse.com/browse/PED-11253</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-12094">https://jira.suse.com/browse/PED-12094</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-12251">https://jira.suse.com/browse/PED-12251</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-12416">https://jira.suse.com/browse/PED-12416</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-348">https://jira.suse.com/browse/PED-348</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-7619">https://jira.suse.com/browse/PED-7619</a>
</li>


</ul>

</div>

--===============4470831759471973195==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung