SUSE 5175 Published by

SUSE Linux has received several updates, including a security update for the Linux Kernel, and moderate updates for docker-stable and firefox-esr:

SUSE-SU-2024:4313-1: important: Security update for the Linux Kernel
SUSE-SU-2024:4316-1: important: Security update for the Linux Kernel
SUSE-SU-2024:4318-1: important: Security update for the Linux Kernel
SUSE-SU-2024:4314-1: important: Security update for the Linux Kernel
openSUSE-SU-2024:14571-1: moderate: docker-stable-24.0.9_ce-4.1 on GA media
openSUSE-SU-2024:14572-1: moderate: firefox-esr-128.5.1-1.1 on GA media
SUSE-SU-2024:4315-1: important: Security update for the Linux Kernel




SUSE-SU-2024:4313-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4313-1
Release Date: 2024-12-13T15:20:18Z
Rating: important
References:

* bsc#1154353
* bsc#1198778
* bsc#1218644
* bsc#1220927
* bsc#1231939
* bsc#1231940
* bsc#1231958
* bsc#1231962
* bsc#1231991
* bsc#1231992
* bsc#1231995
* bsc#1232006
* bsc#1232163
* bsc#1232172
* bsc#1232224
* bsc#1232436
* bsc#1232860
* bsc#1232907
* bsc#1232919
* bsc#1232928
* bsc#1233070
* bsc#1233117
* bsc#1233293
* bsc#1233453
* bsc#1233456
* bsc#1233468
* bsc#1233479
* bsc#1233490
* bsc#1233491
* bsc#1233555
* bsc#1233557
* jsc#SLE-8100

Cross-References:

* CVE-2022-48985
* CVE-2022-49006
* CVE-2022-49010
* CVE-2022-49011
* CVE-2022-49019
* CVE-2022-49021
* CVE-2022-49022
* CVE-2022-49029
* CVE-2022-49031
* CVE-2022-49032
* CVE-2023-52524
* CVE-2024-49925
* CVE-2024-50089
* CVE-2024-50115
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50154
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50264
* CVE-2024-50267
* CVE-2024-50279
* CVE-2024-50290
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53061
* CVE-2024-53063

CVSS scores:

* CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49006 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49010 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2

An update that solves 27 vulnerabilities, contains one feature and has four
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070)
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
(bsc#1233117).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk
(bsc#1233456).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus
(bsc#1233479).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233490).
* CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).

The following non-security bugs were fixed:

* Update config files (bsc#1218644).
* e1000e: Correct NVM checksum verification flow (jsc#SLE-8100).
* e1000e: Correct NVM checksum verification flow (jsc#SLE-8100).
* e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
* e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
* ena: Remove rcu_read_lock() around XDP program invocation (bsc#1198778).
* ethernet: amazon: ena: A typo fix in the file ena_com.h (bsc#1198778).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* net: ena: Add capabilities field with support for ENI stats capability
(bsc#1198778).
* net: ena: Add debug prints for invalid req_id resets (bsc#1198778).
* net: ena: Change ENI stats support check to use capabilities field
(bsc#1198778).
* net: ena: Change return value of ena_calc_io_queue_size() to void
(bsc#1198778).
* net: ena: Change the name of bad_csum variable (bsc#1198778).
* net: ena: Extract recurring driver reset code into a function (bsc#1198778).
* net: ena: Flush XDP packets on error (bsc#1198778).
* net: ena: Improve error logging in driver (bsc#1198778).
* net: ena: Move reset completion print to the reset function (bsc#1198778).
* net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198778).
* net: ena: Remove module param and change message severity (bsc#1198778).
* net: ena: Remove redundant return code check (bsc#1198778).
* net: ena: Remove unused code (bsc#1198778).
* net: ena: Set tx_info->xdpf value to NULL (bsc#1198778).
* net: ena: Update XDP verdict upon failure (bsc#1198778).
* net: ena: Use bitmask to indicate packet redirection (bsc#1198778).
* net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198778).
* net: ena: add device distinct log prefix to files (bsc#1198778).
* net: ena: add jiffies of last napi call to stats (bsc#1198778).
* net: ena: aggregate doorbell common operations into a function
(bsc#1198778).
* net: ena: aggregate stats increase into a function (bsc#1198778).
* net: ena: fix DMA mapping function issues in XDP (bsc#1198778).
* net: ena: fix coding style nits (bsc#1198778).
* net: ena: fix inaccurate print type (bsc#1198778).
* net: ena: introduce XDP redirect implementation (bsc#1198778).
* net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1198778).
* net: ena: make symbol 'ena_alloc_map_page' static (bsc#1198778).
* net: ena: re-organize code to improve readability (bsc#1198778).
* net: ena: remove extra words from comments (bsc#1198778).
* net: ena: store values in their appropriate variables types (bsc#1198778).
* net: ena: use build_skb() in RX path (bsc#1198778).
* net: ena: use constant value for net_device allocation (bsc#1198778).
* net: ena: use xdp_frame in XDP TX flow (bsc#1198778).
* net: ena: use xdp_return_frame() to free xdp frames (bsc#1198778).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* tools headers: Grab copy of linux/const.h, needed by linux/bits.h
(bsc#1154353).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4313=1

* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4313=1

* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-4313=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4313=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4313=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4313=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4313=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4313=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4313=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4313=1

## Package List:

* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (noarch)
* kernel-docs-html-5.3.18-150300.59.185.1
* kernel-source-vanilla-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* kernel-macros-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.185.1
* kernel-debug-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-debugsource-5.3.18-150300.59.185.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-devel-5.3.18-150300.59.185.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.185.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-kvmsmall-devel-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-rebuild-5.3.18-150300.59.185.1.150300.18.109.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* cluster-md-kmp-default-5.3.18-150300.59.185.1
* ocfs2-kmp-default-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-5.3.18-150300.59.185.1
* kernel-default-livepatch-5.3.18-150300.59.185.1
* kernel-default-extra-5.3.18-150300.59.185.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-qa-5.3.18-150300.59.185.1
* dlm-kmp-default-5.3.18-150300.59.185.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.185.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-default-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-optional-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_185-default-debuginfo-1-150300.7.3.1
* kernel-default-livepatch-devel-5.3.18-150300.59.185.1
* kernel-livepatch-SLE15-SP3_Update_51-debugsource-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_185-default-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_185-preempt-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_185-preempt-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* kselftests-kmp-preempt-5.3.18-150300.59.185.1
* kernel-preempt-optional-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* reiserfs-kmp-preempt-5.3.18-150300.59.185.1
* ocfs2-kmp-preempt-5.3.18-150300.59.185.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* cluster-md-kmp-preempt-5.3.18-150300.59.185.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-preempt-5.3.18-150300.59.185.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* dlm-kmp-preempt-5.3.18-150300.59.185.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-extra-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.185.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.185.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64)
* dtb-xilinx-5.3.18-150300.59.185.1
* dtb-altera-5.3.18-150300.59.185.1
* dtb-zte-5.3.18-150300.59.185.1
* dtb-sprd-5.3.18-150300.59.185.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-extra-5.3.18-150300.59.185.1
* dtb-al-5.3.18-150300.59.185.1
* dtb-broadcom-5.3.18-150300.59.185.1
* kernel-64kb-optional-5.3.18-150300.59.185.1
* dtb-apm-5.3.18-150300.59.185.1
* dtb-exynos-5.3.18-150300.59.185.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.185.1
* ocfs2-kmp-64kb-5.3.18-150300.59.185.1
* reiserfs-kmp-64kb-5.3.18-150300.59.185.1
* dtb-rockchip-5.3.18-150300.59.185.1
* kselftests-kmp-64kb-5.3.18-150300.59.185.1
* dtb-marvell-5.3.18-150300.59.185.1
* gfs2-kmp-64kb-5.3.18-150300.59.185.1
* dtb-freescale-5.3.18-150300.59.185.1
* dtb-amlogic-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* dtb-nvidia-5.3.18-150300.59.185.1
* dtb-hisilicon-5.3.18-150300.59.185.1
* dtb-amd-5.3.18-150300.59.185.1
* dtb-qcom-5.3.18-150300.59.185.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.185.1
* dtb-renesas-5.3.18-150300.59.185.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-lg-5.3.18-150300.59.185.1
* dlm-kmp-64kb-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* dtb-mediatek-5.3.18-150300.59.185.1
* dtb-socionext-5.3.18-150300.59.185.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-allwinner-5.3.18-150300.59.185.1
* dtb-cavium-5.3.18-150300.59.185.1
* cluster-md-kmp-64kb-5.3.18-150300.59.185.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-arm-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-default-livepatch-devel-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-livepatch-5.3.18-150300.59.185.1
* kernel-livepatch-5_3_18-150300_59_185-default-1-150300.7.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* ocfs2-kmp-default-5.3.18-150300.59.185.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* dlm-kmp-default-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-5.3.18-150300.59.185.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* cluster-md-kmp-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-default-5.3.18-150300.59.185.1
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64)
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.185.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-default-5.3.18-150300.59.185.1
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1

## References:

* https://www.suse.com/security/cve/CVE-2022-48985.html
* https://www.suse.com/security/cve/CVE-2022-49006.html
* https://www.suse.com/security/cve/CVE-2022-49010.html
* https://www.suse.com/security/cve/CVE-2022-49011.html
* https://www.suse.com/security/cve/CVE-2022-49019.html
* https://www.suse.com/security/cve/CVE-2022-49021.html
* https://www.suse.com/security/cve/CVE-2022-49022.html
* https://www.suse.com/security/cve/CVE-2022-49029.html
* https://www.suse.com/security/cve/CVE-2022-49031.html
* https://www.suse.com/security/cve/CVE-2022-49032.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://bugzilla.suse.com/show_bug.cgi?id=1154353
* https://bugzilla.suse.com/show_bug.cgi?id=1198778
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1231939
* https://bugzilla.suse.com/show_bug.cgi?id=1231940
* https://bugzilla.suse.com/show_bug.cgi?id=1231958
* https://bugzilla.suse.com/show_bug.cgi?id=1231962
* https://bugzilla.suse.com/show_bug.cgi?id=1231991
* https://bugzilla.suse.com/show_bug.cgi?id=1231992
* https://bugzilla.suse.com/show_bug.cgi?id=1231995
* https://bugzilla.suse.com/show_bug.cgi?id=1232006
* https://bugzilla.suse.com/show_bug.cgi?id=1232163
* https://bugzilla.suse.com/show_bug.cgi?id=1232172
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://jira.suse.com/browse/SLE-8100



SUSE-SU-2024:4316-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4316-1
Release Date: 2024-12-13T15:24:05Z
Rating: important
References:

* bsc#1012628
* bsc#1082555
* bsc#1194869
* bsc#1215199
* bsc#1218644
* bsc#1220355
* bsc#1221309
* bsc#1222423
* bsc#1222587
* bsc#1222590
* bsc#1223112
* bsc#1223656
* bsc#1223733
* bsc#1224429
* bsc#1224518
* bsc#1224548
* bsc#1224948
* bsc#1225713
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225768
* bsc#1225813
* bsc#1225903
* bsc#1226130
* bsc#1226748
* bsc#1226872
* bsc#1227726
* bsc#1227842
* bsc#1228430
* bsc#1228850
* bsc#1229165
* bsc#1230231
* bsc#1230557
* bsc#1230558
* bsc#1230733
* bsc#1230807
* bsc#1230817
* bsc#1230827
* bsc#1230971
* bsc#1231076
* bsc#1231114
* bsc#1231182
* bsc#1231453
* bsc#1231465
* bsc#1231630
* bsc#1231920
* bsc#1231930
* bsc#1231946
* bsc#1231952
* bsc#1232096
* bsc#1232103
* bsc#1232104
* bsc#1232157
* bsc#1232165
* bsc#1232166
* bsc#1232198
* bsc#1232201
* bsc#1232207
* bsc#1232208
* bsc#1232224
* bsc#1232258
* bsc#1232264
* bsc#1232272
* bsc#1232318
* bsc#1232335
* bsc#1232357
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232371
* bsc#1232374
* bsc#1232385
* bsc#1232386
* bsc#1232387
* bsc#1232396
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232442
* bsc#1232446
* bsc#1232483
* bsc#1232494
* bsc#1232498
* bsc#1232499
* bsc#1232500
* bsc#1232704
* bsc#1232757
* bsc#1232823
* bsc#1232860
* bsc#1232869
* bsc#1232870
* bsc#1232873
* bsc#1232876
* bsc#1232877
* bsc#1232878
* bsc#1232880
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232894
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232914
* bsc#1232919
* bsc#1232925
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233029
* bsc#1233032
* bsc#1233035
* bsc#1233036
* bsc#1233041
* bsc#1233044
* bsc#1233049
* bsc#1233050
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233062
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233088
* bsc#1233091
* bsc#1233092
* bsc#1233097
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233115
* bsc#1233117
* bsc#1233119
* bsc#1233123
* bsc#1233125
* bsc#1233127
* bsc#1233129
* bsc#1233130
* bsc#1233132
* bsc#1233135
* bsc#1233176
* bsc#1233179
* bsc#1233185
* bsc#1233188
* bsc#1233189
* bsc#1233191
* bsc#1233193
* bsc#1233197
* bsc#1233201
* bsc#1233203
* bsc#1233204
* bsc#1233205
* bsc#1233206
* bsc#1233207
* bsc#1233208
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233216
* bsc#1233217
* bsc#1233219
* bsc#1233226
* bsc#1233238
* bsc#1233241
* bsc#1233244
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233298
* bsc#1233305
* bsc#1233320
* bsc#1233350
* bsc#1233443
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233464
* bsc#1233465
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233485
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233523
* bsc#1233524
* bsc#1233540
* bsc#1233547
* bsc#1233548
* bsc#1233550
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233564
* bsc#1233566
* bsc#1233567
* bsc#1233568
* bsc#1233570
* bsc#1233572
* bsc#1233573
* bsc#1233577
* bsc#1233580
* bsc#1233640
* bsc#1233641
* bsc#1233642
* bsc#1233721
* bsc#1233754
* bsc#1233756
* bsc#1233769
* bsc#1233771
* bsc#1233977
* bsc#1234009
* bsc#1234011
* bsc#1234012
* bsc#1234025
* bsc#1234039
* bsc#1234040
* bsc#1234041
* bsc#1234042
* bsc#1234043
* bsc#1234044
* bsc#1234045
* bsc#1234046
* bsc#1234072
* bsc#1234078
* bsc#1234081
* bsc#1234083
* bsc#1234085
* bsc#1234087
* bsc#1234093
* bsc#1234098
* bsc#1234108
* bsc#1234121
* bsc#1234223
* jsc#PED-11316
* jsc#PED-11442
* jsc#PED-11580
* jsc#PED-9943

Cross-References:

* CVE-2023-52778
* CVE-2023-52920
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26596
* CVE-2024-26703
* CVE-2024-26741
* CVE-2024-26782
* CVE-2024-26864
* CVE-2024-26953
* CVE-2024-27017
* CVE-2024-27407
* CVE-2024-35888
* CVE-2024-36000
* CVE-2024-36031
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36920
* CVE-2024-36927
* CVE-2024-36954
* CVE-2024-36968
* CVE-2024-38589
* CVE-2024-40914
* CVE-2024-41023
* CVE-2024-42102
* CVE-2024-44995
* CVE-2024-46680
* CVE-2024-46681
* CVE-2024-46765
* CVE-2024-46788
* CVE-2024-46800
* CVE-2024-46828
* CVE-2024-46845
* CVE-2024-47666
* CVE-2024-47679
* CVE-2024-47701
* CVE-2024-47703
* CVE-2024-49868
* CVE-2024-49884
* CVE-2024-49888
* CVE-2024-49899
* CVE-2024-49905
* CVE-2024-49908
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49925
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49952
* CVE-2024-49968
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49983
* CVE-2024-49987
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50006
* CVE-2024-50009
* CVE-2024-50012
* CVE-2024-50014
* CVE-2024-50026
* CVE-2024-50067
* CVE-2024-50082
* CVE-2024-50084
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50121
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50141
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50169
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50218
* CVE-2024-50221
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50228
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50240
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50252
* CVE-2024-50255
* CVE-2024-50257
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50275
* CVE-2024-50276
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50296
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53042
* CVE-2024-53043
* CVE-2024-53045
* CVE-2024-53048
* CVE-2024-53051
* CVE-2024-53052
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53072
* CVE-2024-53074
* CVE-2024-53076
* CVE-2024-53079
* CVE-2024-53081
* CVE-2024-53082
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53093
* CVE-2024-53094
* CVE-2024-53095
* CVE-2024-53096
* CVE-2024-53100
* CVE-2024-53101
* CVE-2024-53104
* CVE-2024-53106
* CVE-2024-53108
* CVE-2024-53110
* CVE-2024-53112
* CVE-2024-53114
* CVE-2024-53121
* CVE-2024-53138

CVSS scores:

* CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-42102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47703 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49987 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50139 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50169 ( SUSE ): 0.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50231 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50248 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53100 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 228 vulnerabilities, contains four features and has 44
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
* CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
precision tracking (bsc#1232823).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished() (bsc#1222587).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink
dump (bsc#1223733).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
wb_dirty_limits(), again" (bsc#1233132).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (bsc#1232367).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
(bsc#1232258).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
monitor (bsc#1232385).
* CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).
* CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).
* CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
(bsc#1232498).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
* CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
* CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
* CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
* CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219).
* CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
(bsc#1233464).
* CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
(bsc#1233465).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).
* CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).

The following non-security bugs were fixed:

* ACPI: CPPC: Fix _CPC register setting issue (git-fixes).
* ALSA: 6fire: Release resources at card release (git-fixes).
* ALSA: ac97: bus: Fix the mistake in the comment (git-fixes).
* ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
(git-fixes).
* ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
* ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-
fixes).
* ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).
* ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
(bsc#1233298).
* ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
* ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes).
* ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
* ALSA: hda: Show the codec quirk info at probing (stable-fixes).
* ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).
* ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable-
fixes).
* ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
* ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
* ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
* ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable-
fixes).
* ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
devices (git-fixes).
* ALSA: usb-audio: Make mic volume workarounds globally applicable (stable-
fixes).
* ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
(stable-fixes).
* ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* ASoC: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).
* ASoC: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).
* ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
* ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
* ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).
* ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).
* ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
* ASoC: SOF: Wire up buffer flags (bsc#1233305).
* ASoC: SOF: add alignment for topology header file struct definition
(bsc#1233305).
* ASoC: SOF: align topology header file with sof topology header
(bsc#1233305).
* ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
(git-fixes).
* ASoC: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
* ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
* ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA
(bsc#1233305).
* ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).
* ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).
* ASoC: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).
* ASoC: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).
* ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
(bsc#1233305).
* ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
fixes).
* ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
* ASoC: SOF: topology: dynamically allocate and store DAI widget->private
(bsc#1233305).
* ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
* ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
* ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
(stable-fixes).
* ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
* ASoC: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).
* ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* ASoC: fsl_micfil: Add sample rate constraint (stable-fixes).
* ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes).
* ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
* ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-
fixes).
* ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
(stable-fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
(stable-fixes).
* ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
(stable-fixes).
* Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
* Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* Bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
* Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
* Documentation: kgdb: Correct parameter error (git-fixes).
* Drop OCFS2 patch causing a regression (bsc#1233255)
* HID: core: zero-initialize the report buffer (git-fixes).
* HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* HID: multitouch: Add support for B2402FVA track point (stable-fixes).
* HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* HID: wacom: fix when get product name maybe null pointer (git-fixes).
* Input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
* Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
* Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
* Input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
* Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
fixes).
* Input: xpad - add support for MSI Claw A1M (git-fixes).
* Input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
* Input: xpad - fix support for some third-party controllers (git-fixes).
* Input: xpad - sort xpad_device by vendor and product ID (git-fixes).
* Input: xpad - spelling fixes for "Xbox" (git-fixes).
* KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).
* KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
(bsc#1215199).
* KVM: PPC: Book3S HV: remove unused varible (bsc#1194869).
* KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
(bsc#1232207).
* KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
* Move kabi netfilter fix into patches.kabi
* Move upstreamed crypto patches into sorted section
* Move upstreamed patches into sorted section
* NFS: remove revoked delegation from server's delegation list (git-fixes).
* PCI: Add T_PVPERL macro (git-fixes).
* PCI: Fix reset_method_store() memory leak (git-fixes).
* PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* PCI: rockchip-ep: Fix address translation unit programming (git-fixes).
* RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* RDMA/hns: Add mutex_destroy() (git-fixes)
* RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
fixes)
* RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* RDMA/hns: Use macro instead of magic number (git-fixes)
* RDMA/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* RDMA/rxe: Fix the qp flush warnings in req (git-fixes)
* RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
* Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1"
(bsc#1215199).
* Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes)
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable-
fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* SUNRPC: Remove BUG_ON call sites (git-fixes).
* USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* USB: chaoskey: fail open after removal (git-fixes).
* USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
* USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* USB: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* USB: serial: option: add Quectel RG650V (stable-fixes).
* USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
(git-fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* add bugreference to a hv_netvsc patch (bsc#1232413).
* aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* apparmor: fix 'Do simple duplicate message elimination' (git-fixes).
* apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
* apparmor: use kvfree_sensitive to free data->data (git-fixes).
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
fixes).
* bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
* btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
switching CAN modes (git-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
* clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
* clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
* clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
* clk: imx: fracn-gppll: fix pll power up (git-fixes).
* clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
* clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
* clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
* clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
* clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
* clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
* cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
* cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
(git-fixes).
* crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
* crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return
-EBUSY (git-fixes).
* crypto: qat - remove check after debugfs_create_dir() (git-fixes).
* crypto: qat - remove faulty arbiter config reset (git-fixes).
* crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* doc: rcu: update printed dynticks counter bits (git-fixes).
* drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
(git-fixes).
* drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
* drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
dcn20_program_pipe (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp
(git-fixes).
* drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
* drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
* drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
* drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
* drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
* drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
* drm/msm: Fix some typos in comment (git-fixes).
* drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).
* drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
* drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
* drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
* drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
* e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
* efi/libstub: Free correct pointer on failure (git-fixes).
* efi/libstub: fix efi_parse_options() ignoring the default command line (git-
fixes).
* efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* ext4: fix unttached inode after power cut with orphan file feature enabled
(bsc#1234009).
* f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).
* fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
fixes).
* firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
fixes).
* fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)
* fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gpio: exar: set value when external pull-up or pull-down is present (git-
fixes).
* gpio: zevio: Add missed label initialisation (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
(git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* i40e: fix race condition by adding filter's intermediate sync state (git-
fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* igb: Disable threaded IRQ for igb_msix_other (git-fixes).
* iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
* iio: accel: kx022a: Fix raw read format (git-fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
* iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* intel_idle: add Granite Rapids Xeon support (bsc#1231630).
* intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
* io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
* io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
* jbd2: avoid infinite transaction commit loop (bsc#1234039).
* jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
* jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).
* jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).
* jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
* jbd2: fix potential data lost in recovering journal raced with synchronizing
fs bdev (bsc#1234044).
* jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
* jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
* jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
* kABI workaround for ASoC SOF (bsc#1233305).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
fixes kabi).
* kasan: move checks to do_strncpy_from_user (git-fixes).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
(git-fixes).
* leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
* lib: string_helpers: silence snprintf() output truncation warning (git-
fixes).
* mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
* maple_tree: fix alloc node fail issue (git-fixes).
* maple_tree: refine mas_store_root() on storing NULL (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: amphion: Set video drvdata before register video device (git-fixes).
* media: ar0521: do not overflow when checking PLL values (git-fixes).
* media: atomisp: Add check for rgby_data memory allocation failure (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
fixes).
* media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* media: i2c: tc358743: Fix crash in the probe error path when using polling
(git-fixes).
* media: imx-jpeg: Ensure power suppliers be suspended before detach them
(git-fixes).
* media: imx-jpeg: Set video drvdata before register video device (git-fixes).
* media: mantis: remove orphan mantis_core.h (git-fixes).
* media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
* media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).
* media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: s5p-jpeg: prevent buffer overflows (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
* media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
* media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).
* media: uvcvideo: Stop stream during unregister (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* media: vb2: Fix comment (git-fixes).
* media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
* mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
* mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
fixes).
* minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
fixes).
* mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
* mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
* mm: refactor map_deny_write_exec() (git-fixes).
* mm: resolve faulty mmap_region() error path behaviour (git-fixes).
* mm: unconditionally close VMAs on error (git-fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mmc_spi: drop buggy snprintf() (git-fixes).
* mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
* mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
* net: mdio-ipq4019: add missing error check (git-fixes).
* net: phy: dp83822: Fix reset pin definitions (git-fixes).
* net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
(git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
* net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
fixes).
* net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
* nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
* nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
* nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
* nouveau: fw: sync dma after setup is called (git-fixes).
* nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
* ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-loop: flush off pending I/O while shutting down loop controller (git-
fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
* ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* ocfs2: uncache inode which has failed entering the group (git-fixes).
* of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)
* pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
* pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
* pinctrl: zynqmp: drop excess struct member description (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
* platform/x86: panasonic-laptop: Return errno correctly in show callback
(git-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
fixes).
* power: supply: rt9471: Use IC status regfield to report real charger status
(git-fixes).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: bbnsm: add remove hook (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
fixes).
* scsi: Remove scsi device no_start_on_resume flag (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
* scsi: core: Disable CDL by default (git-fixes).
* scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
* scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings
(git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpi3mr: Validate SAS port assignments (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
* scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-
fixes).
* soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
fixes).
* soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
* tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* thunderbolt: Honor TMU requirements in the domain when setting TMU mode
(stable-fixes).
* tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
* tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
* tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tpm: fix signed/unsigned bug when checking event logs (git-fixes).
* tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
* u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file
(git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* unicode: Fix utf8_load() error path (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
fixes).
* usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).
* usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
fixes).
* usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* vsock: Update msg_count on read_skb() (git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
fixes).
* wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
* wifi: ath12k: fix crash when unbinding (git-fixes).
* wifi: ath12k: fix warning when unbinding (git-fixes).
* wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
* x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
* x86/microcode/intel: Remove unnecessary cache writeback and invalidation
(git-fixes).
* x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
* x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Enable CPU topology enumeration (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/traps: move kmsan check after instrumentation_begin (git-fixes).
* x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
* x86: fix off-by-one in access_ok() (git-fixes).
* xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
* xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4316=1 openSUSE-SLE-15.6-2024-4316=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4316=1

## Package List:

* openSUSE Leap 15.6 (aarch64 x86_64)
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* gfs2-kmp-azure-6.4.0-150600.8.20.1
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-extra-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-debuginfo-6.4.0-150600.8.20.1
* kselftests-kmp-azure-6.4.0-150600.8.20.1
* kernel-syms-azure-6.4.0-150600.8.20.1
* kernel-azure-optional-6.4.0-150600.8.20.1
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* ocfs2-kmp-azure-6.4.0-150600.8.20.1
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-6.4.0-150600.8.20.1
* kernel-azure-optional-debuginfo-6.4.0-150600.8.20.1
* reiserfs-kmp-azure-6.4.0-150600.8.20.1
* cluster-md-kmp-azure-6.4.0-150600.8.20.1
* kernel-azure-debugsource-6.4.0-150600.8.20.1
* dlm-kmp-azure-6.4.0-150600.8.20.1
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-extra-6.4.0-150600.8.20.1
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-6.4.0-150600.8.20.1
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.20.1
* kernel-source-azure-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-syms-azure-6.4.0-150600.8.20.1
* kernel-azure-devel-6.4.0-150600.8.20.1
* kernel-azure-debugsource-6.4.0-150600.8.20.1
* kernel-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.20.1
* kernel-source-azure-6.4.0-150600.8.20.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52778.html
* https://www.suse.com/security/cve/CVE-2023-52920.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26703.html
* https://www.suse.com/security/cve/CVE-2024-26741.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26864.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27407.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36031.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36920.html
* https://www.suse.com/security/cve/CVE-2024-36927.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-40914.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-42102.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46788.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46845.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49888.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50169.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50276.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53042.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53045.html
* https://www.suse.com/security/cve/CVE-2024-53048.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53072.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53076.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53081.html
* https://www.suse.com/security/cve/CVE-2024-53082.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-53094.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53096.html
* https://www.suse.com/security/cve/CVE-2024-53100.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53106.html
* https://www.suse.com/security/cve/CVE-2024-53108.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53114.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222423
* https://bugzilla.suse.com/show_bug.cgi?id=1222587
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223112
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223733
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224948
* https://bugzilla.suse.com/show_bug.cgi?id=1225713
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225768
* https://bugzilla.suse.com/show_bug.cgi?id=1225813
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227842
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1229165
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230817
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230971
* https://bugzilla.suse.com/show_bug.cgi?id=1231076
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231630
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231946
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232103
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232207
* https://bugzilla.suse.com/show_bug.cgi?id=1232208
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232258
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232386
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232396
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232494
* https://bugzilla.suse.com/show_bug.cgi?id=1232498
* https://bugzilla.suse.com/show_bug.cgi?id=1232499
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232704
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232823
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232869
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232876
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232880
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232894
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232925
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233029
* https://bugzilla.suse.com/show_bug.cgi?id=1233032
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233036
* https://bugzilla.suse.com/show_bug.cgi?id=1233041
* https://bugzilla.suse.com/show_bug.cgi?id=1233044
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233062
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233088
* https://bugzilla.suse.com/show_bug.cgi?id=1233091
* https://bugzilla.suse.com/show_bug.cgi?id=1233092
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233115
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233119
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233127
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233132
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233176
* https://bugzilla.suse.com/show_bug.cgi?id=1233179
* https://bugzilla.suse.com/show_bug.cgi?id=1233185
* https://bugzilla.suse.com/show_bug.cgi?id=1233188
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233193
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233203
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233207
* https://bugzilla.suse.com/show_bug.cgi?id=1233208
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233217
* https://bugzilla.suse.com/show_bug.cgi?id=1233219
* https://bugzilla.suse.com/show_bug.cgi?id=1233226
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233244
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233298
* https://bugzilla.suse.com/show_bug.cgi?id=1233305
* https://bugzilla.suse.com/show_bug.cgi?id=1233320
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233443
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233465
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233524
* https://bugzilla.suse.com/show_bug.cgi?id=1233540
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233564
* https://bugzilla.suse.com/show_bug.cgi?id=1233566
* https://bugzilla.suse.com/show_bug.cgi?id=1233567
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233572
* https://bugzilla.suse.com/show_bug.cgi?id=1233573
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1233641
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233721
* https://bugzilla.suse.com/show_bug.cgi?id=1233754
* https://bugzilla.suse.com/show_bug.cgi?id=1233756
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233771
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234009
* https://bugzilla.suse.com/show_bug.cgi?id=1234011
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234039
* https://bugzilla.suse.com/show_bug.cgi?id=1234040
* https://bugzilla.suse.com/show_bug.cgi?id=1234041
* https://bugzilla.suse.com/show_bug.cgi?id=1234042
* https://bugzilla.suse.com/show_bug.cgi?id=1234043
* https://bugzilla.suse.com/show_bug.cgi?id=1234044
* https://bugzilla.suse.com/show_bug.cgi?id=1234045
* https://bugzilla.suse.com/show_bug.cgi?id=1234046
* https://bugzilla.suse.com/show_bug.cgi?id=1234072
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234081
* https://bugzilla.suse.com/show_bug.cgi?id=1234083
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://bugzilla.suse.com/show_bug.cgi?id=1234121
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://jira.suse.com/browse/PED-11316
* https://jira.suse.com/browse/PED-11442
* https://jira.suse.com/browse/PED-11580
* https://jira.suse.com/browse/PED-9943



SUSE-SU-2024:4318-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4318-1
Release Date: 2024-12-13T15:34:03Z
Rating: important
References:

* bsc#1012628
* bsc#1065729
* bsc#1082555
* bsc#1194869
* bsc#1215199
* bsc#1217845
* bsc#1218562
* bsc#1218644
* bsc#1219596
* bsc#1219803
* bsc#1220355
* bsc#1220382
* bsc#1221309
* bsc#1222423
* bsc#1222587
* bsc#1222590
* bsc#1223112
* bsc#1223384
* bsc#1223656
* bsc#1223700
* bsc#1223733
* bsc#1223824
* bsc#1223848
* bsc#1224088
* bsc#1224429
* bsc#1224518
* bsc#1224548
* bsc#1224574
* bsc#1224948
* bsc#1225611
* bsc#1225713
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225768
* bsc#1225813
* bsc#1225903
* bsc#1226003
* bsc#1226130
* bsc#1226498
* bsc#1226623
* bsc#1226631
* bsc#1226748
* bsc#1226797
* bsc#1226848
* bsc#1226872
* bsc#1227726
* bsc#1227842
* bsc#1228119
* bsc#1228244
* bsc#1228269
* bsc#1228410
* bsc#1228430
* bsc#1228454
* bsc#1228537
* bsc#1228620
* bsc#1228743
* bsc#1228747
* bsc#1228850
* bsc#1228857
* bsc#1229019
* bsc#1229165
* bsc#1229429
* bsc#1229450
* bsc#1229585
* bsc#1229677
* bsc#1229769
* bsc#1229808
* bsc#1229891
* bsc#1230055
* bsc#1230132
* bsc#1230179
* bsc#1230220
* bsc#1230231
* bsc#1230289
* bsc#1230295
* bsc#1230339
* bsc#1230341
* bsc#1230375
* bsc#1230414
* bsc#1230429
* bsc#1230456
* bsc#1230501
* bsc#1230527
* bsc#1230550
* bsc#1230557
* bsc#1230558
* bsc#1230600
* bsc#1230620
* bsc#1230710
* bsc#1230733
* bsc#1230762
* bsc#1230763
* bsc#1230773
* bsc#1230774
* bsc#1230801
* bsc#1230807
* bsc#1230817
* bsc#1230827
* bsc#1230831
* bsc#1230914
* bsc#1230918
* bsc#1230971
* bsc#1231016
* bsc#1231035
* bsc#1231072
* bsc#1231073
* bsc#1231075
* bsc#1231076
* bsc#1231081
* bsc#1231082
* bsc#1231083
* bsc#1231084
* bsc#1231085
* bsc#1231087
* bsc#1231089
* bsc#1231092
* bsc#1231093
* bsc#1231094
* bsc#1231096
* bsc#1231098
* bsc#1231100
* bsc#1231101
* bsc#1231102
* bsc#1231105
* bsc#1231108
* bsc#1231111
* bsc#1231114
* bsc#1231115
* bsc#1231116
* bsc#1231117
* bsc#1231131
* bsc#1231132
* bsc#1231135
* bsc#1231136
* bsc#1231138
* bsc#1231148
* bsc#1231169
* bsc#1231170
* bsc#1231171
* bsc#1231178
* bsc#1231179
* bsc#1231182
* bsc#1231183
* bsc#1231187
* bsc#1231191
* bsc#1231193
* bsc#1231195
* bsc#1231197
* bsc#1231200
* bsc#1231202
* bsc#1231203
* bsc#1231276
* bsc#1231293
* bsc#1231384
* bsc#1231434
* bsc#1231435
* bsc#1231436
* bsc#1231439
* bsc#1231440
* bsc#1231441
* bsc#1231442
* bsc#1231452
* bsc#1231453
* bsc#1231465
* bsc#1231474
* bsc#1231481
* bsc#1231496
* bsc#1231502
* bsc#1231537
* bsc#1231539
* bsc#1231540
* bsc#1231541
* bsc#1231617
* bsc#1231630
* bsc#1231634
* bsc#1231635
* bsc#1231636
* bsc#1231637
* bsc#1231638
* bsc#1231639
* bsc#1231640
* bsc#1231673
* bsc#1231828
* bsc#1231849
* bsc#1231855
* bsc#1231856
* bsc#1231857
* bsc#1231858
* bsc#1231859
* bsc#1231860
* bsc#1231861
* bsc#1231864
* bsc#1231865
* bsc#1231868
* bsc#1231869
* bsc#1231871
* bsc#1231872
* bsc#1231901
* bsc#1231902
* bsc#1231903
* bsc#1231904
* bsc#1231906
* bsc#1231907
* bsc#1231908
* bsc#1231914
* bsc#1231916
* bsc#1231920
* bsc#1231924
* bsc#1231926
* bsc#1231930
* bsc#1231931
* bsc#1231935
* bsc#1231942
* bsc#1231944
* bsc#1231946
* bsc#1231947
* bsc#1231950
* bsc#1231951
* bsc#1231952
* bsc#1231953
* bsc#1231954
* bsc#1231955
* bsc#1231956
* bsc#1231957
* bsc#1231965
* bsc#1231967
* bsc#1231968
* bsc#1231987
* bsc#1231988
* bsc#1231989
* bsc#1231990
* bsc#1231998
* bsc#1232000
* bsc#1232003
* bsc#1232009
* bsc#1232013
* bsc#1232015
* bsc#1232016
* bsc#1232017
* bsc#1232018
* bsc#1232033
* bsc#1232034
* bsc#1232036
* bsc#1232043
* bsc#1232047
* bsc#1232048
* bsc#1232049
* bsc#1232050
* bsc#1232056
* bsc#1232075
* bsc#1232076
* bsc#1232079
* bsc#1232080
* bsc#1232083
* bsc#1232084
* bsc#1232085
* bsc#1232089
* bsc#1232090
* bsc#1232093
* bsc#1232094
* bsc#1232096
* bsc#1232097
* bsc#1232098
* bsc#1232103
* bsc#1232104
* bsc#1232105
* bsc#1232109
* bsc#1232111
* bsc#1232114
* bsc#1232116
* bsc#1232117
* bsc#1232124
* bsc#1232126
* bsc#1232127
* bsc#1232129
* bsc#1232130
* bsc#1232131
* bsc#1232132
* bsc#1232134
* bsc#1232135
* bsc#1232140
* bsc#1232141
* bsc#1232142
* bsc#1232145
* bsc#1232147
* bsc#1232148
* bsc#1232149
* bsc#1232151
* bsc#1232152
* bsc#1232154
* bsc#1232155
* bsc#1232156
* bsc#1232157
* bsc#1232159
* bsc#1232160
* bsc#1232162
* bsc#1232164
* bsc#1232165
* bsc#1232166
* bsc#1232174
* bsc#1232180
* bsc#1232182
* bsc#1232183
* bsc#1232185
* bsc#1232187
* bsc#1232189
* bsc#1232192
* bsc#1232195
* bsc#1232196
* bsc#1232198
* bsc#1232199
* bsc#1232200
* bsc#1232201
* bsc#1232207
* bsc#1232208
* bsc#1232217
* bsc#1232218
* bsc#1232220
* bsc#1232221
* bsc#1232222
* bsc#1232224
* bsc#1232232
* bsc#1232250
* bsc#1232251
* bsc#1232253
* bsc#1232254
* bsc#1232255
* bsc#1232256
* bsc#1232258
* bsc#1232259
* bsc#1232260
* bsc#1232262
* bsc#1232263
* bsc#1232264
* bsc#1232272
* bsc#1232275
* bsc#1232279
* bsc#1232282
* bsc#1232285
* bsc#1232287
* bsc#1232295
* bsc#1232305
* bsc#1232307
* bsc#1232309
* bsc#1232310
* bsc#1232312
* bsc#1232313
* bsc#1232314
* bsc#1232315
* bsc#1232316
* bsc#1232317
* bsc#1232318
* bsc#1232329
* bsc#1232332
* bsc#1232333
* bsc#1232334
* bsc#1232335
* bsc#1232337
* bsc#1232339
* bsc#1232340
* bsc#1232342
* bsc#1232345
* bsc#1232349
* bsc#1232352
* bsc#1232354
* bsc#1232355
* bsc#1232357
* bsc#1232358
* bsc#1232359
* bsc#1232361
* bsc#1232362
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232369
* bsc#1232370
* bsc#1232371
* bsc#1232374
* bsc#1232378
* bsc#1232381
* bsc#1232383
* bsc#1232385
* bsc#1232386
* bsc#1232387
* bsc#1232392
* bsc#1232394
* bsc#1232395
* bsc#1232396
* bsc#1232413
* bsc#1232416
* bsc#1232417
* bsc#1232418
* bsc#1232424
* bsc#1232427
* bsc#1232432
* bsc#1232435
* bsc#1232436
* bsc#1232442
* bsc#1232446
* bsc#1232483
* bsc#1232494
* bsc#1232498
* bsc#1232499
* bsc#1232500
* bsc#1232501
* bsc#1232502
* bsc#1232503
* bsc#1232504
* bsc#1232505
* bsc#1232506
* bsc#1232507
* bsc#1232511
* bsc#1232519
* bsc#1232520
* bsc#1232529
* bsc#1232552
* bsc#1232623
* bsc#1232626
* bsc#1232627
* bsc#1232628
* bsc#1232629
* bsc#1232704
* bsc#1232757
* bsc#1232768
* bsc#1232819
* bsc#1232823
* bsc#1232860
* bsc#1232869
* bsc#1232870
* bsc#1232873
* bsc#1232876
* bsc#1232877
* bsc#1232878
* bsc#1232880
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232894
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232914
* bsc#1232919
* bsc#1232925
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233029
* bsc#1233032
* bsc#1233035
* bsc#1233036
* bsc#1233041
* bsc#1233044
* bsc#1233049
* bsc#1233050
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233062
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233088
* bsc#1233091
* bsc#1233092
* bsc#1233097
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233115
* bsc#1233117
* bsc#1233119
* bsc#1233123
* bsc#1233125
* bsc#1233127
* bsc#1233129
* bsc#1233130
* bsc#1233132
* bsc#1233135
* bsc#1233176
* bsc#1233179
* bsc#1233185
* bsc#1233188
* bsc#1233189
* bsc#1233191
* bsc#1233193
* bsc#1233197
* bsc#1233201
* bsc#1233203
* bsc#1233205
* bsc#1233206
* bsc#1233207
* bsc#1233208
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233216
* bsc#1233217
* bsc#1233219
* bsc#1233226
* bsc#1233238
* bsc#1233241
* bsc#1233244
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233298
* bsc#1233305
* bsc#1233320
* bsc#1233350
* bsc#1233443
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233464
* bsc#1233465
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233485
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233523
* bsc#1233524
* bsc#1233540
* bsc#1233547
* bsc#1233548
* bsc#1233550
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233564
* bsc#1233566
* bsc#1233567
* bsc#1233568
* bsc#1233570
* bsc#1233572
* bsc#1233573
* bsc#1233577
* bsc#1233580
* bsc#1233640
* bsc#1233641
* bsc#1233642
* bsc#1233721
* bsc#1233754
* bsc#1233756
* bsc#1233769
* bsc#1233771
* bsc#1233977
* bsc#1234009
* bsc#1234011
* bsc#1234012
* bsc#1234025
* bsc#1234039
* bsc#1234040
* bsc#1234041
* bsc#1234042
* bsc#1234043
* bsc#1234044
* bsc#1234045
* bsc#1234046
* bsc#1234072
* bsc#1234078
* bsc#1234081
* bsc#1234083
* bsc#1234085
* bsc#1234087
* bsc#1234093
* bsc#1234098
* bsc#1234108
* bsc#1234121
* bsc#1234223
* jsc#PED-10559
* jsc#PED-10978
* jsc#PED-11316
* jsc#PED-11442
* jsc#PED-11580
* jsc#PED-9899
* jsc#PED-9901
* jsc#PED-9943

Cross-References:

* CVE-2023-52766
* CVE-2023-52778
* CVE-2023-52800
* CVE-2023-52881
* CVE-2023-52917
* CVE-2023-52918
* CVE-2023-52919
* CVE-2023-52920
* CVE-2023-52921
* CVE-2023-52922
* CVE-2023-6270
* CVE-2024-26596
* CVE-2024-26703
* CVE-2024-26741
* CVE-2024-26758
* CVE-2024-26761
* CVE-2024-26767
* CVE-2024-26782
* CVE-2024-26864
* CVE-2024-26943
* CVE-2024-26953
* CVE-2024-27017
* CVE-2024-27026
* CVE-2024-27043
* CVE-2024-27407
* CVE-2024-35888
* CVE-2024-35980
* CVE-2024-36000
* CVE-2024-36031
* CVE-2024-36244
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36920
* CVE-2024-36927
* CVE-2024-36954
* CVE-2024-36968
* CVE-2024-38576
* CVE-2024-38577
* CVE-2024-38589
* CVE-2024-38599
* CVE-2024-40914
* CVE-2024-41016
* CVE-2024-41023
* CVE-2024-41031
* CVE-2024-41047
* CVE-2024-41082
* CVE-2024-42102
* CVE-2024-42145
* CVE-2024-44932
* CVE-2024-44958
* CVE-2024-44964
* CVE-2024-44995
* CVE-2024-45016
* CVE-2024-45025
* CVE-2024-46678
* CVE-2024-46680
* CVE-2024-46681
* CVE-2024-46721
* CVE-2024-46754
* CVE-2024-46765
* CVE-2024-46766
* CVE-2024-46770
* CVE-2024-46775
* CVE-2024-46777
* CVE-2024-46788
* CVE-2024-46797
* CVE-2024-46800
* CVE-2024-46802
* CVE-2024-46803
* CVE-2024-46804
* CVE-2024-46805
* CVE-2024-46806
* CVE-2024-46807
* CVE-2024-46809
* CVE-2024-46810
* CVE-2024-46811
* CVE-2024-46812
* CVE-2024-46813
* CVE-2024-46814
* CVE-2024-46815
* CVE-2024-46816
* CVE-2024-46817
* CVE-2024-46818
* CVE-2024-46819
* CVE-2024-46821
* CVE-2024-46825
* CVE-2024-46826
* CVE-2024-46827
* CVE-2024-46828
* CVE-2024-46830
* CVE-2024-46831
* CVE-2024-46834
* CVE-2024-46835
* CVE-2024-46836
* CVE-2024-46840
* CVE-2024-46841
* CVE-2024-46842
* CVE-2024-46843
* CVE-2024-46845
* CVE-2024-46846
* CVE-2024-46848
* CVE-2024-46849
* CVE-2024-46851
* CVE-2024-46852
* CVE-2024-46853
* CVE-2024-46854
* CVE-2024-46855
* CVE-2024-46857
* CVE-2024-46859
* CVE-2024-46860
* CVE-2024-46861
* CVE-2024-46864
* CVE-2024-46870
* CVE-2024-46871
* CVE-2024-47658
* CVE-2024-47660
* CVE-2024-47661
* CVE-2024-47662
* CVE-2024-47663
* CVE-2024-47664
* CVE-2024-47665
* CVE-2024-47666
* CVE-2024-47667
* CVE-2024-47668
* CVE-2024-47669
* CVE-2024-47670
* CVE-2024-47671
* CVE-2024-47672
* CVE-2024-47673
* CVE-2024-47674
* CVE-2024-47675
* CVE-2024-47679
* CVE-2024-47681
* CVE-2024-47682
* CVE-2024-47684
* CVE-2024-47685
* CVE-2024-47686
* CVE-2024-47687
* CVE-2024-47688
* CVE-2024-47692
* CVE-2024-47693
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47701
* CVE-2024-47702
* CVE-2024-47703
* CVE-2024-47704
* CVE-2024-47705
* CVE-2024-47706
* CVE-2024-47707
* CVE-2024-47709
* CVE-2024-47710
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47714
* CVE-2024-47715
* CVE-2024-47718
* CVE-2024-47719
* CVE-2024-47720
* CVE-2024-47723
* CVE-2024-47727
* CVE-2024-47728
* CVE-2024-47730
* CVE-2024-47731
* CVE-2024-47732
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47738
* CVE-2024-47739
* CVE-2024-47741
* CVE-2024-47742
* CVE-2024-47743
* CVE-2024-47744
* CVE-2024-47745
* CVE-2024-47747
* CVE-2024-47748
* CVE-2024-47749
* CVE-2024-47750
* CVE-2024-47751
* CVE-2024-47752
* CVE-2024-47753
* CVE-2024-47754
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49852
* CVE-2024-49853
* CVE-2024-49855
* CVE-2024-49858
* CVE-2024-49860
* CVE-2024-49861
* CVE-2024-49862
* CVE-2024-49863
* CVE-2024-49864
* CVE-2024-49866
* CVE-2024-49867
* CVE-2024-49868
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49874
* CVE-2024-49875
* CVE-2024-49877
* CVE-2024-49878
* CVE-2024-49879
* CVE-2024-49881
* CVE-2024-49882
* CVE-2024-49883
* CVE-2024-49884
* CVE-2024-49886
* CVE-2024-49888
* CVE-2024-49890
* CVE-2024-49891
* CVE-2024-49892
* CVE-2024-49894
* CVE-2024-49895
* CVE-2024-49896
* CVE-2024-49897
* CVE-2024-49898
* CVE-2024-49899
* CVE-2024-49900
* CVE-2024-49901
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49905
* CVE-2024-49906
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49909
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49913
* CVE-2024-49914
* CVE-2024-49917
* CVE-2024-49918
* CVE-2024-49919
* CVE-2024-49920
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49925
* CVE-2024-49928
* CVE-2024-49929
* CVE-2024-49930
* CVE-2024-49931
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49935
* CVE-2024-49936
* CVE-2024-49937
* CVE-2024-49938
* CVE-2024-49939
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49946
* CVE-2024-49947
* CVE-2024-49949
* CVE-2024-49950
* CVE-2024-49952
* CVE-2024-49953
* CVE-2024-49954
* CVE-2024-49955
* CVE-2024-49957
* CVE-2024-49958
* CVE-2024-49959
* CVE-2024-49960
* CVE-2024-49961
* CVE-2024-49962
* CVE-2024-49963
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49967
* CVE-2024-49968
* CVE-2024-49969
* CVE-2024-49972
* CVE-2024-49973
* CVE-2024-49974
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49981
* CVE-2024-49982
* CVE-2024-49983
* CVE-2024-49985
* CVE-2024-49986
* CVE-2024-49987
* CVE-2024-49989
* CVE-2024-49991
* CVE-2024-49993
* CVE-2024-49995
* CVE-2024-49996
* CVE-2024-50000
* CVE-2024-50001
* CVE-2024-50002
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50006
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50009
* CVE-2024-50012
* CVE-2024-50013
* CVE-2024-50014
* CVE-2024-50015
* CVE-2024-50017
* CVE-2024-50019
* CVE-2024-50020
* CVE-2024-50021
* CVE-2024-50022
* CVE-2024-50023
* CVE-2024-50024
* CVE-2024-50025
* CVE-2024-50026
* CVE-2024-50027
* CVE-2024-50028
* CVE-2024-50031
* CVE-2024-50033
* CVE-2024-50035
* CVE-2024-50040
* CVE-2024-50041
* CVE-2024-50042
* CVE-2024-50044
* CVE-2024-50045
* CVE-2024-50046
* CVE-2024-50047
* CVE-2024-50048
* CVE-2024-50049
* CVE-2024-50055
* CVE-2024-50058
* CVE-2024-50059
* CVE-2024-50060
* CVE-2024-50061
* CVE-2024-50062
* CVE-2024-50063
* CVE-2024-50064
* CVE-2024-50067
* CVE-2024-50069
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50075
* CVE-2024-50076
* CVE-2024-50077
* CVE-2024-50078
* CVE-2024-50080
* CVE-2024-50081
* CVE-2024-50082
* CVE-2024-50084
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50121
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50141
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50169
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50218
* CVE-2024-50221
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50240
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50252
* CVE-2024-50255
* CVE-2024-50257
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50275
* CVE-2024-50276
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50296
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53042
* CVE-2024-53043
* CVE-2024-53045
* CVE-2024-53048
* CVE-2024-53051
* CVE-2024-53052
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53072
* CVE-2024-53074
* CVE-2024-53076
* CVE-2024-53079
* CVE-2024-53081
* CVE-2024-53082
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53093
* CVE-2024-53094
* CVE-2024-53095
* CVE-2024-53096
* CVE-2024-53100
* CVE-2024-53101
* CVE-2024-53104
* CVE-2024-53106
* CVE-2024-53108
* CVE-2024-53110
* CVE-2024-53112
* CVE-2024-53114
* CVE-2024-53121
* CVE-2024-53138

CVSS scores:

* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52917 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46678 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46754 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46803 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46804 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46805 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46806 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46812 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46815 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46816 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46817 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46818 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46870 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46871 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47660 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47661 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47662 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47667 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47668 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47669 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47674 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47675 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47681 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47684 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47685 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47686 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47687 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47688 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47693 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47695 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47702 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47706 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47710 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47715 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47719 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47720 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47723 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47727 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47731 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47732 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47739 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47741 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47743 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47744 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47750 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47752 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47754 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49853 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49858 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49860 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49861 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-49862 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49864 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49866 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49867 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49870 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49874 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49875 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49878 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49878 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49894 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49895 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49898 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49902 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49903 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49928 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49929 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49930 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49931 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49936 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49937 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49960 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49969 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49972 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49987 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49993 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49995 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50008 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50035 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50063 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50139 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50169 ( SUSE ): 0.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50231 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50248 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53100 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6

An update that solves 506 vulnerabilities, contains eight features and has 101
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).
* CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
* CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
precision tracking (bsc#1232823).
* CVE-2023-6270: aoe: fix the potential use-after-free problem in more places
(bsc#1218562).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished() (bsc#1222587).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink
dump (bsc#1223733).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
entire cycle too (bsc#1226797).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed
(bsc#1228454).
* CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command
(bsc#1228620).
* CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
wb_dirty_limits(), again" (bsc#1233132).
* CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
(bsc#1230179).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-45016: netem: fix return value if duplicate enqueue fails
(bsc#1230429).
* CVE-2024-45025: fix bitmap corruption on close_range() with
CLOSE_RANGE_UNSHARE (bsc#1230456).
* CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex
(bsc#1230550).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
* CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
(bsc#1230801).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections
(bsc#1230762).
* CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
(bsc#1230763).
* CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
* CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
(bsc#1231191).
* CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
greater than max_links (bsc#1231197).
* CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
(bsc#1231115).
* CVE-2024-46828: sched: sch_cake: fix bulk flow accounting logic for host
fairness (bsc#1231114).
* CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test
(bsc#1231117).
* CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
indirection tables (bsc#1231096).
* CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
(bsc#1231105).
* CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
* CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added
(bsc#1231100).
* CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
* CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
* CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs
(bsc#1231087).
* CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35
(bsc#1231435).
* CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled
(bsc#1231436).
* CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
* CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
provided by the firmware (bsc#1231442).
* CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
(bsc#1231673).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
(bsc#1231987).
* CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
(bsc#1231998).
* CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003).
* CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
* CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
using it (bsc#1231944).
* CVE-2024-47705: block: fix potential invalid pointer dereference in
blk_add_partition (bsc#1231872).
* CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
(bsc#1231942).
* CVE-2024-47707: ipv6: avoid possible NULL deref in
rt6_uncached_list_flush_dev() (bsc#1231935).
* CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
(bsc#1232049).
* CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
* CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
(bsc#1232075).
* CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status
clearing (bsc#1232117).
* CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
seq_nr overflow (bsc#1232124).
* CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek
using same fd (bsc#1231869).
* CVE-2024-47745: mm: call the security_mmap_file() LSM hook in
remap_file_pages() (bsc#1232135).
* CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
Due to Race Condition (bsc#1232145).
* CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch
warning (bsc#1232130).
* CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch
warning (bsc#1231868).
* CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder
smatch warning (bsc#1232131).
* CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in
efc_nport_vport_del() (bsc#1232819).
* CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread
creation (bsc#1232256).
* CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner
kthread during umount (bsc#1232262).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
* CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
(bsc#1232200).
* CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
(bsc#1232199).
* CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).
* CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
(bsc#1232217).
* CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
to 1 (bsc#1232220).
* CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
format translation (bsc#1232354).
* CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma
hardware format translation (bsc#1232352).
* CVE-2024-49896: drm/amd/display: Check stream before comparing them
(bsc#1232221).
* CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
(bsc#1232355).
* CVE-2024-49898: drm/amd/display: Check null-initialized variables
(bsc#1232222).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
nullptrs (bsc#1232305).
* CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
(bsc#1232332).
* CVE-2024-49907: drm/amd/display: Check null pointers before using
dc->clk_mgr (bsc#1232334).
* CVE-2024-49908: drm/amd/display: Add null check for 'afb' in
amdgpu_dm_update_cursor (bsc#1232335).
* CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
dcn32_set_output_transfer_func (bsc#1232337).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (bsc#1232367).
* CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in
commit_planes_for_stream (bsc#1232307).
* CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
(bsc#1232369).
* CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
* CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
* CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
dcn201_acquire_free_pipe_for_layer (bsc#1231968).
* CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
(bsc#1232313).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
(bsc#1232424).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
(bsc#1232164).
* CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
UFO (bsc#1232160).
* CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete()
twice (bsc#1232156).
* CVE-2024-49954: static_call: Replace pointless WARN_ON() in
static_call_module_notify() (bsc#1232155).
* CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
reflink tree (bsc#1232151).
* CVE-2024-49959: jbd2: stop waiting for space when
jbd2_cleanup_journal_tail() returns error (bsc#1232149).
* CVE-2024-49960: ext4: fix timer use-after-free on failed mount
(bsc#1232395).
* CVE-2024-49967: ext4: no need to continue when the number of entries is 1
(bsc#1232140).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
transformation (bsc#1232519).
* CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails
(bsc#1232315).
* CVE-2024-49973: r8169: add tally counter fields added with RTL8125
(bsc#1232105).
* CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
(bsc#1232383).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on
platform_device_register() errors (bsc#1232093).
* CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
(bsc#1232258).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
(bsc#1232282).
* CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
with 0 count (bsc#1232316).
* CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
* CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
(bsc#1232089).
* CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
(bsc#1232085).
* CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
(bsc#1232084).
* CVE-2024-50002: static_call: Handle module init failure correctly in
static_call_del_module() (bsc#1232083).
* CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
monitor (bsc#1232385).
* CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when
partially writing (bsc#1232079).
* CVE-2024-50020: ice: Fix improper handling of refcount in
ice_sriov_set_msix_vec_count() (bsc#1231989).
* CVE-2024-50021: ice: Fix improper handling of refcount in
ice_dpll_init_rclk_pins() (bsc#1231957).
* CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping()
(bsc#1231956).
* CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
* CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone
(bsc#1231951).
* CVE-2024-50028: thermal: core: Reference count the zone in
thermal_zone_get_by_id() (bsc#1231950).
* CVE-2024-50033: slip: make slhc_remember() more robust against malicious
packets (bsc#1231914).
* CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
* CVE-2024-50040: igb: Do not bring the device up after non-fatal error
(bsc#1231908).
* CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
mac_filter_hash (bsc#1231907).
* CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906).
* CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
(bsc#1231903).
* CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in
nfs42_complete_copies() (bsc#1231902).
* CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
* CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
switchtec_ntb_remove due to race condition (bsc#1232345).
* CVE-2024-50060: io_uring: check if we need to reschedule during overflow
flush (bsc#1232417).
* CVE-2024-50063: bpf: Prevent tail call between progs attached to different
hooks (bsc#1232435).
* CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901).
* CVE-2024-50080: ublk: do not allow user copy for unprivileged device
(bsc#1232502).
* CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
(bsc#1232501).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).
* CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).
* CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
(bsc#1232498).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
* CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50195: posix-clock: Fix missing timespec64 check in
pc_clock_settime() (bsc#1233103).
* CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
* CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
* CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
(bsc#1233464).
* CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
(bsc#1233465).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).

The following non-security bugs were fixed:

* 9p: explicitly deny setlease attempts (git-fixes).
* ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes).
* ACPI: CPPC: Fix _CPC register setting issue (git-fixes).
* ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
* ACPI: EC: Do not release locks during operation region accesses (stable-
fixes).
* ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
* ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
* ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-
fixes).
* ACPI: battery: Fix possible crash when unregistering a battery hook (git-
fixes).
* ACPI: battery: Simplify battery hook locking (stable-fixes).
* ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
detection issue (stable-fixes).
* ACPI: resource: Add Asus ExpertBook B2502CVA to
irq1_level_low_skip_override[] (stable-fixes).
* ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[]
(stable-fixes).
* ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
fixes).
* ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-
fixes).
* ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable-
fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
* ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
* ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
acpi_db_convert_to_package() (stable-fixes).
* ACPICA: iasl: handle empty connection_node (stable-fixes).
* ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes).
* ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller()
(stable-fixes).
* ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable-
fixes).
* ALSA: 6fire: Release resources at card release (git-fixes).
* ALSA: Reorganize kerneldoc parameter names (stable-fixes).
* ALSA: ac97: bus: Fix the mistake in the comment (git-fixes).
* ALSA: asihpi: Fix potential OOB array access (stable-fixes).
* ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: core: add isascii() check to card ID generator (stable-fixes).
* ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
(git-fixes).
* ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-
fixes).
* ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
1000 G2 (git-fixes).
* ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
* ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* ALSA: hda/conexant: fix some typos (stable-fixes).
* ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
* ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs
(bsc#1219803).
* ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
(git-fixes).
* ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
* ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
* ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
fixes).
* ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable-
fixes).
* ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
* ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes).
* ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-
fixes).
* ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).
* ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
(bsc#1233298).
* ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
* ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
fixes).
* ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
* ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
* ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable-
fixes).
* ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
* ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes).
* ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes).
* ALSA: hda/realtek: Update default depop procedure (git-fixes).
* ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes).
* ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes).
* ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable-
fixes).
* ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes).
* ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
* ALSA: hda: Show the codec quirk info at probing (stable-fixes).
* ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable-
fixes).
* ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132).
* ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
* ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).
* ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
* ALSA: line6: update contact information (stable-fixes).
* ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
* ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable-
fixes).
* ALSA: silence integer wrapping warning (stable-fixes).
* ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
* ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
* ALSA: usb-audio: Add input value sanity checks for standard types (stable-
fixes).
* ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
* ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
* ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768).
* ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
* ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
* ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
* ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable-
fixes).
* ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
devices (git-fixes).
* ALSA: usb-audio: Make mic volume workarounds globally applicable (stable-
fixes).
* ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
* ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
(stable-fixes).
* ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet
(stable-fixes).
* ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec
(stable-fixes).
* ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes).
* ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes).
* ASoC: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).
* ASoC: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).
* ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
* ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
* ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).
* ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).
* ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
* ASoC: SOF: Wire up buffer flags (bsc#1233305).
* ASoC: SOF: add alignment for topology header file struct definition
(bsc#1233305).
* ASoC: SOF: align topology header file with sof topology header
(bsc#1233305).
* ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
(git-fixes).
* ASoC: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
* ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
* ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA
(bsc#1233305).
* ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).
* ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).
* ASoC: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).
* ASoC: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).
* ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
(bsc#1233305).
* ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
fixes).
* ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
* ASoC: SOF: topology: dynamically allocate and store DAI widget->private
(bsc#1233305).
* ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
* ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes).
* ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
* ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
(stable-fixes).
* ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
* ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is
uninitialized (git-fixes).
* ASoC: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).
* ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).
* ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable-
fixes).
* ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes).
* ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
* ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes).
* ASoC: fsl_micfil: Add sample rate constraint (stable-fixes).
* ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes).
* ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
* ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-
fixes).
* ASoC: max98388: Fix missing increment of variable slot_found (git-fixes).
* ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
(git-fixes).
* ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
fixes).
* ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
* ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-
fixes).
* ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
(stable-fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
(stable-fixes).
* ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
(stable-fixes).
* ASoC: tas2781: Use of_property_read_reg() (stable-fixes).
* Bluetooth: Call iso_exit() on module unload (git-fixes).
* Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
* Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-
fixes).
* Bluetooth: Remove debugfs directory on module init failure (git-fixes).
* Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
* Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
* Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable-
fixes).
* Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-
fixes).
* Bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
* Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
* Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
* Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
* HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes).
* HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
* HID: core: zero-initialize the report buffer (git-fixes).
* HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes).
* HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* HID: multitouch: Add support for B2402FVA track point (stable-fixes).
* HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-
fixes).
* HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes).
* HID: plantronics: Workaround for an unexcepted opposite volume key (stable-
fixes).
* HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* HID: wacom: fix when get product name maybe null pointer (git-fixes).
* Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
* Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
* Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes).
* Input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
* Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
* Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
(stable-fixes).
* Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table
(stable-fixes).
* Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
(stable-fixes).
* Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
* Input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
* Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
fixes).
* Input: xpad - add support for MSI Claw A1M (git-fixes).
* Input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
* Input: xpad - fix support for some third-party controllers (git-fixes).
* Input: xpad - sort xpad_device by vendor and product ID (git-fixes).
* Input: xpad - spelling fixes for "Xbox" (git-fixes).
* KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-
fixes).
* KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).
* KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
(bsc#1215199).
* KVM: PPC: Book3S HV: remove unused varible (bsc#1194869).
* KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
(bsc#1232207).
* KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
* KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
(git-fixes).
* KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git-
fixes).
* KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git-
fixes).
* KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid
(git-fixes).
* KVM: Write the per-page "segment" when clearing (part of) a guest page (git-
fixes).
* KVM: s390: Change virtual to physical address access in diag 0x258 handler
(git-fixes bsc#1232626).
* KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query
(git-fixes bsc#1231276).
* KVM: s390: gaccess: Check if guest address is in memslot (git-fixes
bsc#1232623).
* KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git-
fixes).
* KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults
(git-fixes).
* KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes).
* KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes).
* KVM: x86: Exit to userspace if fastpath triggers one on instruction skip
(git-fixes).
* KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git-
fixes).
* KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git-
fixes).
* KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes).
* NFS: Avoid unnecessary rescanning of the per-server delegation list (git-
fixes).
* NFS: remove revoked delegation from server's delegation list (git-fixes).
* NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
* NFSD: Mark filecache "down" if init fails (git-fixes).
* NFSv3: only use NFS timeout for MOUNT when protocols are compatible
(bsc#1231016).
* NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
* PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
* PCI: Add T_PVPERL macro (git-fixes).
* PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
* PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
* PCI: Fix reset_method_store() memory leak (git-fixes).
* PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
* PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* PCI: rockchip-ep: Fix address translation unit programming (git-fixes).
* RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559).
* RAS/AMD/ATL: Expand helpers for adding and removing base and hole
(jsc#PED-10559).
* RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559).
* RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559).
* RAS/AMD/ATL: Validate address map when information is gathered
(jsc#PED-10559).
* RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
* RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes)
* RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git-
fixes)
* RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
* RDMA/bnxt_re: Fix a possible memory leak (git-fixes)
* RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
* RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes)
* RDMA/bnxt_re: Fix out of bound check (git-fixes)
* RDMA/bnxt_re: Fix the GID table length (git-fixes)
* RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
* RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
* RDMA/bnxt_re: Return more meaningful error (git-fixes)
* RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
* RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
* RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
* RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
* RDMA/hns: Add mutex_destroy() (git-fixes)
* RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
fixes)
* RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* RDMA/hns: Use macro instead of magic number (git-fixes)
* RDMA/irdma: Fix misspelling of "accept*" (git-fixes)
* RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
* RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page
(git-fixes).
* RDMA/mana_ib: use the correct page table index based on hardware page size
(git-fixes).
* RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes)
* RDMA/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-
fixes)
* RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
fixes).
* RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-
fixes)
* RDMA/rxe: Fix the qp flush warnings in req (git-fixes)
* RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
* RDMA/srpt: Make slab cache names unique (git-fixes)
* Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown"
(bsc#1228269).
* Revert "ALSA: hda: Conditionally use snooping for AMD HDMI" (stable-fixes).
* Revert "KEYS: encrypted: Add check for strsep" (git-fixes).
* Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1"
(bsc#1215199).
* Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes)
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable-
fixes).
* Revert "driver core: Fix uevent_show() vs driver detach race" (git-fixes).
* Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI"
(git-fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path"
(git-fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* Revert "wifi: iwlwifi: remove retry loops in start" (git-fixes).
* SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
* SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
* SUNRPC: Remove BUG_ON call sites (git-fixes).
* SUNRPC: clnt.c: Remove misleading comment (git-fixes).
* USB: appledisplay: close race between probe and completion handler (git-
fixes).
* USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* USB: chaoskey: fail open after removal (git-fixes).
* USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
* USB: misc: cypress_cy7c63: check for short transfer (git-fixes).
* USB: misc: yurex: fix race between read and write (git-fixes).
* USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* USB: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* USB: serial: option: add Quectel RG650V (stable-fixes).
* USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
* USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
* USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* accel/qaic: Fix the for loop used to walk SG table (git-fixes).
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
(git-fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* apparmor: fix 'Do simple duplicate message elimination' (git-fixes).
* apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
* apparmor: use kvfree_sensitive to free data->data (git-fixes).
* arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes)
* arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes).
* arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
* arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes).
* arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
* arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
* arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* ata: libata: Set DID_TIME_OUT for commands that actually timed out (git-
fixes).
* ata: libata: avoid superfluous disk spin down + spin up during hibernation
(git-fixes).
* audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes).
* audit: do not take task_lock() in audit_exe_compare() code path (git-fixes).
* block: print symbolic error name instead of error code (bsc#1231872).
* block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677).
* bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes).
* bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes).
* bnxt_en: Fix the PCI-AER routines (git-fixes).
* bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
* bnxt_en: refactor reset close code (git-fixes).
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
* bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
* bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
fixes).
* bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
* bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
* bpf, x64: Remove tail call detection (git-fixes).
* bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
* bpf: Fail verification for sign-extension of packet data/data_end/data_meta
(git-fixes).
* bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
* bpf: Fix error message on kfunc arg type mismatch (git-fixes).
* bpf: Fix helper writes to read-only maps (git-fixes).
* bpf: Fix tailcall cases in test_bpf (git-fixes).
* bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes).
* bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
* bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-
fixes).
* bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
* bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
* btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450).
* btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
* btrfs: send: fix invalid clone operation for file that got its size
decreased (git-fixes).
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
switching CAN modes (git-fixes).
* can: netlink: avoid call to do_set_data_bittiming callback with stale
can_priv::ctrlmode (stable-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* ceph: fix cap ref leak via netfs init_request (bsc#1231384).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* clk: bcm: bcm53573: fix OF node leak in init (stable-fixes).
* clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
* clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
* clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes).
* clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
* clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
* clk: imx: fracn-gppll: fix pll power up (git-fixes).
* clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
* clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
* clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
* clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
* clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
* clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* comedi: ni_routing: tools: Check when the file could not be opened (stable-
fixes).
* config: Disable LAM on x86 (bsc#1217845).
* cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems
(git-fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
* cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
* cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
(git-fixes).
* crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
* crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075)
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: octeontx - Fix authenc setkey (stable-fixes).
* crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes).
* crypto: octeontx2 - Fix authenc setkey (stable-fixes).
* crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return
-EBUSY (git-fixes).
* crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable
CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632).
* crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501
ltc#208632).
* crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation
(bsc#1230501 ltc#208632).
* crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501
ltc#208632).
* crypto: qat - remove check after debugfs_create_dir() (git-fixes).
* crypto: qat - remove faulty arbiter config reset (git-fixes).
* crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxgb4: Properly lock TX queue for the selftest (git-fixes).
* cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
* cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
fixes).
* cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).
* dcache: keep dentry_hashtable or d_hash_shift even when not used (git-
fixes).
* debugfs: fix automount d_fsdata usage (git-fixes).
* devlink: Fix command annotation documentation (git-fixes).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* dmaengine: sh: rz-dmac: handle configs where one address is zero (git-
fixes).
* dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git-
fixes).
* doc: rcu: update printed dynticks counter bits (git-fixes).
* driver core: bus: Fix double free in driver API bus_register() (stable-
fixes).
* driver core: bus: Return -EIO instead of 0 when show/store invalid bus
attribute (stable-fixes).
* drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
(git-fixes).
* drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
* drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes).
* drm/amd/display: Add disable timeout option (bsc#1231435)
* drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
* drm/amd/display: Check link_res->hpo_dp_link_enc before using it
(bsc#1231944)
* drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
* drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes).
* drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes).
* drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
dcn20_program_pipe (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp
(git-fixes).
* drm/amd/display: Remove a redundant check in authenticated_dp (stable-
fixes).
* drm/amd/display: Revert "Check HDCP returned status" (stable-fixes).
* drm/amd/display: Round calculated vtotal (stable-fixes).
* drm/amd/display: Skip to enable dsc if it has been off (stable-fixes).
* drm/amd/display: Validate backlight caps are sane (stable-fixes).
* drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes).
* drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
* drm/amdgpu/swsmu: Only force workload setup on init (git-fixes).
* drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
* drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
* drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
* drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
* drm/i915/gem: fix bitwise and logical AND mixup (git-fixes).
* drm/i915/hdcp: fix connector refcounting (git-fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
* drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes).
* drm/msm/dpu: do not always program merge_3d block (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
* drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
* drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check
(git-fixes).
* drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
* drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
(git-fixes).
* drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes).
* drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
* drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
* drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
* drm/msm: Fix some typos in comment (git-fixes).
* drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/radeon: Fix encoder->possible_clones (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
* drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job
(git-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
* drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
VLA (stable-fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).
* drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
* drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
* drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
* drm/vmwgfx: Handle surface check failure correctly (git-fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
* drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
* drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
* e1000e: Fix S0ix residency on corporate systems (git-fixes).
* e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
* e1000e: change I219 (19) devices to ADP (git-fixes).
* e1000e: fix force smbus during suspend flow (git-fixes).
* e1000e: move force SMBUS near the end of enable_ulp function (git-fixes).
* efi/libstub: Free correct pointer on failure (git-fixes).
* efi/libstub: fix efi_parse_options() ignoring the default command line (git-
fixes).
* efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
(stable-fixes).
* eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
fixes).
* ext4: do not track ranges in fast_commit if inode has inlined data
(bsc#1231635).
* ext4: fix fast commit inode enqueueing during a full journal commit
(bsc#1231636).
* ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible()
(bsc#1231637).
* ext4: fix possible tid_t sequence overflows (bsc#1231634).
* ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
* ext4: fix unttached inode after power cut with orphan file feature enabled
(bsc#1234009).
* ext4: mark fc as ineligible using an handle in ext4_xattr_set()
(bsc#1231640).
* ext4: use handle to mark fc as ineligible in __track_dentry_update()
(bsc#1231639).
* f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).
* fat: fix uninitialized variable (git-fixes).
* fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes).
* fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
fixes).
* fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
* fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
* fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
* fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-
fixes).
* filemap: remove use of wait bookmarks (bsc#1224088).
* firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git-
fixes).
* firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git-
fixes).
* firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
fixes).
* firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
fixes).
* fs/9p: drop inodes immediately on non-.L too (git-fixes).
* fs/9p: fix the cache always being enabled on files with qid flags (git-
fixes).
* fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)
* fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
* genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
* gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
* gpio: davinci: fix lazy disable (git-fixes).
* gpio: exar: set value when external pull-up or pull-down is present (git-
fixes).
* gpio: zevio: Add missed label initialisation (git-fixes).
* gve: Fix XDP TX completion handling when counters overflow (git-fixes).
* gve: Fix an edge case for TSO skb validity check (git-fixes).
* gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
fixes).
* hid: intel-ish-hid: Fix uninitialized variable 'rv' in
ish_fw_xfer_direct_dma (git-fixes).
* hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
(git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (max16065) Fix alarm attributes (git-fixes).
* hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes).
* hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes).
* hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-
fixes).
* hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature
(git-fixes).
* i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git-
fixes).
* i2c: core: fix lockdep warning for sparsely nested adapter chain (git-
fixes).
* i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes).
* i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
(git-fixes).
* i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes).
* i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes).
* i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes).
* i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
* i2c: i801: add helper i801_restore_regs (git-fixes).
* i2c: ismt: kill transaction in hardware on timeout (git-fixes).
* i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes).
* i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes).
* i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git-
fixes).
* i2c: omap: wakeup the controller during suspend() callback (git-fixes).
* i2c: rcar: properly format a debug output (git-fixes).
* i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
(git-fixes).
* i2c: stm32f7: perform most of irq job in threaded handler (git-fixes).
* i2c: synquacer: Deal with optional PCLK correctly (git-fixes).
* i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable-
fixes).
* i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
* i2c: xiic: improve error message when transfer fails to start (stable-
fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master
Driver Due to Race Condition (stable-fixes).
* i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* i40e: Fix XDP program unloading while removing the driver (git-fixes).
* i40e: Report MFS in decimal base instead of hex (git-fixes).
* i40e: fix race condition by adding filter's intermediate sync state (git-
fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
* ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
* ice: Fix checking for unsupported keys on non-tunnel device (git-fixes).
* ice: Fix lldp packets dropping after changing the number of channels (git-
fixes).
* ice: Fix netif_is_ice() in Safe Mode (git-fixes).
* ice: Fix package download algorithm (git-fixes).
* ice: Fix recipe read procedure (git-fixes).
* ice: Fix reset handler (git-fixes).
* ice: Flush FDB entries before reset (git-fixes).
* ice: Interpret .set_channels() input differently (git-fixes).
* ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes).
* ice: Reject pin requests with unsupported flags (git-fixes).
* ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git-
fixes).
* ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes).
* ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes).
* ice: clear port vlan config during reset (git-fixes).
* ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes).
* ice: do not bring the VSI up, if it was down before the XDP setup (git-
fixes).
* ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes).
* ice: fix 200G PHY types to link speed mapping (git-fixes).
* ice: fix 200G link speed message log (git-fixes).
* ice: fix ICE_LAST_OFFSET formula (git-fixes).
* ice: fix VLAN replay after reset (git-fixes).
* ice: fix VSI lists confusion when adding VLANs (git-fixes).
* ice: fix accounting for filters shared by multiple VSIs (git-fixes).
* ice: fix accounting if a VLAN already exists (git-fixes).
* ice: fix iteration of TLVs in Preserved Fields Area (git-fixes).
* ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes).
* ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes).
* ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes).
* ice: implement AQ download pkg retry (git-fixes).
* ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git-
fixes).
* ice: remove af_xdp_zc_qps bitmap (git-fixes).
* ice: replace synchronize_rcu with synchronize_net (git-fixes).
* ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
* ice: set correct dst VSI in only LAN filters (git-fixes).
* ice: tc: allow zero flags in parsing tc flower (git-fixes).
* ice: tc: check src_vsi in case of traffic from VF (git-fixes).
* ice: use proper macro for testing bit (git-fixes).
* idpf: Interpret .set_channels() input differently (git-fixes).
* idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes).
* idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
fixes).
* idpf: do not skip over ethtool tcp-data-split setting (git-fixes).
* idpf: fix UAFs when destroying the queues (git-fixes).
* idpf: fix memleak in vport interrupt configuration (git-fixes).
* idpf: fix memory leaks and crashes while performing a soft reset (git-
fixes).
* ieee802154: Fix build error (git-fixes).
* igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
* igb: Disable threaded IRQ for igb_msix_other (git-fixes).
* igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
* igc: Fix double reset adapter triggered from a single taprio cmd (git-
fixes).
* igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer
(git-fixes).
* igc: Fix qbv tx latency by setting gtxoffset (git-fixes).
* igc: Fix qbv_config_change_errors logics (git-fixes).
* igc: Fix reset adapter logics when tx mode change (git-fixes).
* igc: Unlock on error in igc_io_resume() (git-fixes).
* iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
* iio: accel: bma400: Fix uninitialized variable field_value in tap event
handling (git-fixes).
* iio: accel: kx022a: Fix raw read format (git-fixes).
* iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git-
fixes).
* iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-
fixes).
* iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
* iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-
fixes).
* iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git-
fixes).
* iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git-
fixes).
* iio: gts-helper: Fix memory leaks for the error path of
iio_gts_build_avail_scale_table() (git-fixes).
* iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git-
fixes).
* iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
* iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
* iio: hid-sensors: Fix an error handling path in
_hid_sensor_set_report_latency() (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* iio: light: opt3001: add missing full-scale range value (git-fixes).
* iio: light: veml6030: fix ALS sensor resolution (git-fixes).
* iio: light: veml6030: fix IIO device retrieval from embedded device (git-
fixes).
* iio: light: veml6030: fix microlux value calculation (git-fixes).
* iio: magnetometer: ak8975: Convert enum->pointer for data in the match
tables (stable-fixes).
* iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes).
* iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes).
* iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
(git-fixes).
* ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* intel_idle: add Granite Rapids Xeon support (bsc#1231630).
* intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
* io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes).
* io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes).
* io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes).
* io_uring/net: harden multishot termination case for recv (git-fixes).
* io_uring/rw: fix cflags posting for single issue multishot read (git-fixes).
* io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
* io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes).
* io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
* io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes).
* io_uring/sqpoll: do not put cpumask on stack (git-fixes).
* io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes).
* io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL
(git-fixes).
* iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes).
* iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes).
* iommu/amd: Fix typo of , instead of ; (git-fixes).
* iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
* iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git-
fixes).
* iommufd: Check the domain owner of the parent before creating a nesting
domain (git-fixes).
* iommufd: Protect against overflow of ALIGN() during iova allocation (git-
fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
* jbd2: avoid infinite transaction commit loop (bsc#1234039).
* jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
* jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).
* jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).
* jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit
(bsc#1231638).
* jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
* jbd2: fix potential data lost in recovering journal raced with synchronizing
fs bdev (bsc#1234044).
* jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
* jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
* jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
* jfs: Fix sanity check in dbMount (git-fixes).
* jfs: Fix uaf in dbFreeBits (git-fixes).
* jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
* jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
* jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
* jump_label: Fix static_key_slow_dec() yet again (git-fixes).
* kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC)
(git-fixes).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
* kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes).
* kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
fixes kabi).
* kasan: Fix Software Tag-Based KASAN with GCC (git-fixes).
* kasan: move checks to do_strncpy_from_user (git-fixes).
* kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414
bsc#1229450).
* kbuild,bpf: Add module-specific pahole flags for distilled base BTF
(bsc#1230414 bsc#1229450).
* kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later
(bsc#1230414 bsc#1229450).
* kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414
bsc#1229450).
* kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
* kconfig: qconf: fix buffer overflow in debug links (git-fixes).
* kernel-binary: Enable livepatch package only when livepatch is enabled
(bsc#1218644).
* kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
(git-fixes).
* keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry
(git-fixes).
* keys: Fix overwrite of key expiration on instantiation (git-fixes).
* kthread: unpark only parked kthread (git-fixes).
* leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
* lib/xarray: introduce a new helper xas_get_order (bsc#1231617).
* lib: string_helpers: silence snprintf() output truncation warning (git-
fixes).
* mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
* macsec: do not increment counters for an unrelated SA (git-fixes).
* mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
* maple_tree: correct tree corruption on spanning store (git-fixes).
* maple_tree: fix alloc node fail issue (git-fixes).
* maple_tree: refine mas_store_root() on storing NULL (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: amphion: Set video drvdata before register video device (git-fixes).
* media: ar0521: do not overflow when checking PLL values (git-fixes).
* media: atomisp: Add check for rgby_data memory allocation failure (git-
fixes).
* media: bttv: use audio defaults for winfast2000 (git-fixes).
* media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
fixes).
* media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* media: i2c: imx335: Enable regulator supplies (stable-fixes).
* media: i2c: tc358743: Fix crash in the probe error path when using polling
(git-fixes).
* media: imx-jpeg: Ensure power suppliers be suspended before detach them
(git-fixes).
* media: imx-jpeg: Set video drvdata before register video device (git-fixes).
* media: imx335: Fix reset-gpio handling (git-fixes).
* media: mantis: remove orphan mantis_core.h (git-fixes).
* media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
* media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning
(git-fixes).
* media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).
* media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: s5p-jpeg: prevent buffer overflows (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
* media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
* media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).
* media: uvcvideo: Stop stream during unregister (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* media: vb2: Fix comment (git-fixes).
* media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: videobuf2-core: clear memory related fields in
__vb2_plane_dmabuf_put() (stable-fixes).
* media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes).
* media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
* mei: use kvmalloc for read buffer (git-fixes).
* mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(stable-fixes).
* mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
* mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
fixes).
* minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes).
* minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mlx5: avoid truncating error message (git-fixes).
* mlx5: stop warning for 64KB pages (git-fixes).
* mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
* mm/filemap: optimize filemap folio adding (bsc#1231617).
* mm/filemap: return early if failed to allocate memory for split
(bsc#1231617).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
fixes).
* mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace
point (git-fixes).
* mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978).
* mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
* mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
* mm: refactor map_deny_write_exec() (git-fixes).
* mm: resolve faulty mmap_region() error path behaviour (git-fixes).
* mm: unconditionally close VMAs on error (git-fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mmc_spi: drop buggy snprintf() (git-fixes).
* mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
* modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git-
fixes).
* modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host
(git-fixes).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* module: abort module loading when sysfs setup suffer errors (git-fixes).
* mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
* mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
* nbd: fix race between timeout and normal completion (bsc#1230918).
* net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
fixes).
* net/mlx5: Added cond_resched() to crdump collection (git-fixes).
* net/mlx5: Check capability for fw_reset (git-fixes).
* net/mlx5: Check for invalid vector index on EQ creation (git-fixes).
* net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
* net/mlx5: Fix command bitmask initialization (git-fixes).
* net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes).
* net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
* net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
* net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes).
* net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
* net/mlx5: Update the list of the PCI supported devices (git-fixes).
* net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
(git-fixes).
* net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes).
* net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
* net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
fixes).
* net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
* net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes).
* net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
* net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
* net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).
* net/mlx5e: Require mlx5 tc classifier action support for IPsec prio
capability (git-fixes).
* net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
exhaustion (git-fixes).
* net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
* net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
* net: mdio-ipq4019: add missing error check (git-fixes).
* net: phy: Remove LED entry from LEDs list on unregister (git-fixes).
* net: phy: bcm84881: Fix some error handling paths (git-fixes).
* net: phy: dp83822: Fix reset pin definitions (git-fixes).
* net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes).
* net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
* net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes).
* net: qede: use return from qede_parse_actions() (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flower (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes)
* net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes).
* net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-
fixes).
* net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
(git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: usb: usbnet: fix name regression (get-fixes).
* net: usb: usbnet: fix race in probe failure (git-fixes).
* net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
* net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
fixes).
* net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
* netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
* nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
* nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
* nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
(git-fixes).
* nfsd: enable NFSv2 caused by upstream commit (bsc#1230914).
* nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
(git-fixes).
* nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
* nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
* nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-
fixes).
* nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
* nfsd: return -EINVAL when namelen is 0 (git-fixes).
* nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-
fixes).
* nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
* nouveau/dmem: Fix privileged error in copy engine channel (git-fixes).
* nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-
fixes).
* nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
* nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes).
* nouveau: fw: sync dma after setup is called (git-fixes).
* nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
* ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-
fixes).
* ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-loop: flush off pending I/O while shutting down loop controller (git-
fixes).
* nvme-multipath: suppress partition scan until the disk is ready
(bsc#1228244).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: fix race condition between reset and nvme_dev_disable() (git-
fixes).
* nvme-pci: qdepth 1 quirk (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* nvme-pci: set doorbell config before unquiescing (git-fixes).
* nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901).
* nvme: null terminate nvme_tls_attrs (git-fixes).
* nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes).
* nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
* nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
* ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
* ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
* ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
* ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* ocfs2: uncache inode which has failed entering the group (git-fixes).
* of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)
* parport: Proper fix for array out-of-bounds access (git-fixes).
* phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git-
fixes).
* phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes).
* phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes).
* phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
* phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes).
* pinctrl: apple: check devm_kasprintf() returned value (git-fixes).
* pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
* pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes).
* pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
* pinctrl: zynqmp: drop excess struct member description (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
* platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes).
* platform/x86: dell-sysman: add support for alienware products (stable-
fixes).
* platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
* platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes).
* platform/x86: panasonic-laptop: Return errno correctly in show callback
(git-fixes).
* platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-
fixes).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
fixes).
* power: supply: rt9471: Use IC status regfield to report real charger status
(git-fixes).
* powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes).
* powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
* powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
* powerpc/code-patching: Add generic memory patching (bsc#1194869).
* powerpc/code-patching: Perform hwsync in __patch_instruction() in case of
failure (bsc#1194869).
* powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501
ltc#208632).
* powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501
ltc#208632).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Fix VDSO data access when running in a non-root time namespace
(bsc#1194869).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu
(bsc#1194869).
* powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
* printk: Add notation to console_srcu locking (bsc#1232183).
* pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
* qed: avoid truncating work queue length (git-fixes).
* rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
(bsc#1226631).
* rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623).
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
* rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to
IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.
* rpm/release-projects: Add SLFO projects (bsc#1231293).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation (bsc#1218644).
* rpmsg: glink: Handle rejected intent request better (git-fixes).
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: bbnsm: add remove hook (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* runtime constants: add default dummy infrastructure (git-fixes).
* runtime constants: add x86 architecture support (git-fixes).
* s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
* s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629).
* s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628).
* s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes
bsc#1232627).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
fixes).
* scsi: Remove scsi device no_start_on_resume flag (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
* scsi: core: Disable CDL by default (git-fixes).
* scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
* scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in
lpfc_els_flush_cmd() (bsc#1232757).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV
instance (bsc#1232757).
* scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler
(bsc#1232757).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
* scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757
bsc#1228119).
* scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to
KERN_WARNING (bsc#1232757).
* scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
* scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE
(bsc#1232757).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
* scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings
(git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpi3mr: Validate SAS port assignments (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
* scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
* selftests/bpf: Add a test case to write strtol result into .rodata (git-
fixes).
* selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx()
(git-fixes).
* selftests/bpf: Add test for truncation after sign extension in
coerce_reg_to_size_sx() (git-fixes).
* selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses
(git-fixes).
* selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
* selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
* selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-
fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes).
* serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-
fixes).
* soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
fixes).
* soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* soundwire: intel_bus_common: enable interrupts before exiting reset (stable-
fixes).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes).
* spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
* spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes).
* spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
* splice: always fsnotify_access(in), fsnotify_modify(out) on success (git-
fixes).
* splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes).
* splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git-
fixes).
* srcu: Fix callbacks acceleration mishandling (git-fixes).
* staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).
* sumversion: Fix a memory leak in get_src_version() (git-fixes).
* supported.conf: mark nhpoly1305 module as supported (bsc#1231035).
* supported.conf: mark ultravisor userspace access as supported (bsc#1232090).
* task_work: add kerneldoc annotation for 'data' argument (git-fixes).
* tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* thunderbolt: Honor TMU requirements in the domain when setting TMU mode
(stable-fixes).
* thunderbolt: Improve DisplayPort tunnel setup process to be more robust
(stable-fixes).
* tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
* tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
* tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
* tools: hv: rm .*.cmd when make clean (git-fixes).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tpm: fix signed/unsigned bug when checking event logs (git-fixes).
* tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
* tracing/osnoise: Fix build when timerlat is not enabled (git-fixes).
* tracing/osnoise: Skip running osnoise if all instances are off (git-fixes).
* tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git-
fixes).
* tracing/osnoise: Use a cpumask to know what threads are kthreads (git-
fixes).
* tracing/timerlat: Add interface_lock around clearing of kthread in
stop_kthread() (git-fixes).
* tracing/timerlat: Add user-space interface (git-fixes).
* tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes).
* tracing/timerlat: Fix a race during cpuhp processing (git-fixes).
* tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline
(git-fixes).
* tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes).
* tracing/timerlat: Only clear timer if a kthread exists (git-fixes).
* tracing: Consider the NULL character when validating the event length (git-
fixes).
* tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
* tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes).
* u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file
(git-fixes).
* ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
* ubifs: Fix unattached xattr inode if powercut happens after deleting (git-
fixes).
* ubifs: add check for crypto_shash_tfm_digest (git-fixes).
* ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* unicode: Do not special case ignorable code points (stable-fixes).
* unicode: Fix utf8_load() error path (git-fixes).
* uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
* uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
* uprobes: introduce the global struct vm_special_mapping xol_mapping
(bsc#1231114).
* uprobes: turn xol_area->pages into xol_area->page (bsc#1231114).
* usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
* usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the
Crashkernel Scenario (stable-fixes).
* usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git-
fixes).
* usb: dwc3: core: Stop processing of pending events if controller is halted
(git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: gadget: core: force synchronous registration (git-fixes).
* usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
fixes).
* usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).
* usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
fixes).
* usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant
(stable-fixes).
* usb: gadget: f_uac2: fix non-newline-terminated function name (stable-
fixes).
* usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git-
fixes).
* usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
* usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip
(stable-fixes).
* usb: typec: altmode should keep reference to parent (git-fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
* usb: xhci: fix loss of data on Cadence xHC (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* usbip: tools: Fix detach_port() invalid port error path (git-fixes).
* usbnet: fix cyclical race on disconnect with work queue (git-fixes).
* vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes).
* vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes).
* vdpa_sim_blk: allocate the buffer zeroed (git-fixes).
* vduse: avoid using __GFP_NOFAIL (git-fixes).
* vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes).
* vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
* vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
* virtio_console: fix misc probe bugs (git-fixes).
* vmalloc: modify the alloc_vmap_area() error message for better diagnostics
(jsc#PED-10978).
* vmxnet3: Add XDP support (bsc#1226498).
* vmxnet3: Fix missing reserved tailroom (bsc#1226498).
* vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498).
* vmxnet3: add command to allow disabling of offloads (bsc#1226498).
* vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
* vmxnet3: prepare for version 9 changes (bsc#1226498).
* vmxnet3: update to version 9 (bsc#1226498).
* vsock: Update msg_count on read_skb() (git-fixes).
* vt: prevent kernel-infoleak in con_font_get() (git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: Fix memory leak in management tx (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
fixes).
* wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
* wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
* wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
* wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes).
* wifi: ath12k: fix crash when unbinding (git-fixes).
* wifi: ath12k: fix warning when unbinding (git-fixes).
* wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-
fixes).
* wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
(stable-fixes).
* wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
* wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).
* wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes).
* wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd()
(git-fixes).
* wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes).
* wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes).
* wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes).
* wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
(git-fixes).
* wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes).
* wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes).
* wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes).
* wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes).
* wifi: iwlwifi: mvm: use correct key iteration (stable-fixes).
* wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable-
fixes).
* wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
(git-fixes).
* wifi: mac80211: fix RCU list iterations (stable-fixes).
* wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
* wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation
(stable-fixes).
* wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable
(stable-fixes).
* wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_cmd_802_11_scan_ext() (stable-fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes).
* wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes).
* wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
* wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
(stable-fixes).
* wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes).
* wifi: rtw89: correct base HT rate mask for firmware (stable-fixes).
* wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
* x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
* x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load
(git-fixes).
* x86/Documentation: Indent 'note::' directive for protocol version number
note (git-fixes).
* x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes).
* x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes).
* x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes).
* x86/apic: Make x2apic_disable() work correctly (git-fixes).
* x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
* x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
* x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
* x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
* x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
* x86/entry: Remove unwanted instrumentation in common_interrupt() (git-
fixes).
* x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency
(git-fixes).
* x86/microcode/intel: Remove unnecessary cache writeback and invalidation
(git-fixes).
* x86/mm: Use IPIs to synchronize LAM enablement (git-fixes).
* x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes).
* x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes).
* x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
* x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-
fixes).
* x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Enable CPU topology enumeration (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/traps: move kmsan check after instrumentation_begin (git-fixes).
* x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
* x86: do the user address masking outside the user access area (git-fixes).
* x86: fix off-by-one in access_ok() (git-fixes).
* x86: fix user address masking non-canonical speculation issue (git-fixes).
* x86: make the masked_user_access_begin() macro use its argument only once
(git-fixes).
* x86: support user address masking instead of non-speculative conditional
(git-fixes).
* xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
* xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).
* xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2
(git-fixes).
* xfs: check shortform attr entry flags specifically (git-fixes).
* xfs: convert delayed extents to unwritten when zeroing post eof blocks (git-
fixes).
* xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes).
* xfs: fix freeing speculative preallocations for preallocated files (git-
fixes).
* xfs: make sure sb_fdblocks is non-negative (git-fixes).
* xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git-
fixes).
* xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git-
fixes).
* xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes).
* xfs: validate recovered name buffers when recovering xattr items (git-
fixes).
* xhci: Add a quirk for writing ERST in high-low order (git-fixes).
* xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
* xhci: Fix incorrect stream context type macro (git-fixes).
* xhci: Mitigate failed set dequeue pointer commands (git-fixes).
* xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
* xhci: tegra: fix checked USB2 port number (git-fixes).
* zonefs: Improve error handling (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4318=1 openSUSE-SLE-15.6-2024-4318=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4318=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4318=1

* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4318=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4318=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4318=1

* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-4318=1

## Package List:

* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (noarch)
* kernel-macros-6.4.0-150600.23.30.1
* kernel-devel-6.4.0-150600.23.30.1
* kernel-docs-html-6.4.0-150600.23.30.1
* kernel-source-vanilla-6.4.0-150600.23.30.1
* kernel-source-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-debugsource-6.4.0-150600.23.30.1
* kernel-debug-devel-debuginfo-6.4.0-150600.23.30.1
* kernel-debug-devel-6.4.0-150600.23.30.1
* kernel-debug-debuginfo-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (x86_64)
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.30.1
* kernel-default-vdso-debuginfo-6.4.0-150600.23.30.1
* kernel-kvmsmall-vdso-6.4.0-150600.23.30.1
* kernel-debug-vdso-6.4.0-150600.23.30.1
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.30.1
* kernel-default-vdso-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-default-base-rebuild-6.4.0-150600.23.30.1.150600.12.12.6
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.30.1
* kernel-default-base-6.4.0-150600.23.30.1.150600.12.12.6
* kernel-kvmsmall-debugsource-6.4.0-150600.23.30.1
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.30.1
* kernel-kvmsmall-devel-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-6.4.0-150600.23.30.1
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.30.1
* cluster-md-kmp-default-6.4.0-150600.23.30.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.30.1
* kernel-obs-build-6.4.0-150600.23.30.1
* kernel-obs-build-debugsource-6.4.0-150600.23.30.1
* kselftests-kmp-default-6.4.0-150600.23.30.1
* kernel-default-debuginfo-6.4.0-150600.23.30.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.30.1
* kernel-syms-6.4.0-150600.23.30.1
* kernel-default-extra-6.4.0-150600.23.30.1
* kernel-obs-qa-6.4.0-150600.23.30.1
* kernel-default-debugsource-6.4.0-150600.23.30.1
* kernel-default-devel-6.4.0-150600.23.30.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.30.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.30.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.30.1
* kernel-default-livepatch-6.4.0-150600.23.30.1
* kernel-default-optional-6.4.0-150600.23.30.1
* ocfs2-kmp-default-6.4.0-150600.23.30.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.30.1
* gfs2-kmp-default-6.4.0-150600.23.30.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.30.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.30.1
* dlm-kmp-default-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_30-default-1-150600.13.3.5
* kernel-livepatch-SLE15-SP6_Update_6-debugsource-1-150600.13.3.5
* kernel-default-livepatch-devel-6.4.0-150600.23.30.1
* kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-1-150600.13.3.5
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debugsource-6.4.0-150600.23.30.1
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (aarch64)
* dtb-amazon-6.4.0-150600.23.30.1
* dtb-allwinner-6.4.0-150600.23.30.1
* dtb-arm-6.4.0-150600.23.30.1
* kernel-64kb-extra-6.4.0-150600.23.30.1
* kernel-64kb-optional-6.4.0-150600.23.30.1
* dtb-cavium-6.4.0-150600.23.30.1
* dtb-apm-6.4.0-150600.23.30.1
* dtb-freescale-6.4.0-150600.23.30.1
* reiserfs-kmp-64kb-6.4.0-150600.23.30.1
* cluster-md-kmp-64kb-6.4.0-150600.23.30.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.30.1
* dtb-mediatek-6.4.0-150600.23.30.1
* dtb-broadcom-6.4.0-150600.23.30.1
* kernel-64kb-devel-6.4.0-150600.23.30.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.30.1
* dtb-apple-6.4.0-150600.23.30.1
* dlm-kmp-64kb-6.4.0-150600.23.30.1
* dtb-amd-6.4.0-150600.23.30.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.30.1
* dtb-sprd-6.4.0-150600.23.30.1
* dtb-hisilicon-6.4.0-150600.23.30.1
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.30.1
* kernel-64kb-debuginfo-6.4.0-150600.23.30.1
* kernel-64kb-debugsource-6.4.0-150600.23.30.1
* dtb-altera-6.4.0-150600.23.30.1
* dtb-nvidia-6.4.0-150600.23.30.1
* gfs2-kmp-64kb-6.4.0-150600.23.30.1
* kselftests-kmp-64kb-6.4.0-150600.23.30.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.30.1
* dtb-socionext-6.4.0-150600.23.30.1
* dtb-amlogic-6.4.0-150600.23.30.1
* dtb-lg-6.4.0-150600.23.30.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.30.1
* dtb-rockchip-6.4.0-150600.23.30.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.30.1
* dtb-renesas-6.4.0-150600.23.30.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.30.1
* dtb-exynos-6.4.0-150600.23.30.1
* dtb-xilinx-6.4.0-150600.23.30.1
* dtb-qcom-6.4.0-150600.23.30.1
* dtb-marvell-6.4.0-150600.23.30.1
* ocfs2-kmp-64kb-6.4.0-150600.23.30.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.30.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.30.1
* Basesystem Module 15-SP6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.30.1
* Basesystem Module 15-SP6 (aarch64)
* kernel-64kb-debuginfo-6.4.0-150600.23.30.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.30.1
* kernel-64kb-devel-6.4.0-150600.23.30.1
* kernel-64kb-debugsource-6.4.0-150600.23.30.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.30.1
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.30.1.150600.12.12.6
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-6.4.0-150600.23.30.1
* kernel-default-debugsource-6.4.0-150600.23.30.1
* kernel-default-debuginfo-6.4.0-150600.23.30.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.30.1
* Basesystem Module 15-SP6 (noarch)
* kernel-devel-6.4.0-150600.23.30.1
* kernel-macros-6.4.0-150600.23.30.1
* Basesystem Module 15-SP6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.30.1
* Basesystem Module 15-SP6 (s390x)
* kernel-zfcpdump-debugsource-6.4.0-150600.23.30.1
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.30.1
* Development Tools Module 15-SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.30.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-6.4.0-150600.23.30.1
* kernel-obs-build-debugsource-6.4.0-150600.23.30.1
* kernel-syms-6.4.0-150600.23.30.1
* Development Tools Module 15-SP6 (noarch)
* kernel-source-6.4.0-150600.23.30.1
* Legacy Module 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.30.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-6.4.0-150600.23.30.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.30.1
* kernel-default-debugsource-6.4.0-150600.23.30.1
* kernel-default-debuginfo-6.4.0-150600.23.30.1
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.30.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-default-livepatch-6.4.0-150600.23.30.1
* kernel-livepatch-SLE15-SP6_Update_6-debugsource-1-150600.13.3.5
* kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-1-150600.13.3.5
* kernel-default-debuginfo-6.4.0-150600.23.30.1
* kernel-livepatch-6_4_0-150600_23_30-default-1-150600.13.3.5
* kernel-default-debugsource-6.4.0-150600.23.30.1
* kernel-default-livepatch-devel-6.4.0-150600.23.30.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* cluster-md-kmp-default-6.4.0-150600.23.30.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.30.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.30.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.30.1
* ocfs2-kmp-default-6.4.0-150600.23.30.1
* gfs2-kmp-default-6.4.0-150600.23.30.1
* kernel-default-debuginfo-6.4.0-150600.23.30.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.30.1
* kernel-default-debugsource-6.4.0-150600.23.30.1
* dlm-kmp-default-6.4.0-150600.23.30.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.30.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.30.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* kernel-default-extra-6.4.0-150600.23.30.1
* kernel-default-debugsource-6.4.0-150600.23.30.1
* kernel-default-debuginfo-6.4.0-150600.23.30.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.30.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52778.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52881.html
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52919.html
* https://www.suse.com/security/cve/CVE-2023-52920.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26703.html
* https://www.suse.com/security/cve/CVE-2024-26741.html
* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26761.html
* https://www.suse.com/security/cve/CVE-2024-26767.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26864.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27026.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27407.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-35980.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36031.html
* https://www.suse.com/security/cve/CVE-2024-36244.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36920.html
* https://www.suse.com/security/cve/CVE-2024-36927.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38576.html
* https://www.suse.com/security/cve/CVE-2024-38577.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-38599.html
* https://www.suse.com/security/cve/CVE-2024-40914.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-41031.html
* https://www.suse.com/security/cve/CVE-2024-41047.html
* https://www.suse.com/security/cve/CVE-2024-41082.html
* https://www.suse.com/security/cve/CVE-2024-42102.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44958.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-45016.html
* https://www.suse.com/security/cve/CVE-2024-45025.html
* https://www.suse.com/security/cve/CVE-2024-46678.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46721.html
* https://www.suse.com/security/cve/CVE-2024-46754.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46766.html
* https://www.suse.com/security/cve/CVE-2024-46770.html
* https://www.suse.com/security/cve/CVE-2024-46775.html
* https://www.suse.com/security/cve/CVE-2024-46777.html
* https://www.suse.com/security/cve/CVE-2024-46788.html
* https://www.suse.com/security/cve/CVE-2024-46797.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46803.html
* https://www.suse.com/security/cve/CVE-2024-46804.html
* https://www.suse.com/security/cve/CVE-2024-46805.html
* https://www.suse.com/security/cve/CVE-2024-46806.html
* https://www.suse.com/security/cve/CVE-2024-46807.html
* https://www.suse.com/security/cve/CVE-2024-46809.html
* https://www.suse.com/security/cve/CVE-2024-46810.html
* https://www.suse.com/security/cve/CVE-2024-46811.html
* https://www.suse.com/security/cve/CVE-2024-46812.html
* https://www.suse.com/security/cve/CVE-2024-46813.html
* https://www.suse.com/security/cve/CVE-2024-46814.html
* https://www.suse.com/security/cve/CVE-2024-46815.html
* https://www.suse.com/security/cve/CVE-2024-46816.html
* https://www.suse.com/security/cve/CVE-2024-46817.html
* https://www.suse.com/security/cve/CVE-2024-46818.html
* https://www.suse.com/security/cve/CVE-2024-46819.html
* https://www.suse.com/security/cve/CVE-2024-46821.html
* https://www.suse.com/security/cve/CVE-2024-46825.html
* https://www.suse.com/security/cve/CVE-2024-46826.html
* https://www.suse.com/security/cve/CVE-2024-46827.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46830.html
* https://www.suse.com/security/cve/CVE-2024-46831.html
* https://www.suse.com/security/cve/CVE-2024-46834.html
* https://www.suse.com/security/cve/CVE-2024-46835.html
* https://www.suse.com/security/cve/CVE-2024-46836.html
* https://www.suse.com/security/cve/CVE-2024-46840.html
* https://www.suse.com/security/cve/CVE-2024-46841.html
* https://www.suse.com/security/cve/CVE-2024-46842.html
* https://www.suse.com/security/cve/CVE-2024-46843.html
* https://www.suse.com/security/cve/CVE-2024-46845.html
* https://www.suse.com/security/cve/CVE-2024-46846.html
* https://www.suse.com/security/cve/CVE-2024-46848.html
* https://www.suse.com/security/cve/CVE-2024-46849.html
* https://www.suse.com/security/cve/CVE-2024-46851.html
* https://www.suse.com/security/cve/CVE-2024-46852.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46854.html
* https://www.suse.com/security/cve/CVE-2024-46855.html
* https://www.suse.com/security/cve/CVE-2024-46857.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://www.suse.com/security/cve/CVE-2024-46860.html
* https://www.suse.com/security/cve/CVE-2024-46861.html
* https://www.suse.com/security/cve/CVE-2024-46864.html
* https://www.suse.com/security/cve/CVE-2024-46870.html
* https://www.suse.com/security/cve/CVE-2024-46871.html
* https://www.suse.com/security/cve/CVE-2024-47658.html
* https://www.suse.com/security/cve/CVE-2024-47660.html
* https://www.suse.com/security/cve/CVE-2024-47661.html
* https://www.suse.com/security/cve/CVE-2024-47662.html
* https://www.suse.com/security/cve/CVE-2024-47663.html
* https://www.suse.com/security/cve/CVE-2024-47664.html
* https://www.suse.com/security/cve/CVE-2024-47665.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47667.html
* https://www.suse.com/security/cve/CVE-2024-47668.html
* https://www.suse.com/security/cve/CVE-2024-47669.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47672.html
* https://www.suse.com/security/cve/CVE-2024-47673.html
* https://www.suse.com/security/cve/CVE-2024-47674.html
* https://www.suse.com/security/cve/CVE-2024-47675.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47681.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47684.html
* https://www.suse.com/security/cve/CVE-2024-47685.html
* https://www.suse.com/security/cve/CVE-2024-47686.html
* https://www.suse.com/security/cve/CVE-2024-47687.html
* https://www.suse.com/security/cve/CVE-2024-47688.html
* https://www.suse.com/security/cve/CVE-2024-47692.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47702.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-47704.html
* https://www.suse.com/security/cve/CVE-2024-47705.html
* https://www.suse.com/security/cve/CVE-2024-47706.html
* https://www.suse.com/security/cve/CVE-2024-47707.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47710.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47714.html
* https://www.suse.com/security/cve/CVE-2024-47715.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47719.html
* https://www.suse.com/security/cve/CVE-2024-47720.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47727.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47730.html
* https://www.suse.com/security/cve/CVE-2024-47731.html
* https://www.suse.com/security/cve/CVE-2024-47732.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47738.html
* https://www.suse.com/security/cve/CVE-2024-47739.html
* https://www.suse.com/security/cve/CVE-2024-47741.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47743.html
* https://www.suse.com/security/cve/CVE-2024-47744.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47747.html
* https://www.suse.com/security/cve/CVE-2024-47748.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47750.html
* https://www.suse.com/security/cve/CVE-2024-47751.html
* https://www.suse.com/security/cve/CVE-2024-47752.html
* https://www.suse.com/security/cve/CVE-2024-47753.html
* https://www.suse.com/security/cve/CVE-2024-47754.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49853.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49858.html
* https://www.suse.com/security/cve/CVE-2024-49860.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49862.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49864.html
* https://www.suse.com/security/cve/CVE-2024-49866.html
* https://www.suse.com/security/cve/CVE-2024-49867.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49874.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49878.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49882.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49886.html
* https://www.suse.com/security/cve/CVE-2024-49888.html
* https://www.suse.com/security/cve/CVE-2024-49890.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49892.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49895.html
* https://www.suse.com/security/cve/CVE-2024-49896.html
* https://www.suse.com/security/cve/CVE-2024-49897.html
* https://www.suse.com/security/cve/CVE-2024-49898.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49906.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49909.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49913.html
* https://www.suse.com/security/cve/CVE-2024-49914.html
* https://www.suse.com/security/cve/CVE-2024-49917.html
* https://www.suse.com/security/cve/CVE-2024-49918.html
* https://www.suse.com/security/cve/CVE-2024-49919.html
* https://www.suse.com/security/cve/CVE-2024-49920.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49928.html
* https://www.suse.com/security/cve/CVE-2024-49929.html
* https://www.suse.com/security/cve/CVE-2024-49930.html
* https://www.suse.com/security/cve/CVE-2024-49931.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49936.html
* https://www.suse.com/security/cve/CVE-2024-49937.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49939.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49946.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49949.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49953.html
* https://www.suse.com/security/cve/CVE-2024-49954.html
* https://www.suse.com/security/cve/CVE-2024-49955.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49958.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49960.html
* https://www.suse.com/security/cve/CVE-2024-49961.html
* https://www.suse.com/security/cve/CVE-2024-49962.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49967.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49969.html
* https://www.suse.com/security/cve/CVE-2024-49972.html
* https://www.suse.com/security/cve/CVE-2024-49973.html
* https://www.suse.com/security/cve/CVE-2024-49974.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49982.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49986.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-49991.html
* https://www.suse.com/security/cve/CVE-2024-49993.html
* https://www.suse.com/security/cve/CVE-2024-49995.html
* https://www.suse.com/security/cve/CVE-2024-49996.html
* https://www.suse.com/security/cve/CVE-2024-50000.html
* https://www.suse.com/security/cve/CVE-2024-50001.html
* https://www.suse.com/security/cve/CVE-2024-50002.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50015.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50019.html
* https://www.suse.com/security/cve/CVE-2024-50020.html
* https://www.suse.com/security/cve/CVE-2024-50021.html
* https://www.suse.com/security/cve/CVE-2024-50022.html
* https://www.suse.com/security/cve/CVE-2024-50023.html
* https://www.suse.com/security/cve/CVE-2024-50024.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50027.html
* https://www.suse.com/security/cve/CVE-2024-50028.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50033.html
* https://www.suse.com/security/cve/CVE-2024-50035.html
* https://www.suse.com/security/cve/CVE-2024-50040.html
* https://www.suse.com/security/cve/CVE-2024-50041.html
* https://www.suse.com/security/cve/CVE-2024-50042.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50045.html
* https://www.suse.com/security/cve/CVE-2024-50046.html
* https://www.suse.com/security/cve/CVE-2024-50047.html
* https://www.suse.com/security/cve/CVE-2024-50048.html
* https://www.suse.com/security/cve/CVE-2024-50049.html
* https://www.suse.com/security/cve/CVE-2024-50055.html
* https://www.suse.com/security/cve/CVE-2024-50058.html
* https://www.suse.com/security/cve/CVE-2024-50059.html
* https://www.suse.com/security/cve/CVE-2024-50060.html
* https://www.suse.com/security/cve/CVE-2024-50061.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50063.html
* https://www.suse.com/security/cve/CVE-2024-50064.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50069.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50075.html
* https://www.suse.com/security/cve/CVE-2024-50076.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://www.suse.com/security/cve/CVE-2024-50080.html
* https://www.suse.com/security/cve/CVE-2024-50081.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50169.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50276.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53042.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53045.html
* https://www.suse.com/security/cve/CVE-2024-53048.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53072.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53076.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53081.html
* https://www.suse.com/security/cve/CVE-2024-53082.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-53094.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53096.html
* https://www.suse.com/security/cve/CVE-2024-53100.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53106.html
* https://www.suse.com/security/cve/CVE-2024-53108.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53114.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1217845
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1219596
* https://bugzilla.suse.com/show_bug.cgi?id=1219803
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222423
* https://bugzilla.suse.com/show_bug.cgi?id=1222587
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223112
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223700
* https://bugzilla.suse.com/show_bug.cgi?id=1223733
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1224088
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224574
* https://bugzilla.suse.com/show_bug.cgi?id=1224948
* https://bugzilla.suse.com/show_bug.cgi?id=1225611
* https://bugzilla.suse.com/show_bug.cgi?id=1225713
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225768
* https://bugzilla.suse.com/show_bug.cgi?id=1225813
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226003
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226498
* https://bugzilla.suse.com/show_bug.cgi?id=1226623
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226797
* https://bugzilla.suse.com/show_bug.cgi?id=1226848
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227842
* https://bugzilla.suse.com/show_bug.cgi?id=1228119
* https://bugzilla.suse.com/show_bug.cgi?id=1228244
* https://bugzilla.suse.com/show_bug.cgi?id=1228269
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228454
* https://bugzilla.suse.com/show_bug.cgi?id=1228537
* https://bugzilla.suse.com/show_bug.cgi?id=1228620
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228747
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1229019
* https://bugzilla.suse.com/show_bug.cgi?id=1229165
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229450
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229677
* https://bugzilla.suse.com/show_bug.cgi?id=1229769
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1229891
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230132
* https://bugzilla.suse.com/show_bug.cgi?id=1230179
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230289
* https://bugzilla.suse.com/show_bug.cgi?id=1230295
* https://bugzilla.suse.com/show_bug.cgi?id=1230339
* https://bugzilla.suse.com/show_bug.cgi?id=1230341
* https://bugzilla.suse.com/show_bug.cgi?id=1230375
* https://bugzilla.suse.com/show_bug.cgi?id=1230414
* https://bugzilla.suse.com/show_bug.cgi?id=1230429
* https://bugzilla.suse.com/show_bug.cgi?id=1230456
* https://bugzilla.suse.com/show_bug.cgi?id=1230501
* https://bugzilla.suse.com/show_bug.cgi?id=1230527
* https://bugzilla.suse.com/show_bug.cgi?id=1230550
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230600
* https://bugzilla.suse.com/show_bug.cgi?id=1230620
* https://bugzilla.suse.com/show_bug.cgi?id=1230710
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230762
* https://bugzilla.suse.com/show_bug.cgi?id=1230763
* https://bugzilla.suse.com/show_bug.cgi?id=1230773
* https://bugzilla.suse.com/show_bug.cgi?id=1230774
* https://bugzilla.suse.com/show_bug.cgi?id=1230801
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230817
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230831
* https://bugzilla.suse.com/show_bug.cgi?id=1230914
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1230971
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
* https://bugzilla.suse.com/show_bug.cgi?id=1231035
* https://bugzilla.suse.com/show_bug.cgi?id=1231072
* https://bugzilla.suse.com/show_bug.cgi?id=1231073
* https://bugzilla.suse.com/show_bug.cgi?id=1231075
* https://bugzilla.suse.com/show_bug.cgi?id=1231076
* https://bugzilla.suse.com/show_bug.cgi?id=1231081
* https://bugzilla.suse.com/show_bug.cgi?id=1231082
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231084
* https://bugzilla.suse.com/show_bug.cgi?id=1231085
* https://bugzilla.suse.com/show_bug.cgi?id=1231087
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231092
* https://bugzilla.suse.com/show_bug.cgi?id=1231093
* https://bugzilla.suse.com/show_bug.cgi?id=1231094
* https://bugzilla.suse.com/show_bug.cgi?id=1231096
* https://bugzilla.suse.com/show_bug.cgi?id=1231098
* https://bugzilla.suse.com/show_bug.cgi?id=1231100
* https://bugzilla.suse.com/show_bug.cgi?id=1231101
* https://bugzilla.suse.com/show_bug.cgi?id=1231102
* https://bugzilla.suse.com/show_bug.cgi?id=1231105
* https://bugzilla.suse.com/show_bug.cgi?id=1231108
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231115
* https://bugzilla.suse.com/show_bug.cgi?id=1231116
* https://bugzilla.suse.com/show_bug.cgi?id=1231117
* https://bugzilla.suse.com/show_bug.cgi?id=1231131
* https://bugzilla.suse.com/show_bug.cgi?id=1231132
* https://bugzilla.suse.com/show_bug.cgi?id=1231135
* https://bugzilla.suse.com/show_bug.cgi?id=1231136
* https://bugzilla.suse.com/show_bug.cgi?id=1231138
* https://bugzilla.suse.com/show_bug.cgi?id=1231148
* https://bugzilla.suse.com/show_bug.cgi?id=1231169
* https://bugzilla.suse.com/show_bug.cgi?id=1231170
* https://bugzilla.suse.com/show_bug.cgi?id=1231171
* https://bugzilla.suse.com/show_bug.cgi?id=1231178
* https://bugzilla.suse.com/show_bug.cgi?id=1231179
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231183
* https://bugzilla.suse.com/show_bug.cgi?id=1231187
* https://bugzilla.suse.com/show_bug.cgi?id=1231191
* https://bugzilla.suse.com/show_bug.cgi?id=1231193
* https://bugzilla.suse.com/show_bug.cgi?id=1231195
* https://bugzilla.suse.com/show_bug.cgi?id=1231197
* https://bugzilla.suse.com/show_bug.cgi?id=1231200
* https://bugzilla.suse.com/show_bug.cgi?id=1231202
* https://bugzilla.suse.com/show_bug.cgi?id=1231203
* https://bugzilla.suse.com/show_bug.cgi?id=1231276
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231384
* https://bugzilla.suse.com/show_bug.cgi?id=1231434
* https://bugzilla.suse.com/show_bug.cgi?id=1231435
* https://bugzilla.suse.com/show_bug.cgi?id=1231436
* https://bugzilla.suse.com/show_bug.cgi?id=1231439
* https://bugzilla.suse.com/show_bug.cgi?id=1231440
* https://bugzilla.suse.com/show_bug.cgi?id=1231441
* https://bugzilla.suse.com/show_bug.cgi?id=1231442
* https://bugzilla.suse.com/show_bug.cgi?id=1231452
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231474
* https://bugzilla.suse.com/show_bug.cgi?id=1231481
* https://bugzilla.suse.com/show_bug.cgi?id=1231496
* https://bugzilla.suse.com/show_bug.cgi?id=1231502
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231539
* https://bugzilla.suse.com/show_bug.cgi?id=1231540
* https://bugzilla.suse.com/show_bug.cgi?id=1231541
* https://bugzilla.suse.com/show_bug.cgi?id=1231617
* https://bugzilla.suse.com/show_bug.cgi?id=1231630
* https://bugzilla.suse.com/show_bug.cgi?id=1231634
* https://bugzilla.suse.com/show_bug.cgi?id=1231635
* https://bugzilla.suse.com/show_bug.cgi?id=1231636
* https://bugzilla.suse.com/show_bug.cgi?id=1231637
* https://bugzilla.suse.com/show_bug.cgi?id=1231638
* https://bugzilla.suse.com/show_bug.cgi?id=1231639
* https://bugzilla.suse.com/show_bug.cgi?id=1231640
* https://bugzilla.suse.com/show_bug.cgi?id=1231673
* https://bugzilla.suse.com/show_bug.cgi?id=1231828
* https://bugzilla.suse.com/show_bug.cgi?id=1231849
* https://bugzilla.suse.com/show_bug.cgi?id=1231855
* https://bugzilla.suse.com/show_bug.cgi?id=1231856
* https://bugzilla.suse.com/show_bug.cgi?id=1231857
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231860
* https://bugzilla.suse.com/show_bug.cgi?id=1231861
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231865
* https://bugzilla.suse.com/show_bug.cgi?id=1231868
* https://bugzilla.suse.com/show_bug.cgi?id=1231869
* https://bugzilla.suse.com/show_bug.cgi?id=1231871
* https://bugzilla.suse.com/show_bug.cgi?id=1231872
* https://bugzilla.suse.com/show_bug.cgi?id=1231901
* https://bugzilla.suse.com/show_bug.cgi?id=1231902
* https://bugzilla.suse.com/show_bug.cgi?id=1231903
* https://bugzilla.suse.com/show_bug.cgi?id=1231904
* https://bugzilla.suse.com/show_bug.cgi?id=1231906
* https://bugzilla.suse.com/show_bug.cgi?id=1231907
* https://bugzilla.suse.com/show_bug.cgi?id=1231908
* https://bugzilla.suse.com/show_bug.cgi?id=1231914
* https://bugzilla.suse.com/show_bug.cgi?id=1231916
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231924
* https://bugzilla.suse.com/show_bug.cgi?id=1231926
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231931
* https://bugzilla.suse.com/show_bug.cgi?id=1231935
* https://bugzilla.suse.com/show_bug.cgi?id=1231942
* https://bugzilla.suse.com/show_bug.cgi?id=1231944
* https://bugzilla.suse.com/show_bug.cgi?id=1231946
* https://bugzilla.suse.com/show_bug.cgi?id=1231947
* https://bugzilla.suse.com/show_bug.cgi?id=1231950
* https://bugzilla.suse.com/show_bug.cgi?id=1231951
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1231953
* https://bugzilla.suse.com/show_bug.cgi?id=1231954
* https://bugzilla.suse.com/show_bug.cgi?id=1231955
* https://bugzilla.suse.com/show_bug.cgi?id=1231956
* https://bugzilla.suse.com/show_bug.cgi?id=1231957
* https://bugzilla.suse.com/show_bug.cgi?id=1231965
* https://bugzilla.suse.com/show_bug.cgi?id=1231967
* https://bugzilla.suse.com/show_bug.cgi?id=1231968
* https://bugzilla.suse.com/show_bug.cgi?id=1231987
* https://bugzilla.suse.com/show_bug.cgi?id=1231988
* https://bugzilla.suse.com/show_bug.cgi?id=1231989
* https://bugzilla.suse.com/show_bug.cgi?id=1231990
* https://bugzilla.suse.com/show_bug.cgi?id=1231998
* https://bugzilla.suse.com/show_bug.cgi?id=1232000
* https://bugzilla.suse.com/show_bug.cgi?id=1232003
* https://bugzilla.suse.com/show_bug.cgi?id=1232009
* https://bugzilla.suse.com/show_bug.cgi?id=1232013
* https://bugzilla.suse.com/show_bug.cgi?id=1232015
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232017
* https://bugzilla.suse.com/show_bug.cgi?id=1232018
* https://bugzilla.suse.com/show_bug.cgi?id=1232033
* https://bugzilla.suse.com/show_bug.cgi?id=1232034
* https://bugzilla.suse.com/show_bug.cgi?id=1232036
* https://bugzilla.suse.com/show_bug.cgi?id=1232043
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232049
* https://bugzilla.suse.com/show_bug.cgi?id=1232050
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232075
* https://bugzilla.suse.com/show_bug.cgi?id=1232076
* https://bugzilla.suse.com/show_bug.cgi?id=1232079
* https://bugzilla.suse.com/show_bug.cgi?id=1232080
* https://bugzilla.suse.com/show_bug.cgi?id=1232083
* https://bugzilla.suse.com/show_bug.cgi?id=1232084
* https://bugzilla.suse.com/show_bug.cgi?id=1232085
* https://bugzilla.suse.com/show_bug.cgi?id=1232089
* https://bugzilla.suse.com/show_bug.cgi?id=1232090
* https://bugzilla.suse.com/show_bug.cgi?id=1232093
* https://bugzilla.suse.com/show_bug.cgi?id=1232094
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232097
* https://bugzilla.suse.com/show_bug.cgi?id=1232098
* https://bugzilla.suse.com/show_bug.cgi?id=1232103
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232105
* https://bugzilla.suse.com/show_bug.cgi?id=1232109
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232114
* https://bugzilla.suse.com/show_bug.cgi?id=1232116
* https://bugzilla.suse.com/show_bug.cgi?id=1232117
* https://bugzilla.suse.com/show_bug.cgi?id=1232124
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232127
* https://bugzilla.suse.com/show_bug.cgi?id=1232129
* https://bugzilla.suse.com/show_bug.cgi?id=1232130
* https://bugzilla.suse.com/show_bug.cgi?id=1232131
* https://bugzilla.suse.com/show_bug.cgi?id=1232132
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232140
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232145
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232148
* https://bugzilla.suse.com/show_bug.cgi?id=1232149
* https://bugzilla.suse.com/show_bug.cgi?id=1232151
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232154
* https://bugzilla.suse.com/show_bug.cgi?id=1232155
* https://bugzilla.suse.com/show_bug.cgi?id=1232156
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232160
* https://bugzilla.suse.com/show_bug.cgi?id=1232162
* https://bugzilla.suse.com/show_bug.cgi?id=1232164
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232174
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232182
* https://bugzilla.suse.com/show_bug.cgi?id=1232183
* https://bugzilla.suse.com/show_bug.cgi?id=1232185
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232189
* https://bugzilla.suse.com/show_bug.cgi?id=1232192
* https://bugzilla.suse.com/show_bug.cgi?id=1232195
* https://bugzilla.suse.com/show_bug.cgi?id=1232196
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232199
* https://bugzilla.suse.com/show_bug.cgi?id=1232200
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232207
* https://bugzilla.suse.com/show_bug.cgi?id=1232208
* https://bugzilla.suse.com/show_bug.cgi?id=1232217
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232220
* https://bugzilla.suse.com/show_bug.cgi?id=1232221
* https://bugzilla.suse.com/show_bug.cgi?id=1232222
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232232
* https://bugzilla.suse.com/show_bug.cgi?id=1232250
* https://bugzilla.suse.com/show_bug.cgi?id=1232251
* https://bugzilla.suse.com/show_bug.cgi?id=1232253
* https://bugzilla.suse.com/show_bug.cgi?id=1232254
* https://bugzilla.suse.com/show_bug.cgi?id=1232255
* https://bugzilla.suse.com/show_bug.cgi?id=1232256
* https://bugzilla.suse.com/show_bug.cgi?id=1232258
* https://bugzilla.suse.com/show_bug.cgi?id=1232259
* https://bugzilla.suse.com/show_bug.cgi?id=1232260
* https://bugzilla.suse.com/show_bug.cgi?id=1232262
* https://bugzilla.suse.com/show_bug.cgi?id=1232263
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232275
* https://bugzilla.suse.com/show_bug.cgi?id=1232279
* https://bugzilla.suse.com/show_bug.cgi?id=1232282
* https://bugzilla.suse.com/show_bug.cgi?id=1232285
* https://bugzilla.suse.com/show_bug.cgi?id=1232287
* https://bugzilla.suse.com/show_bug.cgi?id=1232295
* https://bugzilla.suse.com/show_bug.cgi?id=1232305
* https://bugzilla.suse.com/show_bug.cgi?id=1232307
* https://bugzilla.suse.com/show_bug.cgi?id=1232309
* https://bugzilla.suse.com/show_bug.cgi?id=1232310
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232313
* https://bugzilla.suse.com/show_bug.cgi?id=1232314
* https://bugzilla.suse.com/show_bug.cgi?id=1232315
* https://bugzilla.suse.com/show_bug.cgi?id=1232316
* https://bugzilla.suse.com/show_bug.cgi?id=1232317
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232329
* https://bugzilla.suse.com/show_bug.cgi?id=1232332
* https://bugzilla.suse.com/show_bug.cgi?id=1232333
* https://bugzilla.suse.com/show_bug.cgi?id=1232334
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232337
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232340
* https://bugzilla.suse.com/show_bug.cgi?id=1232342
* https://bugzilla.suse.com/show_bug.cgi?id=1232345
* https://bugzilla.suse.com/show_bug.cgi?id=1232349
* https://bugzilla.suse.com/show_bug.cgi?id=1232352
* https://bugzilla.suse.com/show_bug.cgi?id=1232354
* https://bugzilla.suse.com/show_bug.cgi?id=1232355
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232359
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232362
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232369
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232378
* https://bugzilla.suse.com/show_bug.cgi?id=1232381
* https://bugzilla.suse.com/show_bug.cgi?id=1232383
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232386
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232392
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232395
* https://bugzilla.suse.com/show_bug.cgi?id=1232396
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232417
* https://bugzilla.suse.com/show_bug.cgi?id=1232418
* https://bugzilla.suse.com/show_bug.cgi?id=1232424
* https://bugzilla.suse.com/show_bug.cgi?id=1232427
* https://bugzilla.suse.com/show_bug.cgi?id=1232432
* https://bugzilla.suse.com/show_bug.cgi?id=1232435
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232494
* https://bugzilla.suse.com/show_bug.cgi?id=1232498
* https://bugzilla.suse.com/show_bug.cgi?id=1232499
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232501
* https://bugzilla.suse.com/show_bug.cgi?id=1232502
* https://bugzilla.suse.com/show_bug.cgi?id=1232503
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232505
* https://bugzilla.suse.com/show_bug.cgi?id=1232506
* https://bugzilla.suse.com/show_bug.cgi?id=1232507
* https://bugzilla.suse.com/show_bug.cgi?id=1232511
* https://bugzilla.suse.com/show_bug.cgi?id=1232519
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232529
* https://bugzilla.suse.com/show_bug.cgi?id=1232552
* https://bugzilla.suse.com/show_bug.cgi?id=1232623
* https://bugzilla.suse.com/show_bug.cgi?id=1232626
* https://bugzilla.suse.com/show_bug.cgi?id=1232627
* https://bugzilla.suse.com/show_bug.cgi?id=1232628
* https://bugzilla.suse.com/show_bug.cgi?id=1232629
* https://bugzilla.suse.com/show_bug.cgi?id=1232704
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232768
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232823
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232869
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232876
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232880
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232894
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232925
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233029
* https://bugzilla.suse.com/show_bug.cgi?id=1233032
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233036
* https://bugzilla.suse.com/show_bug.cgi?id=1233041
* https://bugzilla.suse.com/show_bug.cgi?id=1233044
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233062
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233088
* https://bugzilla.suse.com/show_bug.cgi?id=1233091
* https://bugzilla.suse.com/show_bug.cgi?id=1233092
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233115
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233119
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233127
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233132
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233176
* https://bugzilla.suse.com/show_bug.cgi?id=1233179
* https://bugzilla.suse.com/show_bug.cgi?id=1233185
* https://bugzilla.suse.com/show_bug.cgi?id=1233188
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233193
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233203
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233207
* https://bugzilla.suse.com/show_bug.cgi?id=1233208
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233217
* https://bugzilla.suse.com/show_bug.cgi?id=1233219
* https://bugzilla.suse.com/show_bug.cgi?id=1233226
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233244
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233298
* https://bugzilla.suse.com/show_bug.cgi?id=1233305
* https://bugzilla.suse.com/show_bug.cgi?id=1233320
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233443
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233465
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233524
* https://bugzilla.suse.com/show_bug.cgi?id=1233540
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233564
* https://bugzilla.suse.com/show_bug.cgi?id=1233566
* https://bugzilla.suse.com/show_bug.cgi?id=1233567
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233572
* https://bugzilla.suse.com/show_bug.cgi?id=1233573
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1233641
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233721
* https://bugzilla.suse.com/show_bug.cgi?id=1233754
* https://bugzilla.suse.com/show_bug.cgi?id=1233756
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233771
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234009
* https://bugzilla.suse.com/show_bug.cgi?id=1234011
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234039
* https://bugzilla.suse.com/show_bug.cgi?id=1234040
* https://bugzilla.suse.com/show_bug.cgi?id=1234041
* https://bugzilla.suse.com/show_bug.cgi?id=1234042
* https://bugzilla.suse.com/show_bug.cgi?id=1234043
* https://bugzilla.suse.com/show_bug.cgi?id=1234044
* https://bugzilla.suse.com/show_bug.cgi?id=1234045
* https://bugzilla.suse.com/show_bug.cgi?id=1234046
* https://bugzilla.suse.com/show_bug.cgi?id=1234072
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234081
* https://bugzilla.suse.com/show_bug.cgi?id=1234083
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://bugzilla.suse.com/show_bug.cgi?id=1234121
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://jira.suse.com/browse/PED-10559
* https://jira.suse.com/browse/PED-10978
* https://jira.suse.com/browse/PED-11316
* https://jira.suse.com/browse/PED-11442
* https://jira.suse.com/browse/PED-11580
* https://jira.suse.com/browse/PED-9899
* https://jira.suse.com/browse/PED-9901
* https://jira.suse.com/browse/PED-9943



SUSE-SU-2024:4314-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4314-1
Release Date: 2024-12-13T15:23:19Z
Rating: important
References:

* bsc#1012628
* bsc#1082555
* bsc#1194869
* bsc#1215199
* bsc#1218644
* bsc#1220355
* bsc#1221309
* bsc#1222423
* bsc#1222587
* bsc#1222590
* bsc#1223112
* bsc#1223656
* bsc#1223733
* bsc#1224429
* bsc#1224518
* bsc#1224548
* bsc#1224948
* bsc#1225713
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225768
* bsc#1225813
* bsc#1225903
* bsc#1226130
* bsc#1226748
* bsc#1226872
* bsc#1227726
* bsc#1227842
* bsc#1228430
* bsc#1228850
* bsc#1229165
* bsc#1230231
* bsc#1230557
* bsc#1230558
* bsc#1230733
* bsc#1230807
* bsc#1230817
* bsc#1230827
* bsc#1230971
* bsc#1231076
* bsc#1231114
* bsc#1231182
* bsc#1231453
* bsc#1231465
* bsc#1231630
* bsc#1231920
* bsc#1231930
* bsc#1231946
* bsc#1231952
* bsc#1232079
* bsc#1232096
* bsc#1232103
* bsc#1232104
* bsc#1232149
* bsc#1232157
* bsc#1232165
* bsc#1232166
* bsc#1232198
* bsc#1232199
* bsc#1232201
* bsc#1232207
* bsc#1232224
* bsc#1232258
* bsc#1232259
* bsc#1232264
* bsc#1232272
* bsc#1232305
* bsc#1232307
* bsc#1232318
* bsc#1232335
* bsc#1232337
* bsc#1232352
* bsc#1232354
* bsc#1232355
* bsc#1232357
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232371
* bsc#1232374
* bsc#1232385
* bsc#1232386
* bsc#1232387
* bsc#1232396
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232442
* bsc#1232446
* bsc#1232483
* bsc#1232494
* bsc#1232498
* bsc#1232499
* bsc#1232500
* bsc#1232501
* bsc#1232502
* bsc#1232704
* bsc#1232757
* bsc#1232819
* bsc#1232823
* bsc#1232860
* bsc#1232869
* bsc#1232870
* bsc#1232873
* bsc#1232876
* bsc#1232877
* bsc#1232878
* bsc#1232880
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232894
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232914
* bsc#1232919
* bsc#1232925
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233029
* bsc#1233032
* bsc#1233035
* bsc#1233036
* bsc#1233041
* bsc#1233044
* bsc#1233049
* bsc#1233050
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233062
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233088
* bsc#1233091
* bsc#1233092
* bsc#1233097
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233115
* bsc#1233117
* bsc#1233119
* bsc#1233123
* bsc#1233125
* bsc#1233127
* bsc#1233129
* bsc#1233130
* bsc#1233132
* bsc#1233135
* bsc#1233176
* bsc#1233179
* bsc#1233185
* bsc#1233188
* bsc#1233189
* bsc#1233191
* bsc#1233193
* bsc#1233197
* bsc#1233201
* bsc#1233203
* bsc#1233204
* bsc#1233205
* bsc#1233206
* bsc#1233207
* bsc#1233208
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233216
* bsc#1233217
* bsc#1233219
* bsc#1233226
* bsc#1233238
* bsc#1233241
* bsc#1233244
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233298
* bsc#1233305
* bsc#1233320
* bsc#1233350
* bsc#1233443
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233464
* bsc#1233465
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233485
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233523
* bsc#1233524
* bsc#1233540
* bsc#1233547
* bsc#1233548
* bsc#1233550
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233564
* bsc#1233566
* bsc#1233567
* bsc#1233568
* bsc#1233570
* bsc#1233572
* bsc#1233573
* bsc#1233577
* bsc#1233580
* bsc#1233640
* bsc#1233641
* bsc#1233642
* bsc#1233721
* bsc#1233754
* bsc#1233756
* bsc#1233769
* bsc#1233771
* bsc#1233977
* bsc#1234009
* bsc#1234011
* bsc#1234012
* bsc#1234025
* bsc#1234039
* bsc#1234040
* bsc#1234041
* bsc#1234042
* bsc#1234043
* bsc#1234044
* bsc#1234045
* bsc#1234046
* bsc#1234072
* bsc#1234078
* bsc#1234081
* bsc#1234083
* bsc#1234085
* bsc#1234087
* bsc#1234093
* bsc#1234098
* bsc#1234108
* bsc#1234121
* bsc#1234223
* jsc#PED-11316
* jsc#PED-11442
* jsc#PED-11580
* jsc#PED-9943

Cross-References:

* CVE-2023-52778
* CVE-2023-52920
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26596
* CVE-2024-26703
* CVE-2024-26741
* CVE-2024-26782
* CVE-2024-26864
* CVE-2024-26953
* CVE-2024-27017
* CVE-2024-27407
* CVE-2024-35888
* CVE-2024-36000
* CVE-2024-36031
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36920
* CVE-2024-36927
* CVE-2024-36954
* CVE-2024-36968
* CVE-2024-38589
* CVE-2024-40914
* CVE-2024-41023
* CVE-2024-42102
* CVE-2024-44995
* CVE-2024-46680
* CVE-2024-46681
* CVE-2024-46765
* CVE-2024-46788
* CVE-2024-46800
* CVE-2024-46828
* CVE-2024-46845
* CVE-2024-47666
* CVE-2024-47679
* CVE-2024-47701
* CVE-2024-47703
* CVE-2024-49852
* CVE-2024-49866
* CVE-2024-49868
* CVE-2024-49881
* CVE-2024-49883
* CVE-2024-49884
* CVE-2024-49894
* CVE-2024-49895
* CVE-2024-49897
* CVE-2024-49899
* CVE-2024-49901
* CVE-2024-49905
* CVE-2024-49908
* CVE-2024-49909
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49913
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49925
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49952
* CVE-2024-49959
* CVE-2024-49968
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49983
* CVE-2024-49987
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50006
* CVE-2024-50009
* CVE-2024-50012
* CVE-2024-50014
* CVE-2024-50015
* CVE-2024-50026
* CVE-2024-50067
* CVE-2024-50080
* CVE-2024-50081
* CVE-2024-50082
* CVE-2024-50084
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50121
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50141
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50169
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50218
* CVE-2024-50221
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50228
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50240
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50252
* CVE-2024-50255
* CVE-2024-50257
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50275
* CVE-2024-50276
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50296
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53042
* CVE-2024-53043
* CVE-2024-53045
* CVE-2024-53048
* CVE-2024-53051
* CVE-2024-53052
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53072
* CVE-2024-53074
* CVE-2024-53076
* CVE-2024-53079
* CVE-2024-53081
* CVE-2024-53082
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53093
* CVE-2024-53094
* CVE-2024-53095
* CVE-2024-53096
* CVE-2024-53100
* CVE-2024-53101
* CVE-2024-53104
* CVE-2024-53106
* CVE-2024-53108
* CVE-2024-53110
* CVE-2024-53112
* CVE-2024-53114
* CVE-2024-53121
* CVE-2024-53138

CVSS scores:

* CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-42102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47703 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49866 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49894 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49895 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49897 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49987 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50139 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50169 ( SUSE ): 0.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50231 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50248 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53100 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6

An update that solves 241 vulnerabilities, contains four features and has 43
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
* CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
precision tracking (bsc#1232823).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished() (bsc#1222587).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink
dump (bsc#1223733).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
wb_dirty_limits(), again" (bsc#1233132).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
* CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in
efc_nport_vport_del() (bsc#1232819).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
* CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
(bsc#1232199).
* CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
format translation (bsc#1232354).
* CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma
hardware format translation (bsc#1232352).
* CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
(bsc#1232355).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
nullptrs (bsc#1232305).
* CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
dcn32_set_output_transfer_func (bsc#1232337).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (bsc#1232367).
* CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in
commit_planes_for_stream (bsc#1232307).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49959: jbd2: stop waiting for space when
jbd2_cleanup_journal_tail() returns error (bsc#1232149).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
(bsc#1232258).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
monitor (bsc#1232385).
* CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when
partially writing (bsc#1232079).
* CVE-2024-50080: ublk: do not allow user copy for unprivileged device
(bsc#1232502).
* CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
(bsc#1232501).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).
* CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).
* CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
(bsc#1232498).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
* CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
* CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
* CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
* CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219).
* CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
(bsc#1233464).
* CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
(bsc#1233465).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).
* CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).

The following non-security bugs were fixed:

* Documentation: kgdb: Correct parameter error (git-fixes).
* Drop OCFS2 patch causing a regression (bsc#1233255)
* Move upstreamed crypto patches into sorted section
* Move upstreamed patches into sorted section
* Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1"
(bsc#1215199).
* Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes)
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable-
fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
(git-fixes).
* acpi: CPPC: Fix _CPC register setting issue (git-fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* add bugreference to a hv_netvsc patch (bsc#1232413).
* aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
* alsa: 6fire: Release resources at card release (git-fixes).
* alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
* alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* alsa: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* alsa: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
(git-fixes).
* alsa: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* alsa: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
* alsa: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-
fixes).
* alsa: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).
* alsa: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
(bsc#1233298).
* alsa: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
* alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
* alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* alsa: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
* alsa: hda: Show the codec quirk info at probing (stable-fixes).
* alsa: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).
* alsa: pcm: Add sanity NULL check for the default mmap fault handler (stable-
fixes).
* alsa: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
* alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
* alsa: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
* alsa: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* alsa: usb-audio: Fix out of bounds reads when finding clock sources (stable-
fixes).
* alsa: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
devices (git-fixes).
* alsa: usb-audio: Make mic volume workarounds globally applicable (stable-
fixes).
* alsa: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
(stable-fixes).
* alsa: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* apparmor: fix 'Do simple duplicate message elimination' (git-fixes).
* apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
* apparmor: use kvfree_sensitive to free data->data (git-fixes).
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* asoc: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* asoc: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).
* asoc: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).
* asoc: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
* asoc: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
* asoc: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).
* asoc: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).
* asoc: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
* asoc: SOF: Wire up buffer flags (bsc#1233305).
* asoc: SOF: add alignment for topology header file struct definition
(bsc#1233305).
* asoc: SOF: align topology header file with sof topology header
(bsc#1233305).
* asoc: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
(git-fixes).
* asoc: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* asoc: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
* asoc: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
* asoc: SOF: ipc4-mtrace: move debug slot related definitions to header.h
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add definition for generic switch/enum control
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).
* asoc: SOF: ipc4-topology: Helper to find an swidget by module/instance id
(bsc#1233305).
* asoc: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA
(bsc#1233305).
* asoc: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).
* asoc: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).
* asoc: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).
* asoc: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).
* asoc: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
(bsc#1233305).
* asoc: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
fixes).
* asoc: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
* asoc: SOF: topology: dynamically allocate and store DAI widget->private
(bsc#1233305).
* asoc: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
* asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* asoc: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
* asoc: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
(stable-fixes).
* asoc: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
* asoc: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).
* asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* asoc: fsl_micfil: Add sample rate constraint (stable-fixes).
* asoc: fsl_micfil: fix regmap_write_bits usage (git-fixes).
* asoc: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* asoc: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
* asoc: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-
fixes).
* asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* asoc: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
(stable-fixes).
* asoc: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
(stable-fixes).
* asoc: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
(stable-fixes).
* bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
* bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
* bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
fixes).
* bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
* btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
switching CAN modes (git-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
* clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
* clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
* clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
* clk: imx: fracn-gppll: fix pll power up (git-fixes).
* clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
* clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
* clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
* clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
* clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
* clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
* cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
* cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
(git-fixes).
* crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
* crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return
-EBUSY (git-fixes).
* crypto: qat - remove check after debugfs_create_dir() (git-fixes).
* crypto: qat - remove faulty arbiter config reset (git-fixes).
* crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* doc: rcu: update printed dynticks counter bits (git-fixes).
* drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
(git-fixes).
* drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
* drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
dcn20_program_pipe (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp
(git-fixes).
* drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
* drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
* drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
* drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
* drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
* drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
* drm/msm: Fix some typos in comment (git-fixes).
* drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).
* drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
* drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
* drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
* drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
* e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
* efi/libstub: Free correct pointer on failure (git-fixes).
* efi/libstub: fix efi_parse_options() ignoring the default command line (git-
fixes).
* efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
* ext4: fix unttached inode after power cut with orphan file feature enabled
(bsc#1234009).
* f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).
* fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
fixes).
* firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
fixes).
* fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)
* fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gpio: exar: set value when external pull-up or pull-down is present (git-
fixes).
* gpio: zevio: Add missed label initialisation (git-fixes).
* hid: core: zero-initialize the report buffer (git-fixes).
* hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* hid: multitouch: Add support for B2402FVA track point (stable-fixes).
* hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* hid: wacom: fix when get product name maybe null pointer (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
(git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* i40e: fix race condition by adding filter's intermediate sync state (git-
fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* igb: Disable threaded IRQ for igb_msix_other (git-fixes).
* iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
* iio: accel: kx022a: Fix raw read format (git-fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
* iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
* input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
* input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
* input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
* input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
fixes).
* input: xpad - add support for MSI Claw A1M (git-fixes).
* input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
* input: xpad - fix support for some third-party controllers (git-fixes).
* input: xpad - sort xpad_device by vendor and product ID (git-fixes).
* input: xpad - spelling fixes for "Xbox" (git-fixes).
* intel_idle: add Granite Rapids Xeon support (bsc#1231630).
* intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
* io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
* io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
* jbd2: avoid infinite transaction commit loop (bsc#1234039).
* jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
* jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).
* jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).
* jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
* jbd2: fix potential data lost in recovering journal raced with synchronizing
fs bdev (bsc#1234044).
* jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
* jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
* jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
* kABI workaround for ASoC SOF (bsc#1233305).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
fixes kabi).
* kasan: move checks to do_strncpy_from_user (git-fixes).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
(git-fixes).
* kvm: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).
* kvm: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
(bsc#1215199).
* kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
* kvm: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
(bsc#1232207).
* kvm: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
* leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
* lib: string_helpers: silence snprintf() output truncation warning (git-
fixes).
* mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
* maple_tree: fix alloc node fail issue (git-fixes).
* maple_tree: refine mas_store_root() on storing NULL (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: amphion: Set video drvdata before register video device (git-fixes).
* media: ar0521: do not overflow when checking PLL values (git-fixes).
* media: atomisp: Add check for rgby_data memory allocation failure (git-
fixes).
* media: bttv: use audio defaults for winfast2000 (git-fixes).
* media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
fixes).
* media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* media: i2c: tc358743: Fix crash in the probe error path when using polling
(git-fixes).
* media: imx-jpeg: Ensure power suppliers be suspended before detach them
(git-fixes).
* media: imx-jpeg: Set video drvdata before register video device (git-fixes).
* media: mantis: remove orphan mantis_core.h (git-fixes).
* media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
* media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).
* media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: s5p-jpeg: prevent buffer overflows (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
* media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
* media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).
* media: uvcvideo: Stop stream during unregister (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* media: vb2: Fix comment (git-fixes).
* media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes).
* media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
* mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
* mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
fixes).
* minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
fixes).
* mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
* mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
* mm: refactor map_deny_write_exec() (git-fixes).
* mm: resolve faulty mmap_region() error path behaviour (git-fixes).
* mm: unconditionally close VMAs on error (git-fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mmc_spi: drop buggy snprintf() (git-fixes).
* mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
* mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
* net: mdio-ipq4019: add missing error check (git-fixes).
* net: phy: dp83822: Fix reset pin definitions (git-fixes).
* net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
(git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
* net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
fixes).
* net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
* nfs: remove revoked delegation from server's delegation list (git-fixes).
* nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
* nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
* nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
* nouveau: fw: sync dma after setup is called (git-fixes).
* nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
* ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-loop: flush off pending I/O while shutting down loop controller (git-
fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
* ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* ocfs2: uncache inode which has failed entering the group (git-fixes).
* of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)
* pci: Add T_PVPERL macro (git-fixes).
* pci: Fix reset_method_store() memory leak (git-fixes).
* pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* pci: rockchip-ep: Fix address translation unit programming (git-fixes).
* pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
* pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
* pinctrl: zynqmp: drop excess struct member description (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
* platform/x86: panasonic-laptop: Return errno correctly in show callback
(git-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
fixes).
* power: supply: rt9471: Use IC status regfield to report real charger status
(git-fixes).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
* rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* rdma/hns: Add mutex_destroy() (git-fixes)
* rdma/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
fixes)
* rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* rdma/hns: Use macro instead of magic number (git-fixes)
* rdma/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* rdma/rxe: Fix the qp flush warnings in req (git-fixes)
* rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* rdma/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: bbnsm: add remove hook (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
fixes).
* scsi: Remove scsi device no_start_on_resume flag (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
* scsi: core: Disable CDL by default (git-fixes).
* scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
* scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings
(git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpi3mr: Validate SAS port assignments (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
* scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-
fixes).
* soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
fixes).
* soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
* sunrpc: Remove BUG_ON call sites (git-fixes).
* tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* thunderbolt: Honor TMU requirements in the domain when setting TMU mode
(stable-fixes).
* tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
* tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
* tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tpm: fix signed/unsigned bug when checking event logs (git-fixes).
* tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
* u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file
(git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* unicode: Fix utf8_load() error path (git-fixes).
* usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* usb: chaoskey: fail open after removal (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
* usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
fixes).
* usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).
* usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
fixes).
* usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* usb: serial: option: add Quectel RG650V (stable-fixes).
* usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* vsock: Update msg_count on read_skb() (git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
fixes).
* wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
* wifi: ath12k: fix crash when unbinding (git-fixes).
* wifi: ath12k: fix warning when unbinding (git-fixes).
* wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
* x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
* x86/microcode/intel: Remove unnecessary cache writeback and invalidation
(git-fixes).
* x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
* x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Enable CPU topology enumeration (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/traps: move kmsan check after instrumentation_begin (git-fixes).
* x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
* x86: fix off-by-one in access_ok() (git-fixes).
* xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
* xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4314=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4314=1

* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-4314=1

## Package List:

* openSUSE Leap 15.6 (x86_64)
* kernel-rt_debug-debugsource-6.4.0-150600.10.20.1
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-vdso-6.4.0-150600.10.20.1
* kernel-rt-devel-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-6.4.0-150600.10.20.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-debugsource-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1
* reiserfs-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1
* dlm-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-optional-6.4.0-150600.10.20.1
* kernel-rt-extra-6.4.0-150600.10.20.1
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-extra-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-vdso-6.4.0-150600.10.20.1
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-optional-debuginfo-6.4.0-150600.10.20.1
* kernel-syms-rt-6.4.0-150600.10.20.1
* kernel-rt-debuginfo-6.4.0-150600.10.20.1
* kselftests-kmp-rt-6.4.0-150600.10.20.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* gfs2-kmp-rt-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-livepatch-devel-6.4.0-150600.10.20.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.20.1
* kernel-source-rt-6.4.0-150600.10.20.1
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-6.4.0-150600.10.20.1
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_20-rt-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-1-150600.1.3.1
* SUSE Real Time Module 15-SP6 (x86_64)
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-debugsource-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1
* gfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-6.4.0-150600.10.20.1
* dlm-kmp-rt-6.4.0-150600.10.20.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-devel-6.4.0-150600.10.20.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1
* kernel-syms-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-6.4.0-150600.10.20.1
* kernel-rt-debuginfo-6.4.0-150600.10.20.1
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.20.1
* kernel-source-rt-6.4.0-150600.10.20.1
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-6.4.0-150600.10.20.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52778.html
* https://www.suse.com/security/cve/CVE-2023-52920.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26703.html
* https://www.suse.com/security/cve/CVE-2024-26741.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26864.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27407.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36031.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36920.html
* https://www.suse.com/security/cve/CVE-2024-36927.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-40914.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-42102.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46788.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46845.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49866.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49895.html
* https://www.suse.com/security/cve/CVE-2024-49897.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49909.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49913.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50015.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50080.html
* https://www.suse.com/security/cve/CVE-2024-50081.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50169.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50276.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53042.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53045.html
* https://www.suse.com/security/cve/CVE-2024-53048.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53072.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53076.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53081.html
* https://www.suse.com/security/cve/CVE-2024-53082.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-53094.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53096.html
* https://www.suse.com/security/cve/CVE-2024-53100.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53106.html
* https://www.suse.com/security/cve/CVE-2024-53108.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53114.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222423
* https://bugzilla.suse.com/show_bug.cgi?id=1222587
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223112
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223733
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224948
* https://bugzilla.suse.com/show_bug.cgi?id=1225713
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225768
* https://bugzilla.suse.com/show_bug.cgi?id=1225813
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227842
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1229165
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230817
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230971
* https://bugzilla.suse.com/show_bug.cgi?id=1231076
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231630
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231946
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1232079
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232103
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232149
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232199
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232207
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232258
* https://bugzilla.suse.com/show_bug.cgi?id=1232259
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232305
* https://bugzilla.suse.com/show_bug.cgi?id=1232307
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232337
* https://bugzilla.suse.com/show_bug.cgi?id=1232352
* https://bugzilla.suse.com/show_bug.cgi?id=1232354
* https://bugzilla.suse.com/show_bug.cgi?id=1232355
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232386
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232396
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232494
* https://bugzilla.suse.com/show_bug.cgi?id=1232498
* https://bugzilla.suse.com/show_bug.cgi?id=1232499
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232501
* https://bugzilla.suse.com/show_bug.cgi?id=1232502
* https://bugzilla.suse.com/show_bug.cgi?id=1232704
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232823
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232869
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232876
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232880
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232894
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232925
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233029
* https://bugzilla.suse.com/show_bug.cgi?id=1233032
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233036
* https://bugzilla.suse.com/show_bug.cgi?id=1233041
* https://bugzilla.suse.com/show_bug.cgi?id=1233044
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233062
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233088
* https://bugzilla.suse.com/show_bug.cgi?id=1233091
* https://bugzilla.suse.com/show_bug.cgi?id=1233092
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233115
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233119
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233127
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233132
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233176
* https://bugzilla.suse.com/show_bug.cgi?id=1233179
* https://bugzilla.suse.com/show_bug.cgi?id=1233185
* https://bugzilla.suse.com/show_bug.cgi?id=1233188
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233193
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233203
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233207
* https://bugzilla.suse.com/show_bug.cgi?id=1233208
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233217
* https://bugzilla.suse.com/show_bug.cgi?id=1233219
* https://bugzilla.suse.com/show_bug.cgi?id=1233226
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233244
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233298
* https://bugzilla.suse.com/show_bug.cgi?id=1233305
* https://bugzilla.suse.com/show_bug.cgi?id=1233320
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233443
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233465
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233524
* https://bugzilla.suse.com/show_bug.cgi?id=1233540
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233564
* https://bugzilla.suse.com/show_bug.cgi?id=1233566
* https://bugzilla.suse.com/show_bug.cgi?id=1233567
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233572
* https://bugzilla.suse.com/show_bug.cgi?id=1233573
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1233641
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233721
* https://bugzilla.suse.com/show_bug.cgi?id=1233754
* https://bugzilla.suse.com/show_bug.cgi?id=1233756
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233771
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234009
* https://bugzilla.suse.com/show_bug.cgi?id=1234011
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234039
* https://bugzilla.suse.com/show_bug.cgi?id=1234040
* https://bugzilla.suse.com/show_bug.cgi?id=1234041
* https://bugzilla.suse.com/show_bug.cgi?id=1234042
* https://bugzilla.suse.com/show_bug.cgi?id=1234043
* https://bugzilla.suse.com/show_bug.cgi?id=1234044
* https://bugzilla.suse.com/show_bug.cgi?id=1234045
* https://bugzilla.suse.com/show_bug.cgi?id=1234046
* https://bugzilla.suse.com/show_bug.cgi?id=1234072
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234081
* https://bugzilla.suse.com/show_bug.cgi?id=1234083
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://bugzilla.suse.com/show_bug.cgi?id=1234121
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://jira.suse.com/browse/PED-11316
* https://jira.suse.com/browse/PED-11442
* https://jira.suse.com/browse/PED-11580
* https://jira.suse.com/browse/PED-9943



openSUSE-SU-2024:14571-1: moderate: docker-stable-24.0.9_ce-4.1 on GA media


# docker-stable-24.0.9_ce-4.1 on GA media

Announcement ID: openSUSE-SU-2024:14571-1
Rating: moderate

Cross-References:

* CVE-2024-23653

CVSS scores:

* CVE-2024-23653 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the docker-stable-24.0.9_ce-4.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* docker-stable 24.0.9_ce-4.1
* docker-stable-bash-completion 24.0.9_ce-4.1
* docker-stable-buildx 0.19.2-4.1
* docker-stable-fish-completion 24.0.9_ce-4.1
* docker-stable-rootless-extras 24.0.9_ce-4.1
* docker-stable-zsh-completion 24.0.9_ce-4.1

## References:

* https://www.suse.com/security/cve/CVE-2024-23653.html



openSUSE-SU-2024:14572-1: moderate: firefox-esr-128.5.1-1.1 on GA media


# firefox-esr-128.5.1-1.1 on GA media

Announcement ID: openSUSE-SU-2024:14572-1
Rating: moderate

Cross-References:

* CVE-2006-6077
* CVE-2007-0008
* CVE-2007-0009
* CVE-2007-0078
* CVE-2007-0079
* CVE-2007-0775
* CVE-2007-0776
* CVE-2007-0777
* CVE-2007-0780
* CVE-2007-0800
* CVE-2007-0981
* CVE-2007-0995
* CVE-2007-0996
* CVE-2007-3089
* CVE-2007-3285
* CVE-2007-3656
* CVE-2007-3670
* CVE-2007-3734
* CVE-2007-3735
* CVE-2007-3736
* CVE-2007-3737
* CVE-2007-3738
* CVE-2008-0412
* CVE-2008-0414
* CVE-2008-0415
* CVE-2008-0417
* CVE-2008-0418
* CVE-2008-0419
* CVE-2008-0591
* CVE-2008-0592
* CVE-2008-0593
* CVE-2008-0594
* CVE-2008-4063
* CVE-2008-5913
* CVE-2009-0040
* CVE-2009-0352
* CVE-2009-0354
* CVE-2009-0355
* CVE-2009-0356
* CVE-2009-0357
* CVE-2009-0358
* CVE-2009-0652
* CVE-2009-0771
* CVE-2009-0772
* CVE-2009-0773
* CVE-2009-0774
* CVE-2009-0775
* CVE-2009-0776
* CVE-2009-0777
* CVE-2009-1044
* CVE-2009-1169
* CVE-2009-1302
* CVE-2009-1306
* CVE-2009-1307
* CVE-2009-1308
* CVE-2009-1309
* CVE-2009-1310
* CVE-2009-1311
* CVE-2009-1312
* CVE-2009-1313
* CVE-2009-1563
* CVE-2009-2470
* CVE-2009-2654
* CVE-2009-3069
* CVE-2009-3072
* CVE-2009-3077
* CVE-2009-3078
* CVE-2009-3079
* CVE-2009-3274
* CVE-2009-3370
* CVE-2009-3371
* CVE-2009-3372
* CVE-2009-3373
* CVE-2009-3374
* CVE-2009-3375
* CVE-2009-3376
* CVE-2009-3377
* CVE-2009-3380
* CVE-2009-3388
* CVE-2009-3389
* CVE-2009-3555
* CVE-2009-3979
* CVE-2009-3983
* CVE-2009-3984
* CVE-2010-0164
* CVE-2010-0165
* CVE-2010-0168
* CVE-2010-0169
* CVE-2010-0170
* CVE-2010-0171
* CVE-2010-0172
* CVE-2010-0173
* CVE-2010-0176
* CVE-2010-0177
* CVE-2010-0178
* CVE-2010-0181
* CVE-2010-0182
* CVE-2010-0654
* CVE-2010-1028
* CVE-2010-1121
* CVE-2010-1125
* CVE-2010-1196
* CVE-2010-1197
* CVE-2010-1198
* CVE-2010-1199
* CVE-2010-1200
* CVE-2010-1203
* CVE-2010-1205
* CVE-2010-1206
* CVE-2010-1207
* CVE-2010-1208
* CVE-2010-1209
* CVE-2010-1210
* CVE-2010-1211
* CVE-2010-1213
* CVE-2010-1214
* CVE-2010-1215
* CVE-2010-2752
* CVE-2010-2753
* CVE-2010-2754
* CVE-2010-2755
* CVE-2010-2760
* CVE-2010-2762
* CVE-2010-2764
* CVE-2010-2765
* CVE-2010-2766
* CVE-2010-2767
* CVE-2010-2768
* CVE-2010-2769
* CVE-2010-3166
* CVE-2010-3167
* CVE-2010-3168
* CVE-2010-3169
* CVE-2010-3170
* CVE-2010-3173
* CVE-2010-3174
* CVE-2010-3177
* CVE-2010-3178
* CVE-2010-3179
* CVE-2010-3180
* CVE-2010-3182
* CVE-2010-3183
* CVE-2010-3765
* CVE-2011-0068
* CVE-2011-0069
* CVE-2011-0080
* CVE-2011-0084
* CVE-2011-1187
* CVE-2011-1202
* CVE-2011-2366
* CVE-2011-2367
* CVE-2011-2369
* CVE-2011-2370
* CVE-2011-2371
* CVE-2011-2372
* CVE-2011-2373
* CVE-2011-2374
* CVE-2011-2377
* CVE-2011-2986
* CVE-2011-2988
* CVE-2011-2989
* CVE-2011-2990
* CVE-2011-2993
* CVE-2011-2995
* CVE-2011-3000
* CVE-2011-3002
* CVE-2011-3004
* CVE-2011-3005
* CVE-2011-3026
* CVE-2011-3062
* CVE-2011-3079
* CVE-2011-3232
* CVE-2011-3648
* CVE-2011-3650
* CVE-2011-3651
* CVE-2011-3655
* CVE-2011-3658
* CVE-2011-3659
* CVE-2011-3660
* CVE-2011-3661
* CVE-2011-3663
* CVE-2012-0441
* CVE-2012-0442
* CVE-2012-0444
* CVE-2012-0445
* CVE-2012-0446
* CVE-2012-0447
* CVE-2012-0449
* CVE-2012-0451
* CVE-2012-0452
* CVE-2012-0455
* CVE-2012-0456
* CVE-2012-0458
* CVE-2012-0459
* CVE-2012-0460
* CVE-2012-0461
* CVE-2012-0463
* CVE-2012-0467
* CVE-2012-0469
* CVE-2012-0470
* CVE-2012-0471
* CVE-2012-0472
* CVE-2012-0473
* CVE-2012-0474
* CVE-2012-0475
* CVE-2012-0477
* CVE-2012-0478
* CVE-2012-0479
* CVE-2012-0759
* CVE-2012-1938
* CVE-2012-1944
* CVE-2012-1945
* CVE-2012-1946
* CVE-2012-1947
* CVE-2012-1949
* CVE-2012-1950
* CVE-2012-1951
* CVE-2012-1955
* CVE-2012-1956
* CVE-2012-1957
* CVE-2012-1958
* CVE-2012-1959
* CVE-2012-1960
* CVE-2012-1961
* CVE-2012-1962
* CVE-2012-1963
* CVE-2012-1965
* CVE-2012-1966
* CVE-2012-1967
* CVE-2012-1970
* CVE-2012-1972
* CVE-2012-1976
* CVE-2012-3960
* CVE-2012-3965
* CVE-2012-3966
* CVE-2012-3967
* CVE-2012-3969
* CVE-2012-3971
* CVE-2012-3972
* CVE-2012-3973
* CVE-2012-3975
* CVE-2012-3976
* CVE-2012-3978
* CVE-2012-3980
* CVE-2012-3982
* CVE-2012-3984
* CVE-2012-3985
* CVE-2012-3986
* CVE-2012-3988
* CVE-2012-3989
* CVE-2012-3990
* CVE-2012-3991
* CVE-2012-3992
* CVE-2012-3993
* CVE-2012-3994
* CVE-2012-3995
* CVE-2012-4181
* CVE-2012-4185
* CVE-2012-4188
* CVE-2012-4191
* CVE-2012-4192
* CVE-2012-4194
* CVE-2012-4201
* CVE-2012-4202
* CVE-2012-4203
* CVE-2012-4204
* CVE-2012-4205
* CVE-2012-4207
* CVE-2012-4208
* CVE-2012-4209
* CVE-2012-4210
* CVE-2012-4213
* CVE-2012-4214
* CVE-2012-5829
* CVE-2012-5830
* CVE-2012-5836
* CVE-2012-5837
* CVE-2012-5841
* CVE-2012-5842
* CVE-2013-0743
* CVE-2013-0744
* CVE-2013-0745
* CVE-2013-0746
* CVE-2013-0747
* CVE-2013-0748
* CVE-2013-0749
* CVE-2013-0750
* CVE-2013-0751
* CVE-2013-0752
* CVE-2013-0753
* CVE-2013-0754
* CVE-2013-0755
* CVE-2013-0756
* CVE-2013-0757
* CVE-2013-0758
* CVE-2013-0760
* CVE-2013-0761
* CVE-2013-0764
* CVE-2013-0765
* CVE-2013-0768
* CVE-2013-0772
* CVE-2013-0773
* CVE-2013-0774
* CVE-2013-0775
* CVE-2013-0776
* CVE-2013-0778
* CVE-2013-0780
* CVE-2013-0783
* CVE-2013-0787
* CVE-2013-0788
* CVE-2013-0792
* CVE-2013-0793
* CVE-2013-0794
* CVE-2013-0795
* CVE-2013-0796
* CVE-2013-0800
* CVE-2013-0801
* CVE-2013-1670
* CVE-2013-1671
* CVE-2013-1674
* CVE-2013-1675
* CVE-2013-1676
* CVE-2013-1679
* CVE-2013-1682
* CVE-2013-1684
* CVE-2013-1687
* CVE-2013-1688
* CVE-2013-1690
* CVE-2013-1692
* CVE-2013-1693
* CVE-2013-1694
* CVE-2013-1695
* CVE-2013-1696
* CVE-2013-1697
* CVE-2013-1698
* CVE-2013-1699
* CVE-2013-1701
* CVE-2013-1704
* CVE-2013-1705
* CVE-2013-1708
* CVE-2013-1709
* CVE-2013-1710
* CVE-2013-1711
* CVE-2013-1713
* CVE-2013-1714
* CVE-2013-1717
* CVE-2013-1718
* CVE-2013-1720
* CVE-2013-1721
* CVE-2013-1722
* CVE-2013-1723
* CVE-2013-1724
* CVE-2013-1725
* CVE-2013-1728
* CVE-2013-1730
* CVE-2013-1732
* CVE-2013-1735
* CVE-2013-1737
* CVE-2013-1738
* CVE-2013-5590
* CVE-2013-5593
* CVE-2013-5595
* CVE-2013-5596
* CVE-2013-5597
* CVE-2013-5598
* CVE-2013-5599
* CVE-2013-5602
* CVE-2013-5603
* CVE-2013-5604
* CVE-2013-5609
* CVE-2013-5611
* CVE-2013-5612
* CVE-2013-5613
* CVE-2013-5614
* CVE-2013-5615
* CVE-2013-5616
* CVE-2013-5618
* CVE-2013-5619
* CVE-2013-6629
* CVE-2013-6671
* CVE-2013-6672
* CVE-2013-6673
* CVE-2014-1477
* CVE-2014-1479
* CVE-2014-1480
* CVE-2014-1481
* CVE-2014-1482
* CVE-2014-1483
* CVE-2014-1484
* CVE-2014-1485
* CVE-2014-1486
* CVE-2014-1487
* CVE-2014-1488
* CVE-2014-1489
* CVE-2014-1490
* CVE-2014-1492
* CVE-2014-1493
* CVE-2014-1497
* CVE-2014-1498
* CVE-2014-1499
* CVE-2014-1500
* CVE-2014-1502
* CVE-2014-1504
* CVE-2014-1505
* CVE-2014-1508
* CVE-2014-1509
* CVE-2014-1510
* CVE-2014-1512
* CVE-2014-1513
* CVE-2014-1514
* CVE-2014-1518
* CVE-2014-1522
* CVE-2014-1523
* CVE-2014-1524
* CVE-2014-1525
* CVE-2014-1526
* CVE-2014-1528
* CVE-2014-1529
* CVE-2014-1530
* CVE-2014-1531
* CVE-2014-1532
* CVE-2014-1533
* CVE-2014-1536
* CVE-2014-1539
* CVE-2014-1540
* CVE-2014-1541
* CVE-2014-1542
* CVE-2014-1543
* CVE-2014-1544
* CVE-2014-1545
* CVE-2014-1547
* CVE-2014-1549
* CVE-2014-1550
* CVE-2014-1552
* CVE-2014-1553
* CVE-2014-1555
* CVE-2014-1556
* CVE-2014-1557
* CVE-2014-1558
* CVE-2014-1561
* CVE-2014-1563
* CVE-2014-1564
* CVE-2014-1565
* CVE-2014-1567
* CVE-2014-1574
* CVE-2014-1576
* CVE-2014-1577
* CVE-2014-1578
* CVE-2014-1580
* CVE-2014-1581
* CVE-2014-1582
* CVE-2014-1583
* CVE-2014-1585
* CVE-2014-1587
* CVE-2014-1589
* CVE-2014-1590
* CVE-2014-1591
* CVE-2014-1592
* CVE-2014-1593
* CVE-2014-1594
* CVE-2014-8634
* CVE-2014-8636
* CVE-2014-8637
* CVE-2014-8638
* CVE-2014-8639
* CVE-2014-8640
* CVE-2014-8641
* CVE-2014-8642
* CVE-2014-8643
* CVE-2015-0798
* CVE-2015-0799
* CVE-2015-0800
* CVE-2015-0801
* CVE-2015-0802
* CVE-2015-0803
* CVE-2015-0805
* CVE-2015-0807
* CVE-2015-0808
* CVE-2015-0810
* CVE-2015-0811
* CVE-2015-0812
* CVE-2015-0813
* CVE-2015-0814
* CVE-2015-0816
* CVE-2015-0817
* CVE-2015-0818
* CVE-2015-0819
* CVE-2015-0820
* CVE-2015-0821
* CVE-2015-0822
* CVE-2015-0823
* CVE-2015-0824
* CVE-2015-0825
* CVE-2015-0826
* CVE-2015-0827
* CVE-2015-0828
* CVE-2015-0829
* CVE-2015-0830
* CVE-2015-0831
* CVE-2015-0832
* CVE-2015-0833
* CVE-2015-0834
* CVE-2015-0835
* CVE-2015-2706
* CVE-2015-2708
* CVE-2015-2710
* CVE-2015-2711
* CVE-2015-2712
* CVE-2015-2713
* CVE-2015-2715
* CVE-2015-2716
* CVE-2015-2717
* CVE-2015-2718
* CVE-2015-2721
* CVE-2015-2722
* CVE-2015-2724
* CVE-2015-2727
* CVE-2015-2728
* CVE-2015-2729
* CVE-2015-2730
* CVE-2015-2731
* CVE-2015-2734
* CVE-2015-2738
* CVE-2015-2741
* CVE-2015-2742
* CVE-2015-2743
* CVE-2015-4000
* CVE-2015-4473
* CVE-2015-4475
* CVE-2015-4476
* CVE-2015-4477
* CVE-2015-4478
* CVE-2015-4479
* CVE-2015-4481
* CVE-2015-4482
* CVE-2015-4483
* CVE-2015-4484
* CVE-2015-4485
* CVE-2015-4487
* CVE-2015-4490
* CVE-2015-4491
* CVE-2015-4492
* CVE-2015-4495
* CVE-2015-4497
* CVE-2015-4498
* CVE-2015-4500
* CVE-2015-4502
* CVE-2015-4503
* CVE-2015-4504
* CVE-2015-4505
* CVE-2015-4506
* CVE-2015-4507
* CVE-2015-4508
* CVE-2015-4509
* CVE-2015-4510
* CVE-2015-4511
* CVE-2015-4512
* CVE-2015-4513
* CVE-2015-4515
* CVE-2015-4516
* CVE-2015-4517
* CVE-2015-4518
* CVE-2015-4519
* CVE-2015-4520
* CVE-2015-7174
* CVE-2015-7178
* CVE-2015-7180
* CVE-2015-7181
* CVE-2015-7184
* CVE-2015-7185
* CVE-2015-7186
* CVE-2015-7187
* CVE-2015-7188
* CVE-2015-7189
* CVE-2015-7190
* CVE-2015-7191
* CVE-2015-7192
* CVE-2015-7193
* CVE-2015-7194
* CVE-2015-7195
* CVE-2015-7196
* CVE-2015-7197
* CVE-2015-7198
* CVE-2015-7201
* CVE-2015-7203
* CVE-2015-7204
* CVE-2015-7205
* CVE-2015-7207
* CVE-2015-7208
* CVE-2015-7210
* CVE-2015-7211
* CVE-2015-7212
* CVE-2015-7213
* CVE-2015-7214
* CVE-2015-7215
* CVE-2015-7216
* CVE-2015-7218
* CVE-2015-7222
* CVE-2015-7223
* CVE-2015-7575
* CVE-2016-0718
* CVE-2016-1930
* CVE-2016-1933
* CVE-2016-1935
* CVE-2016-1937
* CVE-2016-1938
* CVE-2016-1942
* CVE-2016-1944
* CVE-2016-1947
* CVE-2016-1949
* CVE-2016-1950
* CVE-2016-1952
* CVE-2016-1954
* CVE-2016-1955
* CVE-2016-1956
* CVE-2016-1957
* CVE-2016-1958
* CVE-2016-1959
* CVE-2016-1960
* CVE-2016-1961
* CVE-2016-1962
* CVE-2016-1963
* CVE-2016-1964
* CVE-2016-1965
* CVE-2016-1966
* CVE-2016-1967
* CVE-2016-1968
* CVE-2016-1970
* CVE-2016-1973
* CVE-2016-1974
* CVE-2016-1976
* CVE-2016-1977
* CVE-2016-1979
* CVE-2016-2792
* CVE-2016-2796
* CVE-2016-2800
* CVE-2016-2804
* CVE-2016-2808
* CVE-2016-2809
* CVE-2016-2810
* CVE-2016-2811
* CVE-2016-2813
* CVE-2016-2814
* CVE-2016-2815
* CVE-2016-2816
* CVE-2016-2817
* CVE-2016-2819
* CVE-2016-2820
* CVE-2016-2821
* CVE-2016-2822
* CVE-2016-2824
* CVE-2016-2825
* CVE-2016-2827
* CVE-2016-2828
* CVE-2016-2829
* CVE-2016-2830
* CVE-2016-2831
* CVE-2016-2832
* CVE-2016-2833
* CVE-2016-2834
* CVE-2016-2835
* CVE-2016-2837
* CVE-2016-2838
* CVE-2016-2839
* CVE-2016-5250
* CVE-2016-5251
* CVE-2016-5252
* CVE-2016-5253
* CVE-2016-5254
* CVE-2016-5255
* CVE-2016-5256
* CVE-2016-5257
* CVE-2016-5258
* CVE-2016-5259
* CVE-2016-5260
* CVE-2016-5261
* CVE-2016-5262
* CVE-2016-5263
* CVE-2016-5264
* CVE-2016-5265
* CVE-2016-5266
* CVE-2016-5267
* CVE-2016-5268
* CVE-2016-5270
* CVE-2016-5271
* CVE-2016-5272
* CVE-2016-5273
* CVE-2016-5274
* CVE-2016-5275
* CVE-2016-5276
* CVE-2016-5277
* CVE-2016-5278
* CVE-2016-5279
* CVE-2016-5280
* CVE-2016-5281
* CVE-2016-5282
* CVE-2016-5283
* CVE-2016-5284
* CVE-2016-5287
* CVE-2016-5288
* CVE-2016-5289
* CVE-2016-5290
* CVE-2016-5291
* CVE-2016-5292
* CVE-2016-5293
* CVE-2016-5294
* CVE-2016-5295
* CVE-2016-5296
* CVE-2016-5297
* CVE-2016-5298
* CVE-2016-5299
* CVE-2016-6354
* CVE-2016-9061
* CVE-2016-9062
* CVE-2016-9063
* CVE-2016-9064
* CVE-2016-9065
* CVE-2016-9066
* CVE-2016-9067
* CVE-2016-9068
* CVE-2016-9069
* CVE-2016-9070
* CVE-2016-9071
* CVE-2016-9072
* CVE-2016-9073
* CVE-2016-9074
* CVE-2016-9075
* CVE-2016-9076
* CVE-2016-9077
* CVE-2016-9078
* CVE-2016-9079
* CVE-2016-9080
* CVE-2016-9893
* CVE-2016-9894
* CVE-2016-9895
* CVE-2016-9896
* CVE-2016-9897
* CVE-2016-9898
* CVE-2016-9899
* CVE-2016-9900
* CVE-2016-9901
* CVE-2016-9902
* CVE-2016-9903
* CVE-2016-9904
* CVE-2017-16541
* CVE-2017-5373
* CVE-2017-5374
* CVE-2017-5375
* CVE-2017-5376
* CVE-2017-5377
* CVE-2017-5378
* CVE-2017-5379
* CVE-2017-5380
* CVE-2017-5381
* CVE-2017-5382
* CVE-2017-5383
* CVE-2017-5384
* CVE-2017-5385
* CVE-2017-5386
* CVE-2017-5387
* CVE-2017-5388
* CVE-2017-5389
* CVE-2017-5390
* CVE-2017-5391
* CVE-2017-5392
* CVE-2017-5393
* CVE-2017-5394
* CVE-2017-5395
* CVE-2017-5396
* CVE-2017-5398
* CVE-2017-5399
* CVE-2017-5400
* CVE-2017-5401
* CVE-2017-5402
* CVE-2017-5403
* CVE-2017-5404
* CVE-2017-5405
* CVE-2017-5406
* CVE-2017-5407
* CVE-2017-5408
* CVE-2017-5410
* CVE-2017-5412
* CVE-2017-5413
* CVE-2017-5414
* CVE-2017-5415
* CVE-2017-5416
* CVE-2017-5417
* CVE-2017-5418
* CVE-2017-5419
* CVE-2017-5420
* CVE-2017-5421
* CVE-2017-5422
* CVE-2017-5426
* CVE-2017-5427
* CVE-2017-5428
* CVE-2017-5429
* CVE-2017-5430
* CVE-2017-5432
* CVE-2017-5433
* CVE-2017-5434
* CVE-2017-5435
* CVE-2017-5436
* CVE-2017-5437
* CVE-2017-5438
* CVE-2017-5439
* CVE-2017-5440
* CVE-2017-5441
* CVE-2017-5442
* CVE-2017-5443
* CVE-2017-5444
* CVE-2017-5445
* CVE-2017-5446
* CVE-2017-5447
* CVE-2017-5448
* CVE-2017-5449
* CVE-2017-5451
* CVE-2017-5453
* CVE-2017-5454
* CVE-2017-5455
* CVE-2017-5456
* CVE-2017-5458
* CVE-2017-5459
* CVE-2017-5460
* CVE-2017-5461
* CVE-2017-5462
* CVE-2017-5464
* CVE-2017-5465
* CVE-2017-5466
* CVE-2017-5467
* CVE-2017-5468
* CVE-2017-5469
* CVE-2017-7753
* CVE-2017-7779
* CVE-2017-7780
* CVE-2017-7781
* CVE-2017-7782
* CVE-2017-7783
* CVE-2017-7784
* CVE-2017-7785
* CVE-2017-7786
* CVE-2017-7787
* CVE-2017-7788
* CVE-2017-7789
* CVE-2017-7790
* CVE-2017-7791
* CVE-2017-7792
* CVE-2017-7793
* CVE-2017-7794
* CVE-2017-7796
* CVE-2017-7797
* CVE-2017-7798
* CVE-2017-7799
* CVE-2017-7800
* CVE-2017-7801
* CVE-2017-7802
* CVE-2017-7803
* CVE-2017-7804
* CVE-2017-7805
* CVE-2017-7806
* CVE-2017-7807
* CVE-2017-7808
* CVE-2017-7809
* CVE-2017-7810
* CVE-2017-7811
* CVE-2017-7812
* CVE-2017-7813
* CVE-2017-7814
* CVE-2017-7815
* CVE-2017-7816
* CVE-2017-7817
* CVE-2017-7818
* CVE-2017-7819
* CVE-2017-7820
* CVE-2017-7821
* CVE-2017-7822
* CVE-2017-7823
* CVE-2017-7824
* CVE-2017-7825
* CVE-2017-7826
* CVE-2017-7827
* CVE-2017-7828
* CVE-2017-7830
* CVE-2017-7831
* CVE-2017-7832
* CVE-2017-7833
* CVE-2017-7834
* CVE-2017-7835
* CVE-2017-7836
* CVE-2017-7837
* CVE-2017-7838
* CVE-2017-7839
* CVE-2017-7840
* CVE-2017-7842
* CVE-2017-7843
* CVE-2017-7844
* CVE-2018-12358
* CVE-2018-12359
* CVE-2018-12360
* CVE-2018-12361
* CVE-2018-12362
* CVE-2018-12363
* CVE-2018-12364
* CVE-2018-12365
* CVE-2018-12366
* CVE-2018-12367
* CVE-2018-12369
* CVE-2018-12370
* CVE-2018-12371
* CVE-2018-12375
* CVE-2018-12376
* CVE-2018-12377
* CVE-2018-12378
* CVE-2018-12379
* CVE-2018-12381
* CVE-2018-12382
* CVE-2018-12383
* CVE-2018-12385
* CVE-2018-12386
* CVE-2018-12387
* CVE-2018-12388
* CVE-2018-12390
* CVE-2018-12391
* CVE-2018-12392
* CVE-2018-12393
* CVE-2018-12395
* CVE-2018-12396
* CVE-2018-12397
* CVE-2018-12398
* CVE-2018-12399
* CVE-2018-12400
* CVE-2018-12401
* CVE-2018-12402
* CVE-2018-12403
* CVE-2018-12405
* CVE-2018-12406
* CVE-2018-12407
* CVE-2018-17466
* CVE-2018-18356
* CVE-2018-18492
* CVE-2018-18493
* CVE-2018-18494
* CVE-2018-18495
* CVE-2018-18496
* CVE-2018-18497
* CVE-2018-18498
* CVE-2018-18500
* CVE-2018-18501
* CVE-2018-18502
* CVE-2018-18503
* CVE-2018-18504
* CVE-2018-18505
* CVE-2018-18506
* CVE-2018-18511
* CVE-2018-5089
* CVE-2018-5090
* CVE-2018-5091
* CVE-2018-5092
* CVE-2018-5093
* CVE-2018-5094
* CVE-2018-5095
* CVE-2018-5097
* CVE-2018-5098
* CVE-2018-5099
* CVE-2018-5100
* CVE-2018-5101
* CVE-2018-5102
* CVE-2018-5103
* CVE-2018-5104
* CVE-2018-5105
* CVE-2018-5106
* CVE-2018-5107
* CVE-2018-5108
* CVE-2018-5109
* CVE-2018-5110
* CVE-2018-5111
* CVE-2018-5112
* CVE-2018-5113
* CVE-2018-5114
* CVE-2018-5115
* CVE-2018-5116
* CVE-2018-5117
* CVE-2018-5118
* CVE-2018-5119
* CVE-2018-5121
* CVE-2018-5122
* CVE-2018-5125
* CVE-2018-5126
* CVE-2018-5127
* CVE-2018-5128
* CVE-2018-5129
* CVE-2018-5130
* CVE-2018-5131
* CVE-2018-5132
* CVE-2018-5133
* CVE-2018-5134
* CVE-2018-5135
* CVE-2018-5136
* CVE-2018-5137
* CVE-2018-5138
* CVE-2018-5140
* CVE-2018-5141
* CVE-2018-5142
* CVE-2018-5143
* CVE-2018-5146
* CVE-2018-5147
* CVE-2018-5148
* CVE-2018-5150
* CVE-2018-5151
* CVE-2018-5152
* CVE-2018-5153
* CVE-2018-5154
* CVE-2018-5155
* CVE-2018-5156
* CVE-2018-5157
* CVE-2018-5158
* CVE-2018-5159
* CVE-2018-5160
* CVE-2018-5163
* CVE-2018-5164
* CVE-2018-5165
* CVE-2018-5166
* CVE-2018-5167
* CVE-2018-5168
* CVE-2018-5169
* CVE-2018-5172
* CVE-2018-5173
* CVE-2018-5174
* CVE-2018-5175
* CVE-2018-5176
* CVE-2018-5177
* CVE-2018-5180
* CVE-2018-5181
* CVE-2018-5182
* CVE-2018-5186
* CVE-2018-5187
* CVE-2018-5188
* CVE-2018-6126
* CVE-2018-6156
* CVE-2019-11691
* CVE-2019-11692
* CVE-2019-11693
* CVE-2019-11694
* CVE-2019-11695
* CVE-2019-11696
* CVE-2019-11697
* CVE-2019-11698
* CVE-2019-11699
* CVE-2019-11700
* CVE-2019-11701
* CVE-2019-11707
* CVE-2019-11708
* CVE-2019-11709
* CVE-2019-11710
* CVE-2019-11711
* CVE-2019-11712
* CVE-2019-11713
* CVE-2019-11714
* CVE-2019-11715
* CVE-2019-11716
* CVE-2019-11717
* CVE-2019-11718
* CVE-2019-11719
* CVE-2019-11720
* CVE-2019-11721
* CVE-2019-11723
* CVE-2019-11724
* CVE-2019-11725
* CVE-2019-11727
* CVE-2019-11728
* CVE-2019-11729
* CVE-2019-11730
* CVE-2019-11733
* CVE-2019-11734
* CVE-2019-11735
* CVE-2019-11736
* CVE-2019-11737
* CVE-2019-11738
* CVE-2019-11740
* CVE-2019-11741
* CVE-2019-11742
* CVE-2019-11743
* CVE-2019-11744
* CVE-2019-11746
* CVE-2019-11747
* CVE-2019-11748
* CVE-2019-11749
* CVE-2019-11750
* CVE-2019-11751
* CVE-2019-11752
* CVE-2019-11753
* CVE-2019-11754
* CVE-2019-11756
* CVE-2019-11757
* CVE-2019-11759
* CVE-2019-11760
* CVE-2019-11761
* CVE-2019-11762
* CVE-2019-11763
* CVE-2019-11764
* CVE-2019-11765
* CVE-2019-13722
* CVE-2019-15903
* CVE-2019-17000
* CVE-2019-17001
* CVE-2019-17002
* CVE-2019-17005
* CVE-2019-17008
* CVE-2019-17010
* CVE-2019-17011
* CVE-2019-17012
* CVE-2019-17013
* CVE-2019-17014
* CVE-2019-17016
* CVE-2019-17017
* CVE-2019-17020
* CVE-2019-17022
* CVE-2019-17023
* CVE-2019-17024
* CVE-2019-17025
* CVE-2019-17026
* CVE-2019-20503
* CVE-2019-5785
* CVE-2019-5849
* CVE-2019-7317
* CVE-2019-9788
* CVE-2019-9789
* CVE-2019-9790
* CVE-2019-9791
* CVE-2019-9792
* CVE-2019-9793
* CVE-2019-9794
* CVE-2019-9795
* CVE-2019-9796
* CVE-2019-9797
* CVE-2019-9798
* CVE-2019-9799
* CVE-2019-9800
* CVE-2019-9801
* CVE-2019-9802
* CVE-2019-9803
* CVE-2019-9804
* CVE-2019-9805
* CVE-2019-9806
* CVE-2019-9807
* CVE-2019-9808
* CVE-2019-9809
* CVE-2019-9810
* CVE-2019-9811
* CVE-2019-9812
* CVE-2019-9813
* CVE-2019-9814
* CVE-2019-9815
* CVE-2019-9816
* CVE-2019-9817
* CVE-2019-9818
* CVE-2019-9819
* CVE-2019-9820
* CVE-2019-9821
* CVE-2020-12387
* CVE-2020-12388
* CVE-2020-12389
* CVE-2020-12390
* CVE-2020-12391
* CVE-2020-12392
* CVE-2020-12393
* CVE-2020-12394
* CVE-2020-12395
* CVE-2020-12396
* CVE-2020-12399
* CVE-2020-12400
* CVE-2020-12401
* CVE-2020-12402
* CVE-2020-12405
* CVE-2020-12406
* CVE-2020-12407
* CVE-2020-12408
* CVE-2020-12409
* CVE-2020-12411
* CVE-2020-12415
* CVE-2020-12416
* CVE-2020-12417
* CVE-2020-12418
* CVE-2020-12419
* CVE-2020-12420
* CVE-2020-12421
* CVE-2020-12422
* CVE-2020-12423
* CVE-2020-12424
* CVE-2020-12425
* CVE-2020-12426
* CVE-2020-15254
* CVE-2020-15652
* CVE-2020-15653
* CVE-2020-15654
* CVE-2020-15655
* CVE-2020-15656
* CVE-2020-15657
* CVE-2020-15658
* CVE-2020-15659
* CVE-2020-15663
* CVE-2020-15664
* CVE-2020-15665
* CVE-2020-15666
* CVE-2020-15667
* CVE-2020-15668
* CVE-2020-15670
* CVE-2020-15673
* CVE-2020-15674
* CVE-2020-15675
* CVE-2020-15676
* CVE-2020-15677
* CVE-2020-15678
* CVE-2020-15680
* CVE-2020-15681
* CVE-2020-15682
* CVE-2020-15683
* CVE-2020-15684
* CVE-2020-15969
* CVE-2020-15999
* CVE-2020-16012
* CVE-2020-16042
* CVE-2020-16044
* CVE-2020-26950
* CVE-2020-26951
* CVE-2020-26952
* CVE-2020-26953
* CVE-2020-26954
* CVE-2020-26955
* CVE-2020-26956
* CVE-2020-26957
* CVE-2020-26958
* CVE-2020-26959
* CVE-2020-26960
* CVE-2020-26961
* CVE-2020-26962
* CVE-2020-26963
* CVE-2020-26964
* CVE-2020-26965
* CVE-2020-26966
* CVE-2020-26967
* CVE-2020-26968
* CVE-2020-26969
* CVE-2020-26971
* CVE-2020-26972
* CVE-2020-26973
* CVE-2020-26974
* CVE-2020-26975
* CVE-2020-26976
* CVE-2020-26977
* CVE-2020-26978
* CVE-2020-26979
* CVE-2020-35111
* CVE-2020-35112
* CVE-2020-35113
* CVE-2020-35114
* CVE-2020-6463
* CVE-2020-6514
* CVE-2020-6796
* CVE-2020-6797
* CVE-2020-6798
* CVE-2020-6799
* CVE-2020-6800
* CVE-2020-6801
* CVE-2020-6805
* CVE-2020-6806
* CVE-2020-6807
* CVE-2020-6808
* CVE-2020-6809
* CVE-2020-6810
* CVE-2020-6811
* CVE-2020-6812
* CVE-2020-6813
* CVE-2020-6814
* CVE-2020-6815
* CVE-2020-6819
* CVE-2020-6820
* CVE-2020-6821
* CVE-2020-6822
* CVE-2020-6823
* CVE-2020-6824
* CVE-2020-6825
* CVE-2020-6826
* CVE-2020-6829
* CVE-2020-6831
* CVE-2021-23953
* CVE-2021-23954
* CVE-2021-23955
* CVE-2021-23956
* CVE-2021-23957
* CVE-2021-23958
* CVE-2021-23959
* CVE-2021-23960
* CVE-2021-23961
* CVE-2021-23962
* CVE-2021-23963
* CVE-2021-23964
* CVE-2021-23965
* CVE-2021-23968
* CVE-2021-23969
* CVE-2021-23970
* CVE-2021-23971
* CVE-2021-23972
* CVE-2021-23973
* CVE-2021-23974
* CVE-2021-23975
* CVE-2021-23976
* CVE-2021-23977
* CVE-2021-23978
* CVE-2021-23979
* CVE-2021-23981
* CVE-2021-23982
* CVE-2021-23983
* CVE-2021-23984
* CVE-2021-23985
* CVE-2021-23986
* CVE-2021-23987
* CVE-2021-23988
* CVE-2021-23994
* CVE-2021-23995
* CVE-2021-23996
* CVE-2021-23997
* CVE-2021-23998
* CVE-2021-23999
* CVE-2021-24000
* CVE-2021-24001
* CVE-2021-24002
* CVE-2021-29944
* CVE-2021-29945
* CVE-2021-29946
* CVE-2021-29947
* CVE-2021-29952
* CVE-2021-29959
* CVE-2021-29960
* CVE-2021-29961
* CVE-2021-29962
* CVE-2021-29963
* CVE-2021-29964
* CVE-2021-29965
* CVE-2021-29966
* CVE-2021-29967
* CVE-2021-29970
* CVE-2021-29971
* CVE-2021-29972
* CVE-2021-29973
* CVE-2021-29974
* CVE-2021-29975
* CVE-2021-29976
* CVE-2021-29977
* CVE-2021-29980
* CVE-2021-29981
* CVE-2021-29982
* CVE-2021-29983
* CVE-2021-29984
* CVE-2021-29985
* CVE-2021-29986
* CVE-2021-29987
* CVE-2021-29988
* CVE-2021-29989
* CVE-2021-29990
* CVE-2021-29991
* CVE-2021-29993
* CVE-2021-30547
* CVE-2021-32810
* CVE-2021-38491
* CVE-2021-38492
* CVE-2021-38493
* CVE-2021-38494
* CVE-2021-38496
* CVE-2021-38497
* CVE-2021-38498
* CVE-2021-38499
* CVE-2021-38500
* CVE-2021-38501
* CVE-2021-38503
* CVE-2021-38504
* CVE-2021-38505
* CVE-2021-38506
* CVE-2021-38507
* CVE-2021-38508
* CVE-2021-38509
* CVE-2021-38510
* CVE-2021-4140
* CVE-2021-43536
* CVE-2021-43537
* CVE-2021-43538
* CVE-2021-43539
* CVE-2021-43540
* CVE-2021-43541
* CVE-2021-43542
* CVE-2021-43543
* CVE-2021-43544
* CVE-2021-43545
* CVE-2021-43546
* CVE-2022-0511
* CVE-2022-0843
* CVE-2022-1097
* CVE-2022-1529
* CVE-2022-1802
* CVE-2022-1919
* CVE-2022-2200
* CVE-2022-22736
* CVE-2022-22737
* CVE-2022-22738
* CVE-2022-22739
* CVE-2022-22740
* CVE-2022-22741
* CVE-2022-22742
* CVE-2022-22743
* CVE-2022-22744
* CVE-2022-22745
* CVE-2022-22746
* CVE-2022-22747
* CVE-2022-22748
* CVE-2022-22749
* CVE-2022-22750
* CVE-2022-22751
* CVE-2022-22752
* CVE-2022-22753
* CVE-2022-22754
* CVE-2022-22755
* CVE-2022-22756
* CVE-2022-22757
* CVE-2022-22758
* CVE-2022-22759
* CVE-2022-22760
* CVE-2022-22761
* CVE-2022-22762
* CVE-2022-22764
* CVE-2022-24713
* CVE-2022-2505
* CVE-2022-26381
* CVE-2022-26382
* CVE-2022-26383
* CVE-2022-26384
* CVE-2022-26385
* CVE-2022-26387
* CVE-2022-28281
* CVE-2022-28282
* CVE-2022-28283
* CVE-2022-28284
* CVE-2022-28285
* CVE-2022-28286
* CVE-2022-28287
* CVE-2022-28288
* CVE-2022-28289
* CVE-2022-29909
* CVE-2022-29910
* CVE-2022-29911
* CVE-2022-29912
* CVE-2022-29914
* CVE-2022-29915
* CVE-2022-29916
* CVE-2022-29917
* CVE-2022-29918
* CVE-2022-31736
* CVE-2022-31737
* CVE-2022-31738
* CVE-2022-31739
* CVE-2022-31740
* CVE-2022-31741
* CVE-2022-31742
* CVE-2022-31743
* CVE-2022-31744
* CVE-2022-31745
* CVE-2022-31747
* CVE-2022-31748
* CVE-2022-34468
* CVE-2022-34469
* CVE-2022-34470
* CVE-2022-34471
* CVE-2022-34472
* CVE-2022-34473
* CVE-2022-34474
* CVE-2022-34475
* CVE-2022-34476
* CVE-2022-34477
* CVE-2022-34478
* CVE-2022-34479
* CVE-2022-34480
* CVE-2022-34481
* CVE-2022-34482
* CVE-2022-34483
* CVE-2022-34484
* CVE-2022-34485
* CVE-2022-36314
* CVE-2022-36315
* CVE-2022-36316
* CVE-2022-36317
* CVE-2022-36318
* CVE-2022-36319
* CVE-2022-36320
* CVE-2022-38472
* CVE-2022-38473
* CVE-2022-38474
* CVE-2022-38475
* CVE-2022-38477
* CVE-2022-38478
* CVE-2022-40674
* CVE-2022-40956
* CVE-2022-40957
* CVE-2022-40958
* CVE-2022-40959
* CVE-2022-40960
* CVE-2022-40961
* CVE-2022-40962
* CVE-2022-42927
* CVE-2022-42928
* CVE-2022-42929
* CVE-2022-42930
* CVE-2022-42931
* CVE-2022-42932
* CVE-2022-45403
* CVE-2022-45404
* CVE-2022-45405
* CVE-2022-45406
* CVE-2022-45407
* CVE-2022-45408
* CVE-2022-45409
* CVE-2022-45410
* CVE-2022-45411
* CVE-2022-45412
* CVE-2022-45413
* CVE-2022-45415
* CVE-2022-45416
* CVE-2022-45417
* CVE-2022-45418
* CVE-2022-45419
* CVE-2022-45420
* CVE-2022-45421
* CVE-2022-46871
* CVE-2022-46872
* CVE-2022-46873
* CVE-2022-46874
* CVE-2022-46875
* CVE-2022-46877
* CVE-2022-46878
* CVE-2022-46879
* CVE-2023-0767
* CVE-2023-23597
* CVE-2023-23598
* CVE-2023-23599
* CVE-2023-23600
* CVE-2023-23601
* CVE-2023-23602
* CVE-2023-23603
* CVE-2023-23604
* CVE-2023-23605
* CVE-2023-23606
* CVE-2023-25728
* CVE-2023-25729
* CVE-2023-25730
* CVE-2023-25731
* CVE-2023-25732
* CVE-2023-25733
* CVE-2023-25734
* CVE-2023-25735
* CVE-2023-25736
* CVE-2023-25737
* CVE-2023-25738
* CVE-2023-25739
* CVE-2023-25740
* CVE-2023-25741
* CVE-2023-25742
* CVE-2023-25743
* CVE-2023-25744
* CVE-2023-25745
* CVE-2023-25748
* CVE-2023-25749
* CVE-2023-25750
* CVE-2023-25751
* CVE-2023-25752
* CVE-2023-28159
* CVE-2023-28160
* CVE-2023-28161
* CVE-2023-28162
* CVE-2023-28163
* CVE-2023-28164
* CVE-2023-28176
* CVE-2023-28177
* CVE-2023-29531
* CVE-2023-29532
* CVE-2023-29533
* CVE-2023-29534
* CVE-2023-29535
* CVE-2023-29536
* CVE-2023-29537
* CVE-2023-29538
* CVE-2023-29539
* CVE-2023-29540
* CVE-2023-29541
* CVE-2023-29542
* CVE-2023-29543
* CVE-2023-29544
* CVE-2023-29545
* CVE-2023-29546
* CVE-2023-29547
* CVE-2023-29548
* CVE-2023-29549
* CVE-2023-29550
* CVE-2023-29551
* CVE-2023-32205
* CVE-2023-32206
* CVE-2023-32207
* CVE-2023-32208
* CVE-2023-32209
* CVE-2023-32210
* CVE-2023-32211
* CVE-2023-32212
* CVE-2023-32213
* CVE-2023-32214
* CVE-2023-32215
* CVE-2023-32216
* CVE-2023-34414
* CVE-2023-34415
* CVE-2023-34416
* CVE-2023-34417
* CVE-2023-3482
* CVE-2023-3600
* CVE-2023-37201
* CVE-2023-37202
* CVE-2023-37203
* CVE-2023-37204
* CVE-2023-37205
* CVE-2023-37206
* CVE-2023-37207
* CVE-2023-37208
* CVE-2023-37209
* CVE-2023-37210
* CVE-2023-37211
* CVE-2023-37212
* CVE-2023-4045
* CVE-2023-4046
* CVE-2023-4047
* CVE-2023-4048
* CVE-2023-4049
* CVE-2023-4050
* CVE-2023-4051
* CVE-2023-4052
* CVE-2023-4053
* CVE-2023-4054
* CVE-2023-4055
* CVE-2023-4056
* CVE-2023-4057
* CVE-2023-4058
* CVE-2023-4573
* CVE-2023-4574
* CVE-2023-4575
* CVE-2023-4576
* CVE-2023-4577
* CVE-2023-4578
* CVE-2023-4579
* CVE-2023-4580
* CVE-2023-4581
* CVE-2023-4582
* CVE-2023-4583
* CVE-2023-4584
* CVE-2023-4585
* CVE-2023-4863
* CVE-2023-5168
* CVE-2023-5169
* CVE-2023-5170
* CVE-2023-5171
* CVE-2023-5172
* CVE-2023-5173
* CVE-2023-5174
* CVE-2023-5175
* CVE-2023-5176
* CVE-2023-5217
* CVE-2023-5388
* CVE-2023-5721
* CVE-2023-5722
* CVE-2023-5723
* CVE-2023-5724
* CVE-2023-5725
* CVE-2023-5726
* CVE-2023-5727
* CVE-2023-5728
* CVE-2023-5729
* CVE-2023-5730
* CVE-2023-5731
* CVE-2023-6135
* CVE-2023-6204
* CVE-2023-6205
* CVE-2023-6206
* CVE-2023-6207
* CVE-2023-6208
* CVE-2023-6209
* CVE-2023-6210
* CVE-2023-6211
* CVE-2023-6212
* CVE-2023-6213
* CVE-2023-6856
* CVE-2023-6857
* CVE-2023-6858
* CVE-2023-6859
* CVE-2023-6860
* CVE-2023-6861
* CVE-2023-6863
* CVE-2023-6864
* CVE-2023-6865
* CVE-2023-6866
* CVE-2023-6867
* CVE-2023-6868
* CVE-2023-6869
* CVE-2023-6870
* CVE-2023-6871
* CVE-2023-6872
* CVE-2023-6873
* CVE-2024-0741
* CVE-2024-0742
* CVE-2024-0743
* CVE-2024-0744
* CVE-2024-0745
* CVE-2024-0746
* CVE-2024-0747
* CVE-2024-0748
* CVE-2024-0749
* CVE-2024-0750
* CVE-2024-0751
* CVE-2024-0752
* CVE-2024-0753
* CVE-2024-0754
* CVE-2024-0755
* CVE-2024-10458
* CVE-2024-10459
* CVE-2024-10460
* CVE-2024-10461
* CVE-2024-10462
* CVE-2024-10463
* CVE-2024-10464
* CVE-2024-10465
* CVE-2024-10466
* CVE-2024-10467
* CVE-2024-11691
* CVE-2024-11692
* CVE-2024-11693
* CVE-2024-11694
* CVE-2024-11695
* CVE-2024-11696
* CVE-2024-11697
* CVE-2024-11698
* CVE-2024-11699
* CVE-2024-1546
* CVE-2024-1547
* CVE-2024-1548
* CVE-2024-1549
* CVE-2024-1550
* CVE-2024-1551
* CVE-2024-1552
* CVE-2024-1553
* CVE-2024-1554
* CVE-2024-1555
* CVE-2024-1556
* CVE-2024-1557
* CVE-2024-2605
* CVE-2024-2606
* CVE-2024-2607
* CVE-2024-2608
* CVE-2024-2609
* CVE-2024-2610
* CVE-2024-2611
* CVE-2024-2612
* CVE-2024-2613
* CVE-2024-2614
* CVE-2024-2615
* CVE-2024-29943
* CVE-2024-29944
* CVE-2024-3302
* CVE-2024-3852
* CVE-2024-3853
* CVE-2024-3854
* CVE-2024-3855
* CVE-2024-3856
* CVE-2024-3857
* CVE-2024-3858
* CVE-2024-3859
* CVE-2024-3860
* CVE-2024-3861
* CVE-2024-3862
* CVE-2024-3863
* CVE-2024-3864
* CVE-2024-3865
* CVE-2024-4367
* CVE-2024-4764
* CVE-2024-4765
* CVE-2024-4766
* CVE-2024-4767
* CVE-2024-4768
* CVE-2024-4769
* CVE-2024-4770
* CVE-2024-4771
* CVE-2024-4772
* CVE-2024-4773
* CVE-2024-4774
* CVE-2024-4775
* CVE-2024-4776
* CVE-2024-4777
* CVE-2024-4778
* CVE-2024-5687
* CVE-2024-5688
* CVE-2024-5689
* CVE-2024-5690
* CVE-2024-5691
* CVE-2024-5692
* CVE-2024-5693
* CVE-2024-5694
* CVE-2024-5695
* CVE-2024-5696
* CVE-2024-5697
* CVE-2024-5698
* CVE-2024-5699
* CVE-2024-5700
* CVE-2024-5701
* CVE-2024-6600
* CVE-2024-6601
* CVE-2024-6602
* CVE-2024-6603
* CVE-2024-6604
* CVE-2024-6605
* CVE-2024-6606
* CVE-2024-6607
* CVE-2024-6608
* CVE-2024-6609
* CVE-2024-6610
* CVE-2024-6611
* CVE-2024-6612
* CVE-2024-6613
* CVE-2024-6614
* CVE-2024-6615
* CVE-2024-7518
* CVE-2024-7519
* CVE-2024-7520
* CVE-2024-7521
* CVE-2024-7522
* CVE-2024-7524
* CVE-2024-7525
* CVE-2024-7526
* CVE-2024-7527
* CVE-2024-7528
* CVE-2024-7529
* CVE-2024-7531
* CVE-2024-8381
* CVE-2024-8382
* CVE-2024-8383
* CVE-2024-8384
* CVE-2024-8385
* CVE-2024-8386
* CVE-2024-8387
* CVE-2024-8900
* CVE-2024-9392
* CVE-2024-9393
* CVE-2024-9394
* CVE-2024-9396
* CVE-2024-9397
* CVE-2024-9398
* CVE-2024-9399
* CVE-2024-9400
* CVE-2024-9401
* CVE-2024-9402
* CVE-2024-9680

CVSS scores:

* CVE-2016-9063 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2016-9068 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2017-16541 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2017-7753 ( SUSE ): 6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2017-7779 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7780 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7781 ( SUSE ): 4.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2017-7783 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2017-7784 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7785 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7786 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7787 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2017-7788 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2017-7789 ( SUSE ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2017-7791 ( SUSE ): 4.2 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2017-7792 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7793 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7794 ( SUSE ): 4.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
* CVE-2017-7797 ( SUSE ): 3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2017-7798 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7799 ( SUSE ): 4.2 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2017-7800 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7801 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7802 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7803 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2017-7805 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2017-7806 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7807 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7808 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2017-7809 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7810 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7814 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2017-7818 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7819 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7823 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2017-7824 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7825 ( SUSE ): 5.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2017-7826 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7828 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7830 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2017-7843 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2017-7844 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2018-12358 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2018-12359 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12360 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12361 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12362 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12363 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12364 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12365 ( SUSE ): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2018-12366 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2018-12367 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2018-12369 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12370 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12371 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12376 ( SUSE ): 8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
* CVE-2018-12377 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-12378 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-12379 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-12385 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-12386 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12387 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12390 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12391 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12392 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12393 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12395 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-12396 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-12397 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-12402 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-12403 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-12405 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12406 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-12407 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-17466 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18356 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18492 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18493 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18494 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18495 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2018-18497 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2018-18498 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18500 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18501 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18502 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18503 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18504 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18505 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-18506 ( SUSE ): 5.9 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L
* CVE-2018-18511 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2018-5089 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5091 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5095 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5097 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5098 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5099 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5102 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5103 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5104 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5117 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-5125 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5127 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5129 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5130 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5131 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2018-5146 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5147 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5148 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5150 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5151 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5155 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5156 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5186 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5187 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-5188 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2018-6126 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11691 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11692 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11693 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11694 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11695 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2019-11696 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2019-11698 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11700 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2019-11701 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11707 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11710 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11713 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11717 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11719 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11724 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
* CVE-2019-11727 ( SUSE ): 5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2019-11729 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11733 ( SUSE ): 6.2 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2019-11735 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11736 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11738 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
* CVE-2019-11740 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11742 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11743 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11744 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11746 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11747 ( SUSE ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
* CVE-2019-11748 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11749 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2019-11750 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-11751 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11753 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-11754 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2019-13722 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-15903 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2019-17005 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-17008 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-17010 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-17011 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-17012 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-20503 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2019-5785 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-7317 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-9788 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9790 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9791 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9792 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2019-9793 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9794 ( SUSE ): 5 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2019-9795 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9796 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9797 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9800 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9810 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9811 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9812 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9813 ( SUSE ): 7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9814 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9816 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9817 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9818 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9819 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9820 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2019-9821 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2020-12387 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-12388 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-12389 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-12399 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2020-12402 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2020-12405 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-12406 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-12407 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2020-12408 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2020-12409 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-12411 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15652 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L
* CVE-2020-15653 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2020-15654 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2020-15655 ( SUSE ): 8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2020-15656 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2020-15658 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2020-15659 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2020-15663 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15664 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15665 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
* CVE-2020-15666 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2020-15667 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15668 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2020-15670 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15673 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15674 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15675 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15677 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-15678 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15683 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15969 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-15999 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2020-16012 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2020-16042 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-16044 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26950 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26951 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26953 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2020-26956 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-26958 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-26959 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26960 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26961 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-26962 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-26963 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2020-26965 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2020-26966 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2020-26967 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2020-26968 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26969 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26971 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26973 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-26976 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-26978 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-26979 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-35111 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2020-35112 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-35113 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6463 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2020-6514 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6796 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6797 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2020-6798 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2020-6799 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6800 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6805 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6806 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6807 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6808 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2020-6809 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2020-6810 ( SUSE ): 5.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
* CVE-2020-6811 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-6812 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
* CVE-2020-6813 ( SUSE ): 5.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
* CVE-2020-6814 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6815 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6819 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6820 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6821 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2020-6822 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2020-6823 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6824 ( SUSE ): 2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N
* CVE-2020-6825 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6826 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-6831 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23953 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23954 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23960 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-23961 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
* CVE-2021-23964 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23968 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2021-23969 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2021-23970 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-23971 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2021-23972 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23973 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2021-23974 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-23975 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-23976 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N
* CVE-2021-23977 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2021-23978 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23979 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-23981 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-23983 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-23984 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-23985 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2021-23986 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2021-23987 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23988 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23994 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23995 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23997 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23998 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-23999 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-24000 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2021-24002 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-29945 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-29946 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29947 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29970 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29972 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29974 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2021-29975 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-29976 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29977 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29980 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29981 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29984 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29985 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-29986 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29988 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29989 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29990 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-29991 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-30547 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-32810 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-38491 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-38492 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-38493 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-38497 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-38498 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-38501 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-38503 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-38504 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-38505 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-38506 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-38507 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-38508 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-38510 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-43536 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-43537 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-43538 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-43539 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-43540 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2021-43541 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-43542 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-43543 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2021-43544 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2021-43545 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2021-43546 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2022-1097 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-1529 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-1802 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-22747 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-24713 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-2505 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-26381 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-26382 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2022-26384 ( SUSE ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2022-28281 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-28282 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-28283 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2022-28284 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2022-28285 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-28286 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2022-28287 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-28288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-28289 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-29909 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-29911 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-29912 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-29914 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-29916 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-29917 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-31736 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-31737 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-31738 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-31739 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-31740 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-31741 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-31742 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-31747 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-34472 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-36314 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-36318 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-36319 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-38472 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-38473 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-38477 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-38478 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-40674 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-42927 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-42928 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-42929 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2022-42932 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2023-0767 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-23598 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-23602 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2023-34414 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-34415 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2023-34416 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-34417 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-3600 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4045 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2023-4863 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-5217 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-5388 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-5721 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-5724 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2023-5725 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2023-5726 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2023-5727 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2023-5728 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2023-5730 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-0743 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-10458 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2024-10458 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10459 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-10459 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-10460 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-10460 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10461 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-10461 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
* CVE-2024-10462 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-10462 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10463 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-10463 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10464 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-10464 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-10465 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-10465 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10466 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-10466 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-10467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-10467 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-2605 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2606 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-2607 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2608 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2609 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2610 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-2611 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2612 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2613 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2614 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-29943 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-29944 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3302 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-3852 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3853 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3854 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3855 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3856 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3857 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3858 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-3859 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-3860 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-3861 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-3862 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2024-3863 ( SUSE ): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-3864 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3865 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4367 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4764 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4765 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4766 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-4767 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4768 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4769 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4770 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4771 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-4772 ( SUSE ): 3.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-4777 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-6600 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-6601 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-6602 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
* CVE-2024-6603 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2024-6604 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-6605 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2024-6606 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L
* CVE-2024-6607 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-6608 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-6609 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
* CVE-2024-6610 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
* CVE-2024-6611 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-6612 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-6614 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-6615 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7518 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
* CVE-2024-7519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7520 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7521 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7522 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2024-7524 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7525 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7526 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2024-7527 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7528 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7529 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2024-7531 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2024-8381 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-8382 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-8383 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-8384 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-8385 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8386 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-8387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-9392 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-9392 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-9393 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-9393 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9394 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-9394 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9396 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2024-9396 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-9397 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-9397 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9398 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-9398 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9399 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-9399 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-9400 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2024-9400 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-9401 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-9401 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-9402 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-9402 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-9680 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-9680 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 1860 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the firefox-esr-128.5.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* firefox-esr 128.5.1-1.1
* firefox-esr-branding-upstream 128.5.1-1.1
* firefox-esr-translations-common 128.5.1-1.1
* firefox-esr-translations-other 128.5.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2006-6077.html
* https://www.suse.com/security/cve/CVE-2007-0008.html
* https://www.suse.com/security/cve/CVE-2007-0009.html
* https://www.suse.com/security/cve/CVE-2007-0078.html
* https://www.suse.com/security/cve/CVE-2007-0079.html
* https://www.suse.com/security/cve/CVE-2007-0775.html
* https://www.suse.com/security/cve/CVE-2007-0776.html
* https://www.suse.com/security/cve/CVE-2007-0777.html
* https://www.suse.com/security/cve/CVE-2007-0780.html
* https://www.suse.com/security/cve/CVE-2007-0800.html
* https://www.suse.com/security/cve/CVE-2007-0981.html
* https://www.suse.com/security/cve/CVE-2007-0995.html
* https://www.suse.com/security/cve/CVE-2007-0996.html
* https://www.suse.com/security/cve/CVE-2007-3089.html
* https://www.suse.com/security/cve/CVE-2007-3285.html
* https://www.suse.com/security/cve/CVE-2007-3656.html
* https://www.suse.com/security/cve/CVE-2007-3670.html
* https://www.suse.com/security/cve/CVE-2007-3734.html
* https://www.suse.com/security/cve/CVE-2007-3735.html
* https://www.suse.com/security/cve/CVE-2007-3736.html
* https://www.suse.com/security/cve/CVE-2007-3737.html
* https://www.suse.com/security/cve/CVE-2007-3738.html
* https://www.suse.com/security/cve/CVE-2008-0412.html
* https://www.suse.com/security/cve/CVE-2008-0414.html
* https://www.suse.com/security/cve/CVE-2008-0415.html
* https://www.suse.com/security/cve/CVE-2008-0417.html
* https://www.suse.com/security/cve/CVE-2008-0418.html
* https://www.suse.com/security/cve/CVE-2008-0419.html
* https://www.suse.com/security/cve/CVE-2008-0591.html
* https://www.suse.com/security/cve/CVE-2008-0592.html
* https://www.suse.com/security/cve/CVE-2008-0593.html
* https://www.suse.com/security/cve/CVE-2008-0594.html
* https://www.suse.com/security/cve/CVE-2008-4063.html
* https://www.suse.com/security/cve/CVE-2008-5913.html
* https://www.suse.com/security/cve/CVE-2009-0040.html
* https://www.suse.com/security/cve/CVE-2009-0352.html
* https://www.suse.com/security/cve/CVE-2009-0354.html
* https://www.suse.com/security/cve/CVE-2009-0355.html
* https://www.suse.com/security/cve/CVE-2009-0356.html
* https://www.suse.com/security/cve/CVE-2009-0357.html
* https://www.suse.com/security/cve/CVE-2009-0358.html
* https://www.suse.com/security/cve/CVE-2009-0652.html
* https://www.suse.com/security/cve/CVE-2009-0771.html
* https://www.suse.com/security/cve/CVE-2009-0772.html
* https://www.suse.com/security/cve/CVE-2009-0773.html
* https://www.suse.com/security/cve/CVE-2009-0774.html
* https://www.suse.com/security/cve/CVE-2009-0775.html
* https://www.suse.com/security/cve/CVE-2009-0776.html
* https://www.suse.com/security/cve/CVE-2009-0777.html
* https://www.suse.com/security/cve/CVE-2009-1044.html
* https://www.suse.com/security/cve/CVE-2009-1169.html
* https://www.suse.com/security/cve/CVE-2009-1302.html
* https://www.suse.com/security/cve/CVE-2009-1306.html
* https://www.suse.com/security/cve/CVE-2009-1307.html
* https://www.suse.com/security/cve/CVE-2009-1308.html
* https://www.suse.com/security/cve/CVE-2009-1309.html
* https://www.suse.com/security/cve/CVE-2009-1310.html
* https://www.suse.com/security/cve/CVE-2009-1311.html
* https://www.suse.com/security/cve/CVE-2009-1312.html
* https://www.suse.com/security/cve/CVE-2009-1313.html
* https://www.suse.com/security/cve/CVE-2009-1563.html
* https://www.suse.com/security/cve/CVE-2009-2470.html
* https://www.suse.com/security/cve/CVE-2009-2654.html
* https://www.suse.com/security/cve/CVE-2009-3069.html
* https://www.suse.com/security/cve/CVE-2009-3072.html
* https://www.suse.com/security/cve/CVE-2009-3077.html
* https://www.suse.com/security/cve/CVE-2009-3078.html
* https://www.suse.com/security/cve/CVE-2009-3079.html
* https://www.suse.com/security/cve/CVE-2009-3274.html
* https://www.suse.com/security/cve/CVE-2009-3370.html
* https://www.suse.com/security/cve/CVE-2009-3371.html
* https://www.suse.com/security/cve/CVE-2009-3372.html
* https://www.suse.com/security/cve/CVE-2009-3373.html
* https://www.suse.com/security/cve/CVE-2009-3374.html
* https://www.suse.com/security/cve/CVE-2009-3375.html
* https://www.suse.com/security/cve/CVE-2009-3376.html
* https://www.suse.com/security/cve/CVE-2009-3377.html
* https://www.suse.com/security/cve/CVE-2009-3380.html
* https://www.suse.com/security/cve/CVE-2009-3388.html
* https://www.suse.com/security/cve/CVE-2009-3389.html
* https://www.suse.com/security/cve/CVE-2009-3555.html
* https://www.suse.com/security/cve/CVE-2009-3979.html
* https://www.suse.com/security/cve/CVE-2009-3983.html
* https://www.suse.com/security/cve/CVE-2009-3984.html
* https://www.suse.com/security/cve/CVE-2010-0164.html
* https://www.suse.com/security/cve/CVE-2010-0165.html
* https://www.suse.com/security/cve/CVE-2010-0168.html
* https://www.suse.com/security/cve/CVE-2010-0169.html
* https://www.suse.com/security/cve/CVE-2010-0170.html
* https://www.suse.com/security/cve/CVE-2010-0171.html
* https://www.suse.com/security/cve/CVE-2010-0172.html
* https://www.suse.com/security/cve/CVE-2010-0173.html
* https://www.suse.com/security/cve/CVE-2010-0176.html
* https://www.suse.com/security/cve/CVE-2010-0177.html
* https://www.suse.com/security/cve/CVE-2010-0178.html
* https://www.suse.com/security/cve/CVE-2010-0181.html
* https://www.suse.com/security/cve/CVE-2010-0182.html
* https://www.suse.com/security/cve/CVE-2010-0654.html
* https://www.suse.com/security/cve/CVE-2010-1028.html
* https://www.suse.com/security/cve/CVE-2010-1121.html
* https://www.suse.com/security/cve/CVE-2010-1125.html
* https://www.suse.com/security/cve/CVE-2010-1196.html
* https://www.suse.com/security/cve/CVE-2010-1197.html
* https://www.suse.com/security/cve/CVE-2010-1198.html
* https://www.suse.com/security/cve/CVE-2010-1199.html
* https://www.suse.com/security/cve/CVE-2010-1200.html
* https://www.suse.com/security/cve/CVE-2010-1203.html
* https://www.suse.com/security/cve/CVE-2010-1205.html
* https://www.suse.com/security/cve/CVE-2010-1206.html
* https://www.suse.com/security/cve/CVE-2010-1207.html
* https://www.suse.com/security/cve/CVE-2010-1208.html
* https://www.suse.com/security/cve/CVE-2010-1209.html
* https://www.suse.com/security/cve/CVE-2010-1210.html
* https://www.suse.com/security/cve/CVE-2010-1211.html
* https://www.suse.com/security/cve/CVE-2010-1213.html
* https://www.suse.com/security/cve/CVE-2010-1214.html
* https://www.suse.com/security/cve/CVE-2010-1215.html
* https://www.suse.com/security/cve/CVE-2010-2752.html
* https://www.suse.com/security/cve/CVE-2010-2753.html
* https://www.suse.com/security/cve/CVE-2010-2754.html
* https://www.suse.com/security/cve/CVE-2010-2755.html
* https://www.suse.com/security/cve/CVE-2010-2760.html
* https://www.suse.com/security/cve/CVE-2010-2762.html
* https://www.suse.com/security/cve/CVE-2010-2764.html
* https://www.suse.com/security/cve/CVE-2010-2765.html
* https://www.suse.com/security/cve/CVE-2010-2766.html
* https://www.suse.com/security/cve/CVE-2010-2767.html
* https://www.suse.com/security/cve/CVE-2010-2768.html
* https://www.suse.com/security/cve/CVE-2010-2769.html
* https://www.suse.com/security/cve/CVE-2010-3166.html
* https://www.suse.com/security/cve/CVE-2010-3167.html
* https://www.suse.com/security/cve/CVE-2010-3168.html
* https://www.suse.com/security/cve/CVE-2010-3169.html
* https://www.suse.com/security/cve/CVE-2010-3170.html
* https://www.suse.com/security/cve/CVE-2010-3173.html
* https://www.suse.com/security/cve/CVE-2010-3174.html
* https://www.suse.com/security/cve/CVE-2010-3177.html
* https://www.suse.com/security/cve/CVE-2010-3178.html
* https://www.suse.com/security/cve/CVE-2010-3179.html
* https://www.suse.com/security/cve/CVE-2010-3180.html
* https://www.suse.com/security/cve/CVE-2010-3182.html
* https://www.suse.com/security/cve/CVE-2010-3183.html
* https://www.suse.com/security/cve/CVE-2010-3765.html
* https://www.suse.com/security/cve/CVE-2011-0068.html
* https://www.suse.com/security/cve/CVE-2011-0069.html
* https://www.suse.com/security/cve/CVE-2011-0080.html
* https://www.suse.com/security/cve/CVE-2011-0084.html
* https://www.suse.com/security/cve/CVE-2011-1187.html
* https://www.suse.com/security/cve/CVE-2011-1202.html
* https://www.suse.com/security/cve/CVE-2011-2366.html
* https://www.suse.com/security/cve/CVE-2011-2367.html
* https://www.suse.com/security/cve/CVE-2011-2369.html
* https://www.suse.com/security/cve/CVE-2011-2370.html
* https://www.suse.com/security/cve/CVE-2011-2371.html
* https://www.suse.com/security/cve/CVE-2011-2372.html
* https://www.suse.com/security/cve/CVE-2011-2373.html
* https://www.suse.com/security/cve/CVE-2011-2374.html
* https://www.suse.com/security/cve/CVE-2011-2377.html
* https://www.suse.com/security/cve/CVE-2011-2986.html
* https://www.suse.com/security/cve/CVE-2011-2988.html
* https://www.suse.com/security/cve/CVE-2011-2989.html
* https://www.suse.com/security/cve/CVE-2011-2990.html
* https://www.suse.com/security/cve/CVE-2011-2993.html
* https://www.suse.com/security/cve/CVE-2011-2995.html
* https://www.suse.com/security/cve/CVE-2011-3000.html
* https://www.suse.com/security/cve/CVE-2011-3002.html
* https://www.suse.com/security/cve/CVE-2011-3004.html
* https://www.suse.com/security/cve/CVE-2011-3005.html
* https://www.suse.com/security/cve/CVE-2011-3026.html
* https://www.suse.com/security/cve/CVE-2011-3062.html
* https://www.suse.com/security/cve/CVE-2011-3079.html
* https://www.suse.com/security/cve/CVE-2011-3232.html
* https://www.suse.com/security/cve/CVE-2011-3648.html
* https://www.suse.com/security/cve/CVE-2011-3650.html
* https://www.suse.com/security/cve/CVE-2011-3651.html
* https://www.suse.com/security/cve/CVE-2011-3655.html
* https://www.suse.com/security/cve/CVE-2011-3658.html
* https://www.suse.com/security/cve/CVE-2011-3659.html
* https://www.suse.com/security/cve/CVE-2011-3660.html
* https://www.suse.com/security/cve/CVE-2011-3661.html
* https://www.suse.com/security/cve/CVE-2011-3663.html
* https://www.suse.com/security/cve/CVE-2012-0441.html
* https://www.suse.com/security/cve/CVE-2012-0442.html
* https://www.suse.com/security/cve/CVE-2012-0444.html
* https://www.suse.com/security/cve/CVE-2012-0445.html
* https://www.suse.com/security/cve/CVE-2012-0446.html
* https://www.suse.com/security/cve/CVE-2012-0447.html
* https://www.suse.com/security/cve/CVE-2012-0449.html
* https://www.suse.com/security/cve/CVE-2012-0451.html
* https://www.suse.com/security/cve/CVE-2012-0452.html
* https://www.suse.com/security/cve/CVE-2012-0455.html
* https://www.suse.com/security/cve/CVE-2012-0456.html
* https://www.suse.com/security/cve/CVE-2012-0458.html
* https://www.suse.com/security/cve/CVE-2012-0459.html
* https://www.suse.com/security/cve/CVE-2012-0460.html
* https://www.suse.com/security/cve/CVE-2012-0461.html
* https://www.suse.com/security/cve/CVE-2012-0463.html
* https://www.suse.com/security/cve/CVE-2012-0467.html
* https://www.suse.com/security/cve/CVE-2012-0469.html
* https://www.suse.com/security/cve/CVE-2012-0470.html
* https://www.suse.com/security/cve/CVE-2012-0471.html
* https://www.suse.com/security/cve/CVE-2012-0472.html
* https://www.suse.com/security/cve/CVE-2012-0473.html
* https://www.suse.com/security/cve/CVE-2012-0474.html
* https://www.suse.com/security/cve/CVE-2012-0475.html
* https://www.suse.com/security/cve/CVE-2012-0477.html
* https://www.suse.com/security/cve/CVE-2012-0478.html
* https://www.suse.com/security/cve/CVE-2012-0479.html
* https://www.suse.com/security/cve/CVE-2012-0759.html
* https://www.suse.com/security/cve/CVE-2012-1938.html
* https://www.suse.com/security/cve/CVE-2012-1944.html
* https://www.suse.com/security/cve/CVE-2012-1945.html
* https://www.suse.com/security/cve/CVE-2012-1946.html
* https://www.suse.com/security/cve/CVE-2012-1947.html
* https://www.suse.com/security/cve/CVE-2012-1949.html
* https://www.suse.com/security/cve/CVE-2012-1950.html
* https://www.suse.com/security/cve/CVE-2012-1951.html
* https://www.suse.com/security/cve/CVE-2012-1955.html
* https://www.suse.com/security/cve/CVE-2012-1956.html
* https://www.suse.com/security/cve/CVE-2012-1957.html
* https://www.suse.com/security/cve/CVE-2012-1958.html
* https://www.suse.com/security/cve/CVE-2012-1959.html
* https://www.suse.com/security/cve/CVE-2012-1960.html
* https://www.suse.com/security/cve/CVE-2012-1961.html
* https://www.suse.com/security/cve/CVE-2012-1962.html
* https://www.suse.com/security/cve/CVE-2012-1963.html
* https://www.suse.com/security/cve/CVE-2012-1965.html
* https://www.suse.com/security/cve/CVE-2012-1966.html
* https://www.suse.com/security/cve/CVE-2012-1967.html
* https://www.suse.com/security/cve/CVE-2012-1970.html
* https://www.suse.com/security/cve/CVE-2012-1972.html
* https://www.suse.com/security/cve/CVE-2012-1976.html
* https://www.suse.com/security/cve/CVE-2012-3960.html
* https://www.suse.com/security/cve/CVE-2012-3965.html
* https://www.suse.com/security/cve/CVE-2012-3966.html
* https://www.suse.com/security/cve/CVE-2012-3967.html
* https://www.suse.com/security/cve/CVE-2012-3969.html
* https://www.suse.com/security/cve/CVE-2012-3971.html
* https://www.suse.com/security/cve/CVE-2012-3972.html
* https://www.suse.com/security/cve/CVE-2012-3973.html
* https://www.suse.com/security/cve/CVE-2012-3975.html
* https://www.suse.com/security/cve/CVE-2012-3976.html
* https://www.suse.com/security/cve/CVE-2012-3978.html
* https://www.suse.com/security/cve/CVE-2012-3980.html
* https://www.suse.com/security/cve/CVE-2012-3982.html
* https://www.suse.com/security/cve/CVE-2012-3984.html
* https://www.suse.com/security/cve/CVE-2012-3985.html
* https://www.suse.com/security/cve/CVE-2012-3986.html
* https://www.suse.com/security/cve/CVE-2012-3988.html
* https://www.suse.com/security/cve/CVE-2012-3989.html
* https://www.suse.com/security/cve/CVE-2012-3990.html
* https://www.suse.com/security/cve/CVE-2012-3991.html
* https://www.suse.com/security/cve/CVE-2012-3992.html
* https://www.suse.com/security/cve/CVE-2012-3993.html
* https://www.suse.com/security/cve/CVE-2012-3994.html
* https://www.suse.com/security/cve/CVE-2012-3995.html
* https://www.suse.com/security/cve/CVE-2012-4181.html
* https://www.suse.com/security/cve/CVE-2012-4185.html
* https://www.suse.com/security/cve/CVE-2012-4188.html
* https://www.suse.com/security/cve/CVE-2012-4191.html
* https://www.suse.com/security/cve/CVE-2012-4192.html
* https://www.suse.com/security/cve/CVE-2012-4194.html
* https://www.suse.com/security/cve/CVE-2012-4201.html
* https://www.suse.com/security/cve/CVE-2012-4202.html
* https://www.suse.com/security/cve/CVE-2012-4203.html
* https://www.suse.com/security/cve/CVE-2012-4204.html
* https://www.suse.com/security/cve/CVE-2012-4205.html
* https://www.suse.com/security/cve/CVE-2012-4207.html
* https://www.suse.com/security/cve/CVE-2012-4208.html
* https://www.suse.com/security/cve/CVE-2012-4209.html
* https://www.suse.com/security/cve/CVE-2012-4210.html
* https://www.suse.com/security/cve/CVE-2012-4213.html
* https://www.suse.com/security/cve/CVE-2012-4214.html
* https://www.suse.com/security/cve/CVE-2012-5829.html
* https://www.suse.com/security/cve/CVE-2012-5830.html
* https://www.suse.com/security/cve/CVE-2012-5836.html
* https://www.suse.com/security/cve/CVE-2012-5837.html
* https://www.suse.com/security/cve/CVE-2012-5841.html
* https://www.suse.com/security/cve/CVE-2012-5842.html
* https://www.suse.com/security/cve/CVE-2013-0743.html
* https://www.suse.com/security/cve/CVE-2013-0744.html
* https://www.suse.com/security/cve/CVE-2013-0745.html
* https://www.suse.com/security/cve/CVE-2013-0746.html
* https://www.suse.com/security/cve/CVE-2013-0747.html
* https://www.suse.com/security/cve/CVE-2013-0748.html
* https://www.suse.com/security/cve/CVE-2013-0749.html
* https://www.suse.com/security/cve/CVE-2013-0750.html
* https://www.suse.com/security/cve/CVE-2013-0751.html
* https://www.suse.com/security/cve/CVE-2013-0752.html
* https://www.suse.com/security/cve/CVE-2013-0753.html
* https://www.suse.com/security/cve/CVE-2013-0754.html
* https://www.suse.com/security/cve/CVE-2013-0755.html
* https://www.suse.com/security/cve/CVE-2013-0756.html
* https://www.suse.com/security/cve/CVE-2013-0757.html
* https://www.suse.com/security/cve/CVE-2013-0758.html
* https://www.suse.com/security/cve/CVE-2013-0760.html
* https://www.suse.com/security/cve/CVE-2013-0761.html
* https://www.suse.com/security/cve/CVE-2013-0764.html
* https://www.suse.com/security/cve/CVE-2013-0765.html
* https://www.suse.com/security/cve/CVE-2013-0768.html
* https://www.suse.com/security/cve/CVE-2013-0772.html
* https://www.suse.com/security/cve/CVE-2013-0773.html
* https://www.suse.com/security/cve/CVE-2013-0774.html
* https://www.suse.com/security/cve/CVE-2013-0775.html
* https://www.suse.com/security/cve/CVE-2013-0776.html
* https://www.suse.com/security/cve/CVE-2013-0778.html
* https://www.suse.com/security/cve/CVE-2013-0780.html
* https://www.suse.com/security/cve/CVE-2013-0783.html
* https://www.suse.com/security/cve/CVE-2013-0787.html
* https://www.suse.com/security/cve/CVE-2013-0788.html
* https://www.suse.com/security/cve/CVE-2013-0792.html
* https://www.suse.com/security/cve/CVE-2013-0793.html
* https://www.suse.com/security/cve/CVE-2013-0794.html
* https://www.suse.com/security/cve/CVE-2013-0795.html
* https://www.suse.com/security/cve/CVE-2013-0796.html
* https://www.suse.com/security/cve/CVE-2013-0800.html
* https://www.suse.com/security/cve/CVE-2013-0801.html
* https://www.suse.com/security/cve/CVE-2013-1670.html
* https://www.suse.com/security/cve/CVE-2013-1671.html
* https://www.suse.com/security/cve/CVE-2013-1674.html
* https://www.suse.com/security/cve/CVE-2013-1675.html
* https://www.suse.com/security/cve/CVE-2013-1676.html
* https://www.suse.com/security/cve/CVE-2013-1679.html
* https://www.suse.com/security/cve/CVE-2013-1682.html
* https://www.suse.com/security/cve/CVE-2013-1684.html
* https://www.suse.com/security/cve/CVE-2013-1687.html
* https://www.suse.com/security/cve/CVE-2013-1688.html
* https://www.suse.com/security/cve/CVE-2013-1690.html
* https://www.suse.com/security/cve/CVE-2013-1692.html
* https://www.suse.com/security/cve/CVE-2013-1693.html
* https://www.suse.com/security/cve/CVE-2013-1694.html
* https://www.suse.com/security/cve/CVE-2013-1695.html
* https://www.suse.com/security/cve/CVE-2013-1696.html
* https://www.suse.com/security/cve/CVE-2013-1697.html
* https://www.suse.com/security/cve/CVE-2013-1698.html
* https://www.suse.com/security/cve/CVE-2013-1699.html
* https://www.suse.com/security/cve/CVE-2013-1701.html
* https://www.suse.com/security/cve/CVE-2013-1704.html
* https://www.suse.com/security/cve/CVE-2013-1705.html
* https://www.suse.com/security/cve/CVE-2013-1708.html
* https://www.suse.com/security/cve/CVE-2013-1709.html
* https://www.suse.com/security/cve/CVE-2013-1710.html
* https://www.suse.com/security/cve/CVE-2013-1711.html
* https://www.suse.com/security/cve/CVE-2013-1713.html
* https://www.suse.com/security/cve/CVE-2013-1714.html
* https://www.suse.com/security/cve/CVE-2013-1717.html
* https://www.suse.com/security/cve/CVE-2013-1718.html
* https://www.suse.com/security/cve/CVE-2013-1720.html
* https://www.suse.com/security/cve/CVE-2013-1721.html
* https://www.suse.com/security/cve/CVE-2013-1722.html
* https://www.suse.com/security/cve/CVE-2013-1723.html
* https://www.suse.com/security/cve/CVE-2013-1724.html
* https://www.suse.com/security/cve/CVE-2013-1725.html
* https://www.suse.com/security/cve/CVE-2013-1728.html
* https://www.suse.com/security/cve/CVE-2013-1730.html
* https://www.suse.com/security/cve/CVE-2013-1732.html
* https://www.suse.com/security/cve/CVE-2013-1735.html
* https://www.suse.com/security/cve/CVE-2013-1737.html
* https://www.suse.com/security/cve/CVE-2013-1738.html
* https://www.suse.com/security/cve/CVE-2013-5590.html
* https://www.suse.com/security/cve/CVE-2013-5593.html
* https://www.suse.com/security/cve/CVE-2013-5595.html
* https://www.suse.com/security/cve/CVE-2013-5596.html
* https://www.suse.com/security/cve/CVE-2013-5597.html
* https://www.suse.com/security/cve/CVE-2013-5598.html
* https://www.suse.com/security/cve/CVE-2013-5599.html
* https://www.suse.com/security/cve/CVE-2013-5602.html
* https://www.suse.com/security/cve/CVE-2013-5603.html
* https://www.suse.com/security/cve/CVE-2013-5604.html
* https://www.suse.com/security/cve/CVE-2013-5609.html
* https://www.suse.com/security/cve/CVE-2013-5611.html
* https://www.suse.com/security/cve/CVE-2013-5612.html
* https://www.suse.com/security/cve/CVE-2013-5613.html
* https://www.suse.com/security/cve/CVE-2013-5614.html
* https://www.suse.com/security/cve/CVE-2013-5615.html
* https://www.suse.com/security/cve/CVE-2013-5616.html
* https://www.suse.com/security/cve/CVE-2013-5618.html
* https://www.suse.com/security/cve/CVE-2013-5619.html
* https://www.suse.com/security/cve/CVE-2013-6629.html
* https://www.suse.com/security/cve/CVE-2013-6671.html
* https://www.suse.com/security/cve/CVE-2013-6672.html
* https://www.suse.com/security/cve/CVE-2013-6673.html
* https://www.suse.com/security/cve/CVE-2014-1477.html
* https://www.suse.com/security/cve/CVE-2014-1479.html
* https://www.suse.com/security/cve/CVE-2014-1480.html
* https://www.suse.com/security/cve/CVE-2014-1481.html
* https://www.suse.com/security/cve/CVE-2014-1482.html
* https://www.suse.com/security/cve/CVE-2014-1483.html
* https://www.suse.com/security/cve/CVE-2014-1484.html
* https://www.suse.com/security/cve/CVE-2014-1485.html
* https://www.suse.com/security/cve/CVE-2014-1486.html
* https://www.suse.com/security/cve/CVE-2014-1487.html
* https://www.suse.com/security/cve/CVE-2014-1488.html
* https://www.suse.com/security/cve/CVE-2014-1489.html
* https://www.suse.com/security/cve/CVE-2014-1490.html
* https://www.suse.com/security/cve/CVE-2014-1492.html
* https://www.suse.com/security/cve/CVE-2014-1493.html
* https://www.suse.com/security/cve/CVE-2014-1497.html
* https://www.suse.com/security/cve/CVE-2014-1498.html
* https://www.suse.com/security/cve/CVE-2014-1499.html
* https://www.suse.com/security/cve/CVE-2014-1500.html
* https://www.suse.com/security/cve/CVE-2014-1502.html
* https://www.suse.com/security/cve/CVE-2014-1504.html
* https://www.suse.com/security/cve/CVE-2014-1505.html
* https://www.suse.com/security/cve/CVE-2014-1508.html
* https://www.suse.com/security/cve/CVE-2014-1509.html
* https://www.suse.com/security/cve/CVE-2014-1510.html
* https://www.suse.com/security/cve/CVE-2014-1512.html
* https://www.suse.com/security/cve/CVE-2014-1513.html
* https://www.suse.com/security/cve/CVE-2014-1514.html
* https://www.suse.com/security/cve/CVE-2014-1518.html
* https://www.suse.com/security/cve/CVE-2014-1522.html
* https://www.suse.com/security/cve/CVE-2014-1523.html
* https://www.suse.com/security/cve/CVE-2014-1524.html
* https://www.suse.com/security/cve/CVE-2014-1525.html
* https://www.suse.com/security/cve/CVE-2014-1526.html
* https://www.suse.com/security/cve/CVE-2014-1528.html
* https://www.suse.com/security/cve/CVE-2014-1529.html
* https://www.suse.com/security/cve/CVE-2014-1530.html
* https://www.suse.com/security/cve/CVE-2014-1531.html
* https://www.suse.com/security/cve/CVE-2014-1532.html
* https://www.suse.com/security/cve/CVE-2014-1533.html
* https://www.suse.com/security/cve/CVE-2014-1536.html
* https://www.suse.com/security/cve/CVE-2014-1539.html
* https://www.suse.com/security/cve/CVE-2014-1540.html
* https://www.suse.com/security/cve/CVE-2014-1541.html
* https://www.suse.com/security/cve/CVE-2014-1542.html
* https://www.suse.com/security/cve/CVE-2014-1543.html
* https://www.suse.com/security/cve/CVE-2014-1544.html
* https://www.suse.com/security/cve/CVE-2014-1545.html
* https://www.suse.com/security/cve/CVE-2014-1547.html
* https://www.suse.com/security/cve/CVE-2014-1549.html
* https://www.suse.com/security/cve/CVE-2014-1550.html
* https://www.suse.com/security/cve/CVE-2014-1552.html
* https://www.suse.com/security/cve/CVE-2014-1553.html
* https://www.suse.com/security/cve/CVE-2014-1555.html
* https://www.suse.com/security/cve/CVE-2014-1556.html
* https://www.suse.com/security/cve/CVE-2014-1557.html
* https://www.suse.com/security/cve/CVE-2014-1558.html
* https://www.suse.com/security/cve/CVE-2014-1561.html
* https://www.suse.com/security/cve/CVE-2014-1563.html
* https://www.suse.com/security/cve/CVE-2014-1564.html
* https://www.suse.com/security/cve/CVE-2014-1565.html
* https://www.suse.com/security/cve/CVE-2014-1567.html
* https://www.suse.com/security/cve/CVE-2014-1574.html
* https://www.suse.com/security/cve/CVE-2014-1576.html
* https://www.suse.com/security/cve/CVE-2014-1577.html
* https://www.suse.com/security/cve/CVE-2014-1578.html
* https://www.suse.com/security/cve/CVE-2014-1580.html
* https://www.suse.com/security/cve/CVE-2014-1581.html
* https://www.suse.com/security/cve/CVE-2014-1582.html
* https://www.suse.com/security/cve/CVE-2014-1583.html
* https://www.suse.com/security/cve/CVE-2014-1585.html
* https://www.suse.com/security/cve/CVE-2014-1587.html
* https://www.suse.com/security/cve/CVE-2014-1589.html
* https://www.suse.com/security/cve/CVE-2014-1590.html
* https://www.suse.com/security/cve/CVE-2014-1591.html
* https://www.suse.com/security/cve/CVE-2014-1592.html
* https://www.suse.com/security/cve/CVE-2014-1593.html
* https://www.suse.com/security/cve/CVE-2014-1594.html
* https://www.suse.com/security/cve/CVE-2014-8634.html
* https://www.suse.com/security/cve/CVE-2014-8636.html
* https://www.suse.com/security/cve/CVE-2014-8637.html
* https://www.suse.com/security/cve/CVE-2014-8638.html
* https://www.suse.com/security/cve/CVE-2014-8639.html
* https://www.suse.com/security/cve/CVE-2014-8640.html
* https://www.suse.com/security/cve/CVE-2014-8641.html
* https://www.suse.com/security/cve/CVE-2014-8642.html
* https://www.suse.com/security/cve/CVE-2014-8643.html
* https://www.suse.com/security/cve/CVE-2015-0798.html
* https://www.suse.com/security/cve/CVE-2015-0799.html
* https://www.suse.com/security/cve/CVE-2015-0800.html
* https://www.suse.com/security/cve/CVE-2015-0801.html
* https://www.suse.com/security/cve/CVE-2015-0802.html
* https://www.suse.com/security/cve/CVE-2015-0803.html
* https://www.suse.com/security/cve/CVE-2015-0805.html
* https://www.suse.com/security/cve/CVE-2015-0807.html
* https://www.suse.com/security/cve/CVE-2015-0808.html
* https://www.suse.com/security/cve/CVE-2015-0810.html
* https://www.suse.com/security/cve/CVE-2015-0811.html
* https://www.suse.com/security/cve/CVE-2015-0812.html
* https://www.suse.com/security/cve/CVE-2015-0813.html
* https://www.suse.com/security/cve/CVE-2015-0814.html
* https://www.suse.com/security/cve/CVE-2015-0816.html
* https://www.suse.com/security/cve/CVE-2015-0817.html
* https://www.suse.com/security/cve/CVE-2015-0818.html
* https://www.suse.com/security/cve/CVE-2015-0819.html
* https://www.suse.com/security/cve/CVE-2015-0820.html
* https://www.suse.com/security/cve/CVE-2015-0821.html
* https://www.suse.com/security/cve/CVE-2015-0822.html
* https://www.suse.com/security/cve/CVE-2015-0823.html
* https://www.suse.com/security/cve/CVE-2015-0824.html
* https://www.suse.com/security/cve/CVE-2015-0825.html
* https://www.suse.com/security/cve/CVE-2015-0826.html
* https://www.suse.com/security/cve/CVE-2015-0827.html
* https://www.suse.com/security/cve/CVE-2015-0828.html
* https://www.suse.com/security/cve/CVE-2015-0829.html
* https://www.suse.com/security/cve/CVE-2015-0830.html
* https://www.suse.com/security/cve/CVE-2015-0831.html
* https://www.suse.com/security/cve/CVE-2015-0832.html
* https://www.suse.com/security/cve/CVE-2015-0833.html
* https://www.suse.com/security/cve/CVE-2015-0834.html
* https://www.suse.com/security/cve/CVE-2015-0835.html
* https://www.suse.com/security/cve/CVE-2015-2706.html
* https://www.suse.com/security/cve/CVE-2015-2708.html
* https://www.suse.com/security/cve/CVE-2015-2710.html
* https://www.suse.com/security/cve/CVE-2015-2711.html
* https://www.suse.com/security/cve/CVE-2015-2712.html
* https://www.suse.com/security/cve/CVE-2015-2713.html
* https://www.suse.com/security/cve/CVE-2015-2715.html
* https://www.suse.com/security/cve/CVE-2015-2716.html
* https://www.suse.com/security/cve/CVE-2015-2717.html
* https://www.suse.com/security/cve/CVE-2015-2718.html
* https://www.suse.com/security/cve/CVE-2015-2721.html
* https://www.suse.com/security/cve/CVE-2015-2722.html
* https://www.suse.com/security/cve/CVE-2015-2724.html
* https://www.suse.com/security/cve/CVE-2015-2727.html
* https://www.suse.com/security/cve/CVE-2015-2728.html
* https://www.suse.com/security/cve/CVE-2015-2729.html
* https://www.suse.com/security/cve/CVE-2015-2730.html
* https://www.suse.com/security/cve/CVE-2015-2731.html
* https://www.suse.com/security/cve/CVE-2015-2734.html
* https://www.suse.com/security/cve/CVE-2015-2738.html
* https://www.suse.com/security/cve/CVE-2015-2741.html
* https://www.suse.com/security/cve/CVE-2015-2742.html
* https://www.suse.com/security/cve/CVE-2015-2743.html
* https://www.suse.com/security/cve/CVE-2015-4000.html
* https://www.suse.com/security/cve/CVE-2015-4473.html
* https://www.suse.com/security/cve/CVE-2015-4475.html
* https://www.suse.com/security/cve/CVE-2015-4476.html
* https://www.suse.com/security/cve/CVE-2015-4477.html
* https://www.suse.com/security/cve/CVE-2015-4478.html
* https://www.suse.com/security/cve/CVE-2015-4479.html
* https://www.suse.com/security/cve/CVE-2015-4481.html
* https://www.suse.com/security/cve/CVE-2015-4482.html
* https://www.suse.com/security/cve/CVE-2015-4483.html
* https://www.suse.com/security/cve/CVE-2015-4484.html
* https://www.suse.com/security/cve/CVE-2015-4485.html
* https://www.suse.com/security/cve/CVE-2015-4487.html
* https://www.suse.com/security/cve/CVE-2015-4490.html
* https://www.suse.com/security/cve/CVE-2015-4491.html
* https://www.suse.com/security/cve/CVE-2015-4492.html
* https://www.suse.com/security/cve/CVE-2015-4495.html
* https://www.suse.com/security/cve/CVE-2015-4497.html
* https://www.suse.com/security/cve/CVE-2015-4498.html
* https://www.suse.com/security/cve/CVE-2015-4500.html
* https://www.suse.com/security/cve/CVE-2015-4502.html
* https://www.suse.com/security/cve/CVE-2015-4503.html
* https://www.suse.com/security/cve/CVE-2015-4504.html
* https://www.suse.com/security/cve/CVE-2015-4505.html
* https://www.suse.com/security/cve/CVE-2015-4506.html
* https://www.suse.com/security/cve/CVE-2015-4507.html
* https://www.suse.com/security/cve/CVE-2015-4508.html
* https://www.suse.com/security/cve/CVE-2015-4509.html
* https://www.suse.com/security/cve/CVE-2015-4510.html
* https://www.suse.com/security/cve/CVE-2015-4511.html
* https://www.suse.com/security/cve/CVE-2015-4512.html
* https://www.suse.com/security/cve/CVE-2015-4513.html
* https://www.suse.com/security/cve/CVE-2015-4515.html
* https://www.suse.com/security/cve/CVE-2015-4516.html
* https://www.suse.com/security/cve/CVE-2015-4517.html
* https://www.suse.com/security/cve/CVE-2015-4518.html
* https://www.suse.com/security/cve/CVE-2015-4519.html
* https://www.suse.com/security/cve/CVE-2015-4520.html
* https://www.suse.com/security/cve/CVE-2015-7174.html
* https://www.suse.com/security/cve/CVE-2015-7178.html
* https://www.suse.com/security/cve/CVE-2015-7180.html
* https://www.suse.com/security/cve/CVE-2015-7181.html
* https://www.suse.com/security/cve/CVE-2015-7184.html
* https://www.suse.com/security/cve/CVE-2015-7185.html
* https://www.suse.com/security/cve/CVE-2015-7186.html
* https://www.suse.com/security/cve/CVE-2015-7187.html
* https://www.suse.com/security/cve/CVE-2015-7188.html
* https://www.suse.com/security/cve/CVE-2015-7189.html
* https://www.suse.com/security/cve/CVE-2015-7190.html
* https://www.suse.com/security/cve/CVE-2015-7191.html
* https://www.suse.com/security/cve/CVE-2015-7192.html
* https://www.suse.com/security/cve/CVE-2015-7193.html
* https://www.suse.com/security/cve/CVE-2015-7194.html
* https://www.suse.com/security/cve/CVE-2015-7195.html
* https://www.suse.com/security/cve/CVE-2015-7196.html
* https://www.suse.com/security/cve/CVE-2015-7197.html
* https://www.suse.com/security/cve/CVE-2015-7198.html
* https://www.suse.com/security/cve/CVE-2015-7201.html
* https://www.suse.com/security/cve/CVE-2015-7203.html
* https://www.suse.com/security/cve/CVE-2015-7204.html
* https://www.suse.com/security/cve/CVE-2015-7205.html
* https://www.suse.com/security/cve/CVE-2015-7207.html
* https://www.suse.com/security/cve/CVE-2015-7208.html
* https://www.suse.com/security/cve/CVE-2015-7210.html
* https://www.suse.com/security/cve/CVE-2015-7211.html
* https://www.suse.com/security/cve/CVE-2015-7212.html
* https://www.suse.com/security/cve/CVE-2015-7213.html
* https://www.suse.com/security/cve/CVE-2015-7214.html
* https://www.suse.com/security/cve/CVE-2015-7215.html
* https://www.suse.com/security/cve/CVE-2015-7216.html
* https://www.suse.com/security/cve/CVE-2015-7218.html
* https://www.suse.com/security/cve/CVE-2015-7222.html
* https://www.suse.com/security/cve/CVE-2015-7223.html
* https://www.suse.com/security/cve/CVE-2015-7575.html
* https://www.suse.com/security/cve/CVE-2016-0718.html
* https://www.suse.com/security/cve/CVE-2016-1930.html
* https://www.suse.com/security/cve/CVE-2016-1933.html
* https://www.suse.com/security/cve/CVE-2016-1935.html
* https://www.suse.com/security/cve/CVE-2016-1937.html
* https://www.suse.com/security/cve/CVE-2016-1938.html
* https://www.suse.com/security/cve/CVE-2016-1942.html
* https://www.suse.com/security/cve/CVE-2016-1944.html
* https://www.suse.com/security/cve/CVE-2016-1947.html
* https://www.suse.com/security/cve/CVE-2016-1949.html
* https://www.suse.com/security/cve/CVE-2016-1950.html
* https://www.suse.com/security/cve/CVE-2016-1952.html
* https://www.suse.com/security/cve/CVE-2016-1954.html
* https://www.suse.com/security/cve/CVE-2016-1955.html
* https://www.suse.com/security/cve/CVE-2016-1956.html
* https://www.suse.com/security/cve/CVE-2016-1957.html
* https://www.suse.com/security/cve/CVE-2016-1958.html
* https://www.suse.com/security/cve/CVE-2016-1959.html
* https://www.suse.com/security/cve/CVE-2016-1960.html
* https://www.suse.com/security/cve/CVE-2016-1961.html
* https://www.suse.com/security/cve/CVE-2016-1962.html
* https://www.suse.com/security/cve/CVE-2016-1963.html
* https://www.suse.com/security/cve/CVE-2016-1964.html
* https://www.suse.com/security/cve/CVE-2016-1965.html
* https://www.suse.com/security/cve/CVE-2016-1966.html
* https://www.suse.com/security/cve/CVE-2016-1967.html
* https://www.suse.com/security/cve/CVE-2016-1968.html
* https://www.suse.com/security/cve/CVE-2016-1970.html
* https://www.suse.com/security/cve/CVE-2016-1973.html
* https://www.suse.com/security/cve/CVE-2016-1974.html
* https://www.suse.com/security/cve/CVE-2016-1976.html
* https://www.suse.com/security/cve/CVE-2016-1977.html
* https://www.suse.com/security/cve/CVE-2016-1979.html
* https://www.suse.com/security/cve/CVE-2016-2792.html
* https://www.suse.com/security/cve/CVE-2016-2796.html
* https://www.suse.com/security/cve/CVE-2016-2800.html
* https://www.suse.com/security/cve/CVE-2016-2804.html
* https://www.suse.com/security/cve/CVE-2016-2808.html
* https://www.suse.com/security/cve/CVE-2016-2809.html
* https://www.suse.com/security/cve/CVE-2016-2810.html
* https://www.suse.com/security/cve/CVE-2016-2811.html
* https://www.suse.com/security/cve/CVE-2016-2813.html
* https://www.suse.com/security/cve/CVE-2016-2814.html
* https://www.suse.com/security/cve/CVE-2016-2815.html
* https://www.suse.com/security/cve/CVE-2016-2816.html
* https://www.suse.com/security/cve/CVE-2016-2817.html
* https://www.suse.com/security/cve/CVE-2016-2819.html
* https://www.suse.com/security/cve/CVE-2016-2820.html
* https://www.suse.com/security/cve/CVE-2016-2821.html
* https://www.suse.com/security/cve/CVE-2016-2822.html
* https://www.suse.com/security/cve/CVE-2016-2824.html
* https://www.suse.com/security/cve/CVE-2016-2825.html
* https://www.suse.com/security/cve/CVE-2016-2827.html
* https://www.suse.com/security/cve/CVE-2016-2828.html
* https://www.suse.com/security/cve/CVE-2016-2829.html
* https://www.suse.com/security/cve/CVE-2016-2830.html
* https://www.suse.com/security/cve/CVE-2016-2831.html
* https://www.suse.com/security/cve/CVE-2016-2832.html
* https://www.suse.com/security/cve/CVE-2016-2833.html
* https://www.suse.com/security/cve/CVE-2016-2834.html
* https://www.suse.com/security/cve/CVE-2016-2835.html
* https://www.suse.com/security/cve/CVE-2016-2837.html
* https://www.suse.com/security/cve/CVE-2016-2838.html
* https://www.suse.com/security/cve/CVE-2016-2839.html
* https://www.suse.com/security/cve/CVE-2016-5250.html
* https://www.suse.com/security/cve/CVE-2016-5251.html
* https://www.suse.com/security/cve/CVE-2016-5252.html
* https://www.suse.com/security/cve/CVE-2016-5253.html
* https://www.suse.com/security/cve/CVE-2016-5254.html
* https://www.suse.com/security/cve/CVE-2016-5255.html
* https://www.suse.com/security/cve/CVE-2016-5256.html
* https://www.suse.com/security/cve/CVE-2016-5257.html
* https://www.suse.com/security/cve/CVE-2016-5258.html
* https://www.suse.com/security/cve/CVE-2016-5259.html
* https://www.suse.com/security/cve/CVE-2016-5260.html
* https://www.suse.com/security/cve/CVE-2016-5261.html
* https://www.suse.com/security/cve/CVE-2016-5262.html
* https://www.suse.com/security/cve/CVE-2016-5263.html
* https://www.suse.com/security/cve/CVE-2016-5264.html
* https://www.suse.com/security/cve/CVE-2016-5265.html
* https://www.suse.com/security/cve/CVE-2016-5266.html
* https://www.suse.com/security/cve/CVE-2016-5267.html
* https://www.suse.com/security/cve/CVE-2016-5268.html
* https://www.suse.com/security/cve/CVE-2016-5270.html
* https://www.suse.com/security/cve/CVE-2016-5271.html
* https://www.suse.com/security/cve/CVE-2016-5272.html
* https://www.suse.com/security/cve/CVE-2016-5273.html
* https://www.suse.com/security/cve/CVE-2016-5274.html
* https://www.suse.com/security/cve/CVE-2016-5275.html
* https://www.suse.com/security/cve/CVE-2016-5276.html
* https://www.suse.com/security/cve/CVE-2016-5277.html
* https://www.suse.com/security/cve/CVE-2016-5278.html
* https://www.suse.com/security/cve/CVE-2016-5279.html
* https://www.suse.com/security/cve/CVE-2016-5280.html
* https://www.suse.com/security/cve/CVE-2016-5281.html
* https://www.suse.com/security/cve/CVE-2016-5282.html
* https://www.suse.com/security/cve/CVE-2016-5283.html
* https://www.suse.com/security/cve/CVE-2016-5284.html
* https://www.suse.com/security/cve/CVE-2016-5287.html
* https://www.suse.com/security/cve/CVE-2016-5288.html
* https://www.suse.com/security/cve/CVE-2016-5289.html
* https://www.suse.com/security/cve/CVE-2016-5290.html
* https://www.suse.com/security/cve/CVE-2016-5291.html
* https://www.suse.com/security/cve/CVE-2016-5292.html
* https://www.suse.com/security/cve/CVE-2016-5293.html
* https://www.suse.com/security/cve/CVE-2016-5294.html
* https://www.suse.com/security/cve/CVE-2016-5295.html
* https://www.suse.com/security/cve/CVE-2016-5296.html
* https://www.suse.com/security/cve/CVE-2016-5297.html
* https://www.suse.com/security/cve/CVE-2016-5298.html
* https://www.suse.com/security/cve/CVE-2016-5299.html
* https://www.suse.com/security/cve/CVE-2016-6354.html
* https://www.suse.com/security/cve/CVE-2016-9061.html
* https://www.suse.com/security/cve/CVE-2016-9062.html
* https://www.suse.com/security/cve/CVE-2016-9063.html
* https://www.suse.com/security/cve/CVE-2016-9064.html
* https://www.suse.com/security/cve/CVE-2016-9065.html
* https://www.suse.com/security/cve/CVE-2016-9066.html
* https://www.suse.com/security/cve/CVE-2016-9067.html
* https://www.suse.com/security/cve/CVE-2016-9068.html
* https://www.suse.com/security/cve/CVE-2016-9069.html
* https://www.suse.com/security/cve/CVE-2016-9070.html
* https://www.suse.com/security/cve/CVE-2016-9071.html
* https://www.suse.com/security/cve/CVE-2016-9072.html
* https://www.suse.com/security/cve/CVE-2016-9073.html
* https://www.suse.com/security/cve/CVE-2016-9074.html
* https://www.suse.com/security/cve/CVE-2016-9075.html
* https://www.suse.com/security/cve/CVE-2016-9076.html
* https://www.suse.com/security/cve/CVE-2016-9077.html
* https://www.suse.com/security/cve/CVE-2016-9078.html
* https://www.suse.com/security/cve/CVE-2016-9079.html
* https://www.suse.com/security/cve/CVE-2016-9080.html
* https://www.suse.com/security/cve/CVE-2016-9893.html
* https://www.suse.com/security/cve/CVE-2016-9894.html
* https://www.suse.com/security/cve/CVE-2016-9895.html
* https://www.suse.com/security/cve/CVE-2016-9896.html
* https://www.suse.com/security/cve/CVE-2016-9897.html
* https://www.suse.com/security/cve/CVE-2016-9898.html
* https://www.suse.com/security/cve/CVE-2016-9899.html
* https://www.suse.com/security/cve/CVE-2016-9900.html
* https://www.suse.com/security/cve/CVE-2016-9901.html
* https://www.suse.com/security/cve/CVE-2016-9902.html
* https://www.suse.com/security/cve/CVE-2016-9903.html
* https://www.suse.com/security/cve/CVE-2016-9904.html
* https://www.suse.com/security/cve/CVE-2017-16541.html
* https://www.suse.com/security/cve/CVE-2017-5373.html
* https://www.suse.com/security/cve/CVE-2017-5374.html
* https://www.suse.com/security/cve/CVE-2017-5375.html
* https://www.suse.com/security/cve/CVE-2017-5376.html
* https://www.suse.com/security/cve/CVE-2017-5377.html
* https://www.suse.com/security/cve/CVE-2017-5378.html
* https://www.suse.com/security/cve/CVE-2017-5379.html
* https://www.suse.com/security/cve/CVE-2017-5380.html
* https://www.suse.com/security/cve/CVE-2017-5381.html
* https://www.suse.com/security/cve/CVE-2017-5382.html
* https://www.suse.com/security/cve/CVE-2017-5383.html
* https://www.suse.com/security/cve/CVE-2017-5384.html
* https://www.suse.com/security/cve/CVE-2017-5385.html
* https://www.suse.com/security/cve/CVE-2017-5386.html
* https://www.suse.com/security/cve/CVE-2017-5387.html
* https://www.suse.com/security/cve/CVE-2017-5388.html
* https://www.suse.com/security/cve/CVE-2017-5389.html
* https://www.suse.com/security/cve/CVE-2017-5390.html
* https://www.suse.com/security/cve/CVE-2017-5391.html
* https://www.suse.com/security/cve/CVE-2017-5392.html
* https://www.suse.com/security/cve/CVE-2017-5393.html
* https://www.suse.com/security/cve/CVE-2017-5394.html
* https://www.suse.com/security/cve/CVE-2017-5395.html
* https://www.suse.com/security/cve/CVE-2017-5396.html
* https://www.suse.com/security/cve/CVE-2017-5398.html
* https://www.suse.com/security/cve/CVE-2017-5399.html
* https://www.suse.com/security/cve/CVE-2017-5400.html
* https://www.suse.com/security/cve/CVE-2017-5401.html
* https://www.suse.com/security/cve/CVE-2017-5402.html
* https://www.suse.com/security/cve/CVE-2017-5403.html
* https://www.suse.com/security/cve/CVE-2017-5404.html
* https://www.suse.com/security/cve/CVE-2017-5405.html
* https://www.suse.com/security/cve/CVE-2017-5406.html
* https://www.suse.com/security/cve/CVE-2017-5407.html
* https://www.suse.com/security/cve/CVE-2017-5408.html
* https://www.suse.com/security/cve/CVE-2017-5410.html
* https://www.suse.com/security/cve/CVE-2017-5412.html
* https://www.suse.com/security/cve/CVE-2017-5413.html
* https://www.suse.com/security/cve/CVE-2017-5414.html
* https://www.suse.com/security/cve/CVE-2017-5415.html
* https://www.suse.com/security/cve/CVE-2017-5416.html
* https://www.suse.com/security/cve/CVE-2017-5417.html
* https://www.suse.com/security/cve/CVE-2017-5418.html
* https://www.suse.com/security/cve/CVE-2017-5419.html
* https://www.suse.com/security/cve/CVE-2017-5420.html
* https://www.suse.com/security/cve/CVE-2017-5421.html
* https://www.suse.com/security/cve/CVE-2017-5422.html
* https://www.suse.com/security/cve/CVE-2017-5426.html
* https://www.suse.com/security/cve/CVE-2017-5427.html
* https://www.suse.com/security/cve/CVE-2017-5428.html
* https://www.suse.com/security/cve/CVE-2017-5429.html
* https://www.suse.com/security/cve/CVE-2017-5430.html
* https://www.suse.com/security/cve/CVE-2017-5432.html
* https://www.suse.com/security/cve/CVE-2017-5433.html
* https://www.suse.com/security/cve/CVE-2017-5434.html
* https://www.suse.com/security/cve/CVE-2017-5435.html
* https://www.suse.com/security/cve/CVE-2017-5436.html
* https://www.suse.com/security/cve/CVE-2017-5437.html
* https://www.suse.com/security/cve/CVE-2017-5438.html
* https://www.suse.com/security/cve/CVE-2017-5439.html
* https://www.suse.com/security/cve/CVE-2017-5440.html
* https://www.suse.com/security/cve/CVE-2017-5441.html
* https://www.suse.com/security/cve/CVE-2017-5442.html
* https://www.suse.com/security/cve/CVE-2017-5443.html
* https://www.suse.com/security/cve/CVE-2017-5444.html
* https://www.suse.com/security/cve/CVE-2017-5445.html
* https://www.suse.com/security/cve/CVE-2017-5446.html
* https://www.suse.com/security/cve/CVE-2017-5447.html
* https://www.suse.com/security/cve/CVE-2017-5448.html
* https://www.suse.com/security/cve/CVE-2017-5449.html
* https://www.suse.com/security/cve/CVE-2017-5451.html
* https://www.suse.com/security/cve/CVE-2017-5453.html
* https://www.suse.com/security/cve/CVE-2017-5454.html
* https://www.suse.com/security/cve/CVE-2017-5455.html
* https://www.suse.com/security/cve/CVE-2017-5456.html
* https://www.suse.com/security/cve/CVE-2017-5458.html
* https://www.suse.com/security/cve/CVE-2017-5459.html
* https://www.suse.com/security/cve/CVE-2017-5460.html
* https://www.suse.com/security/cve/CVE-2017-5461.html
* https://www.suse.com/security/cve/CVE-2017-5462.html
* https://www.suse.com/security/cve/CVE-2017-5464.html
* https://www.suse.com/security/cve/CVE-2017-5465.html
* https://www.suse.com/security/cve/CVE-2017-5466.html
* https://www.suse.com/security/cve/CVE-2017-5467.html
* https://www.suse.com/security/cve/CVE-2017-5468.html
* https://www.suse.com/security/cve/CVE-2017-5469.html
* https://www.suse.com/security/cve/CVE-2017-7753.html
* https://www.suse.com/security/cve/CVE-2017-7779.html
* https://www.suse.com/security/cve/CVE-2017-7780.html
* https://www.suse.com/security/cve/CVE-2017-7781.html
* https://www.suse.com/security/cve/CVE-2017-7782.html
* https://www.suse.com/security/cve/CVE-2017-7783.html
* https://www.suse.com/security/cve/CVE-2017-7784.html
* https://www.suse.com/security/cve/CVE-2017-7785.html
* https://www.suse.com/security/cve/CVE-2017-7786.html
* https://www.suse.com/security/cve/CVE-2017-7787.html
* https://www.suse.com/security/cve/CVE-2017-7788.html
* https://www.suse.com/security/cve/CVE-2017-7789.html
* https://www.suse.com/security/cve/CVE-2017-7790.html
* https://www.suse.com/security/cve/CVE-2017-7791.html
* https://www.suse.com/security/cve/CVE-2017-7792.html
* https://www.suse.com/security/cve/CVE-2017-7793.html
* https://www.suse.com/security/cve/CVE-2017-7794.html
* https://www.suse.com/security/cve/CVE-2017-7796.html
* https://www.suse.com/security/cve/CVE-2017-7797.html
* https://www.suse.com/security/cve/CVE-2017-7798.html
* https://www.suse.com/security/cve/CVE-2017-7799.html
* https://www.suse.com/security/cve/CVE-2017-7800.html
* https://www.suse.com/security/cve/CVE-2017-7801.html
* https://www.suse.com/security/cve/CVE-2017-7802.html
* https://www.suse.com/security/cve/CVE-2017-7803.html
* https://www.suse.com/security/cve/CVE-2017-7804.html
* https://www.suse.com/security/cve/CVE-2017-7805.html
* https://www.suse.com/security/cve/CVE-2017-7806.html
* https://www.suse.com/security/cve/CVE-2017-7807.html
* https://www.suse.com/security/cve/CVE-2017-7808.html
* https://www.suse.com/security/cve/CVE-2017-7809.html
* https://www.suse.com/security/cve/CVE-2017-7810.html
* https://www.suse.com/security/cve/CVE-2017-7811.html
* https://www.suse.com/security/cve/CVE-2017-7812.html
* https://www.suse.com/security/cve/CVE-2017-7813.html
* https://www.suse.com/security/cve/CVE-2017-7814.html
* https://www.suse.com/security/cve/CVE-2017-7815.html
* https://www.suse.com/security/cve/CVE-2017-7816.html
* https://www.suse.com/security/cve/CVE-2017-7817.html
* https://www.suse.com/security/cve/CVE-2017-7818.html
* https://www.suse.com/security/cve/CVE-2017-7819.html
* https://www.suse.com/security/cve/CVE-2017-7820.html
* https://www.suse.com/security/cve/CVE-2017-7821.html
* https://www.suse.com/security/cve/CVE-2017-7822.html
* https://www.suse.com/security/cve/CVE-2017-7823.html
* https://www.suse.com/security/cve/CVE-2017-7824.html
* https://www.suse.com/security/cve/CVE-2017-7825.html
* https://www.suse.com/security/cve/CVE-2017-7826.html
* https://www.suse.com/security/cve/CVE-2017-7827.html
* https://www.suse.com/security/cve/CVE-2017-7828.html
* https://www.suse.com/security/cve/CVE-2017-7830.html
* https://www.suse.com/security/cve/CVE-2017-7831.html
* https://www.suse.com/security/cve/CVE-2017-7832.html
* https://www.suse.com/security/cve/CVE-2017-7833.html
* https://www.suse.com/security/cve/CVE-2017-7834.html
* https://www.suse.com/security/cve/CVE-2017-7835.html
* https://www.suse.com/security/cve/CVE-2017-7836.html
* https://www.suse.com/security/cve/CVE-2017-7837.html
* https://www.suse.com/security/cve/CVE-2017-7838.html
* https://www.suse.com/security/cve/CVE-2017-7839.html
* https://www.suse.com/security/cve/CVE-2017-7840.html
* https://www.suse.com/security/cve/CVE-2017-7842.html
* https://www.suse.com/security/cve/CVE-2017-7843.html
* https://www.suse.com/security/cve/CVE-2017-7844.html
* https://www.suse.com/security/cve/CVE-2018-12358.html
* https://www.suse.com/security/cve/CVE-2018-12359.html
* https://www.suse.com/security/cve/CVE-2018-12360.html
* https://www.suse.com/security/cve/CVE-2018-12361.html
* https://www.suse.com/security/cve/CVE-2018-12362.html
* https://www.suse.com/security/cve/CVE-2018-12363.html
* https://www.suse.com/security/cve/CVE-2018-12364.html
* https://www.suse.com/security/cve/CVE-2018-12365.html
* https://www.suse.com/security/cve/CVE-2018-12366.html
* https://www.suse.com/security/cve/CVE-2018-12367.html
* https://www.suse.com/security/cve/CVE-2018-12369.html
* https://www.suse.com/security/cve/CVE-2018-12370.html
* https://www.suse.com/security/cve/CVE-2018-12371.html
* https://www.suse.com/security/cve/CVE-2018-12375.html
* https://www.suse.com/security/cve/CVE-2018-12376.html
* https://www.suse.com/security/cve/CVE-2018-12377.html
* https://www.suse.com/security/cve/CVE-2018-12378.html
* https://www.suse.com/security/cve/CVE-2018-12379.html
* https://www.suse.com/security/cve/CVE-2018-12381.html
* https://www.suse.com/security/cve/CVE-2018-12382.html
* https://www.suse.com/security/cve/CVE-2018-12383.html
* https://www.suse.com/security/cve/CVE-2018-12385.html
* https://www.suse.com/security/cve/CVE-2018-12386.html
* https://www.suse.com/security/cve/CVE-2018-12387.html
* https://www.suse.com/security/cve/CVE-2018-12388.html
* https://www.suse.com/security/cve/CVE-2018-12390.html
* https://www.suse.com/security/cve/CVE-2018-12391.html
* https://www.suse.com/security/cve/CVE-2018-12392.html
* https://www.suse.com/security/cve/CVE-2018-12393.html
* https://www.suse.com/security/cve/CVE-2018-12395.html
* https://www.suse.com/security/cve/CVE-2018-12396.html
* https://www.suse.com/security/cve/CVE-2018-12397.html
* https://www.suse.com/security/cve/CVE-2018-12398.html
* https://www.suse.com/security/cve/CVE-2018-12399.html
* https://www.suse.com/security/cve/CVE-2018-12400.html
* https://www.suse.com/security/cve/CVE-2018-12401.html
* https://www.suse.com/security/cve/CVE-2018-12402.html
* https://www.suse.com/security/cve/CVE-2018-12403.html
* https://www.suse.com/security/cve/CVE-2018-12405.html
* https://www.suse.com/security/cve/CVE-2018-12406.html
* https://www.suse.com/security/cve/CVE-2018-12407.html
* https://www.suse.com/security/cve/CVE-2018-17466.html
* https://www.suse.com/security/cve/CVE-2018-18356.html
* https://www.suse.com/security/cve/CVE-2018-18492.html
* https://www.suse.com/security/cve/CVE-2018-18493.html
* https://www.suse.com/security/cve/CVE-2018-18494.html
* https://www.suse.com/security/cve/CVE-2018-18495.html
* https://www.suse.com/security/cve/CVE-2018-18496.html
* https://www.suse.com/security/cve/CVE-2018-18497.html
* https://www.suse.com/security/cve/CVE-2018-18498.html
* https://www.suse.com/security/cve/CVE-2018-18500.html
* https://www.suse.com/security/cve/CVE-2018-18501.html
* https://www.suse.com/security/cve/CVE-2018-18502.html
* https://www.suse.com/security/cve/CVE-2018-18503.html
* https://www.suse.com/security/cve/CVE-2018-18504.html
* https://www.suse.com/security/cve/CVE-2018-18505.html
* https://www.suse.com/security/cve/CVE-2018-18506.html
* https://www.suse.com/security/cve/CVE-2018-18511.html
* https://www.suse.com/security/cve/CVE-2018-5089.html
* https://www.suse.com/security/cve/CVE-2018-5090.html
* https://www.suse.com/security/cve/CVE-2018-5091.html
* https://www.suse.com/security/cve/CVE-2018-5092.html
* https://www.suse.com/security/cve/CVE-2018-5093.html
* https://www.suse.com/security/cve/CVE-2018-5094.html
* https://www.suse.com/security/cve/CVE-2018-5095.html
* https://www.suse.com/security/cve/CVE-2018-5097.html
* https://www.suse.com/security/cve/CVE-2018-5098.html
* https://www.suse.com/security/cve/CVE-2018-5099.html
* https://www.suse.com/security/cve/CVE-2018-5100.html
* https://www.suse.com/security/cve/CVE-2018-5101.html
* https://www.suse.com/security/cve/CVE-2018-5102.html
* https://www.suse.com/security/cve/CVE-2018-5103.html
* https://www.suse.com/security/cve/CVE-2018-5104.html
* https://www.suse.com/security/cve/CVE-2018-5105.html
* https://www.suse.com/security/cve/CVE-2018-5106.html
* https://www.suse.com/security/cve/CVE-2018-5107.html
* https://www.suse.com/security/cve/CVE-2018-5108.html
* https://www.suse.com/security/cve/CVE-2018-5109.html
* https://www.suse.com/security/cve/CVE-2018-5110.html
* https://www.suse.com/security/cve/CVE-2018-5111.html
* https://www.suse.com/security/cve/CVE-2018-5112.html
* https://www.suse.com/security/cve/CVE-2018-5113.html
* https://www.suse.com/security/cve/CVE-2018-5114.html
* https://www.suse.com/security/cve/CVE-2018-5115.html
* https://www.suse.com/security/cve/CVE-2018-5116.html
* https://www.suse.com/security/cve/CVE-2018-5117.html
* https://www.suse.com/security/cve/CVE-2018-5118.html
* https://www.suse.com/security/cve/CVE-2018-5119.html
* https://www.suse.com/security/cve/CVE-2018-5121.html
* https://www.suse.com/security/cve/CVE-2018-5122.html
* https://www.suse.com/security/cve/CVE-2018-5125.html
* https://www.suse.com/security/cve/CVE-2018-5126.html
* https://www.suse.com/security/cve/CVE-2018-5127.html
* https://www.suse.com/security/cve/CVE-2018-5128.html
* https://www.suse.com/security/cve/CVE-2018-5129.html
* https://www.suse.com/security/cve/CVE-2018-5130.html
* https://www.suse.com/security/cve/CVE-2018-5131.html
* https://www.suse.com/security/cve/CVE-2018-5132.html
* https://www.suse.com/security/cve/CVE-2018-5133.html
* https://www.suse.com/security/cve/CVE-2018-5134.html
* https://www.suse.com/security/cve/CVE-2018-5135.html
* https://www.suse.com/security/cve/CVE-2018-5136.html
* https://www.suse.com/security/cve/CVE-2018-5137.html
* https://www.suse.com/security/cve/CVE-2018-5138.html
* https://www.suse.com/security/cve/CVE-2018-5140.html
* https://www.suse.com/security/cve/CVE-2018-5141.html
* https://www.suse.com/security/cve/CVE-2018-5142.html
* https://www.suse.com/security/cve/CVE-2018-5143.html
* https://www.suse.com/security/cve/CVE-2018-5146.html
* https://www.suse.com/security/cve/CVE-2018-5147.html
* https://www.suse.com/security/cve/CVE-2018-5148.html
* https://www.suse.com/security/cve/CVE-2018-5150.html
* https://www.suse.com/security/cve/CVE-2018-5151.html
* https://www.suse.com/security/cve/CVE-2018-5152.html
* https://www.suse.com/security/cve/CVE-2018-5153.html
* https://www.suse.com/security/cve/CVE-2018-5154.html
* https://www.suse.com/security/cve/CVE-2018-5155.html
* https://www.suse.com/security/cve/CVE-2018-5156.html
* https://www.suse.com/security/cve/CVE-2018-5157.html
* https://www.suse.com/security/cve/CVE-2018-5158.html
* https://www.suse.com/security/cve/CVE-2018-5159.html
* https://www.suse.com/security/cve/CVE-2018-5160.html
* https://www.suse.com/security/cve/CVE-2018-5163.html
* https://www.suse.com/security/cve/CVE-2018-5164.html
* https://www.suse.com/security/cve/CVE-2018-5165.html
* https://www.suse.com/security/cve/CVE-2018-5166.html
* https://www.suse.com/security/cve/CVE-2018-5167.html
* https://www.suse.com/security/cve/CVE-2018-5168.html
* https://www.suse.com/security/cve/CVE-2018-5169.html
* https://www.suse.com/security/cve/CVE-2018-5172.html
* https://www.suse.com/security/cve/CVE-2018-5173.html
* https://www.suse.com/security/cve/CVE-2018-5174.html
* https://www.suse.com/security/cve/CVE-2018-5175.html
* https://www.suse.com/security/cve/CVE-2018-5176.html
* https://www.suse.com/security/cve/CVE-2018-5177.html
* https://www.suse.com/security/cve/CVE-2018-5180.html
* https://www.suse.com/security/cve/CVE-2018-5181.html
* https://www.suse.com/security/cve/CVE-2018-5182.html
* https://www.suse.com/security/cve/CVE-2018-5186.html
* https://www.suse.com/security/cve/CVE-2018-5187.html
* https://www.suse.com/security/cve/CVE-2018-5188.html
* https://www.suse.com/security/cve/CVE-2018-6126.html
* https://www.suse.com/security/cve/CVE-2018-6156.html
* https://www.suse.com/security/cve/CVE-2019-11691.html
* https://www.suse.com/security/cve/CVE-2019-11692.html
* https://www.suse.com/security/cve/CVE-2019-11693.html
* https://www.suse.com/security/cve/CVE-2019-11694.html
* https://www.suse.com/security/cve/CVE-2019-11695.html
* https://www.suse.com/security/cve/CVE-2019-11696.html
* https://www.suse.com/security/cve/CVE-2019-11697.html
* https://www.suse.com/security/cve/CVE-2019-11698.html
* https://www.suse.com/security/cve/CVE-2019-11699.html
* https://www.suse.com/security/cve/CVE-2019-11700.html
* https://www.suse.com/security/cve/CVE-2019-11701.html
* https://www.suse.com/security/cve/CVE-2019-11707.html
* https://www.suse.com/security/cve/CVE-2019-11708.html
* https://www.suse.com/security/cve/CVE-2019-11709.html
* https://www.suse.com/security/cve/CVE-2019-11710.html
* https://www.suse.com/security/cve/CVE-2019-11711.html
* https://www.suse.com/security/cve/CVE-2019-11712.html
* https://www.suse.com/security/cve/CVE-2019-11713.html
* https://www.suse.com/security/cve/CVE-2019-11714.html
* https://www.suse.com/security/cve/CVE-2019-11715.html
* https://www.suse.com/security/cve/CVE-2019-11716.html
* https://www.suse.com/security/cve/CVE-2019-11717.html
* https://www.suse.com/security/cve/CVE-2019-11718.html
* https://www.suse.com/security/cve/CVE-2019-11719.html
* https://www.suse.com/security/cve/CVE-2019-11720.html
* https://www.suse.com/security/cve/CVE-2019-11721.html
* https://www.suse.com/security/cve/CVE-2019-11723.html
* https://www.suse.com/security/cve/CVE-2019-11724.html
* https://www.suse.com/security/cve/CVE-2019-11725.html
* https://www.suse.com/security/cve/CVE-2019-11727.html
* https://www.suse.com/security/cve/CVE-2019-11728.html
* https://www.suse.com/security/cve/CVE-2019-11729.html
* https://www.suse.com/security/cve/CVE-2019-11730.html
* https://www.suse.com/security/cve/CVE-2019-11733.html
* https://www.suse.com/security/cve/CVE-2019-11734.html
* https://www.suse.com/security/cve/CVE-2019-11735.html
* https://www.suse.com/security/cve/CVE-2019-11736.html
* https://www.suse.com/security/cve/CVE-2019-11737.html
* https://www.suse.com/security/cve/CVE-2019-11738.html
* https://www.suse.com/security/cve/CVE-2019-11740.html
* https://www.suse.com/security/cve/CVE-2019-11741.html
* https://www.suse.com/security/cve/CVE-2019-11742.html
* https://www.suse.com/security/cve/CVE-2019-11743.html
* https://www.suse.com/security/cve/CVE-2019-11744.html
* https://www.suse.com/security/cve/CVE-2019-11746.html
* https://www.suse.com/security/cve/CVE-2019-11747.html
* https://www.suse.com/security/cve/CVE-2019-11748.html
* https://www.suse.com/security/cve/CVE-2019-11749.html
* https://www.suse.com/security/cve/CVE-2019-11750.html
* https://www.suse.com/security/cve/CVE-2019-11751.html
* https://www.suse.com/security/cve/CVE-2019-11752.html
* https://www.suse.com/security/cve/CVE-2019-11753.html
* https://www.suse.com/security/cve/CVE-2019-11754.html
* https://www.suse.com/security/cve/CVE-2019-11756.html
* https://www.suse.com/security/cve/CVE-2019-11757.html
* https://www.suse.com/security/cve/CVE-2019-11759.html
* https://www.suse.com/security/cve/CVE-2019-11760.html
* https://www.suse.com/security/cve/CVE-2019-11761.html
* https://www.suse.com/security/cve/CVE-2019-11762.html
* https://www.suse.com/security/cve/CVE-2019-11763.html
* https://www.suse.com/security/cve/CVE-2019-11764.html
* https://www.suse.com/security/cve/CVE-2019-11765.html
* https://www.suse.com/security/cve/CVE-2019-13722.html
* https://www.suse.com/security/cve/CVE-2019-15903.html
* https://www.suse.com/security/cve/CVE-2019-17000.html
* https://www.suse.com/security/cve/CVE-2019-17001.html
* https://www.suse.com/security/cve/CVE-2019-17002.html
* https://www.suse.com/security/cve/CVE-2019-17005.html
* https://www.suse.com/security/cve/CVE-2019-17008.html
* https://www.suse.com/security/cve/CVE-2019-17010.html
* https://www.suse.com/security/cve/CVE-2019-17011.html
* https://www.suse.com/security/cve/CVE-2019-17012.html
* https://www.suse.com/security/cve/CVE-2019-17013.html
* https://www.suse.com/security/cve/CVE-2019-17014.html
* https://www.suse.com/security/cve/CVE-2019-17016.html
* https://www.suse.com/security/cve/CVE-2019-17017.html
* https://www.suse.com/security/cve/CVE-2019-17020.html
* https://www.suse.com/security/cve/CVE-2019-17022.html
* https://www.suse.com/security/cve/CVE-2019-17023.html
* https://www.suse.com/security/cve/CVE-2019-17024.html
* https://www.suse.com/security/cve/CVE-2019-17025.html
* https://www.suse.com/security/cve/CVE-2019-17026.html
* https://www.suse.com/security/cve/CVE-2019-20503.html
* https://www.suse.com/security/cve/CVE-2019-5785.html
* https://www.suse.com/security/cve/CVE-2019-5849.html
* https://www.suse.com/security/cve/CVE-2019-7317.html
* https://www.suse.com/security/cve/CVE-2019-9788.html
* https://www.suse.com/security/cve/CVE-2019-9789.html
* https://www.suse.com/security/cve/CVE-2019-9790.html
* https://www.suse.com/security/cve/CVE-2019-9791.html
* https://www.suse.com/security/cve/CVE-2019-9792.html
* https://www.suse.com/security/cve/CVE-2019-9793.html
* https://www.suse.com/security/cve/CVE-2019-9794.html
* https://www.suse.com/security/cve/CVE-2019-9795.html
* https://www.suse.com/security/cve/CVE-2019-9796.html
* https://www.suse.com/security/cve/CVE-2019-9797.html
* https://www.suse.com/security/cve/CVE-2019-9798.html
* https://www.suse.com/security/cve/CVE-2019-9799.html
* https://www.suse.com/security/cve/CVE-2019-9800.html
* https://www.suse.com/security/cve/CVE-2019-9801.html
* https://www.suse.com/security/cve/CVE-2019-9802.html
* https://www.suse.com/security/cve/CVE-2019-9803.html
* https://www.suse.com/security/cve/CVE-2019-9804.html
* https://www.suse.com/security/cve/CVE-2019-9805.html
* https://www.suse.com/security/cve/CVE-2019-9806.html
* https://www.suse.com/security/cve/CVE-2019-9807.html
* https://www.suse.com/security/cve/CVE-2019-9808.html
* https://www.suse.com/security/cve/CVE-2019-9809.html
* https://www.suse.com/security/cve/CVE-2019-9810.html
* https://www.suse.com/security/cve/CVE-2019-9811.html
* https://www.suse.com/security/cve/CVE-2019-9812.html
* https://www.suse.com/security/cve/CVE-2019-9813.html
* https://www.suse.com/security/cve/CVE-2019-9814.html
* https://www.suse.com/security/cve/CVE-2019-9815.html
* https://www.suse.com/security/cve/CVE-2019-9816.html
* https://www.suse.com/security/cve/CVE-2019-9817.html
* https://www.suse.com/security/cve/CVE-2019-9818.html
* https://www.suse.com/security/cve/CVE-2019-9819.html
* https://www.suse.com/security/cve/CVE-2019-9820.html
* https://www.suse.com/security/cve/CVE-2019-9821.html
* https://www.suse.com/security/cve/CVE-2020-12387.html
* https://www.suse.com/security/cve/CVE-2020-12388.html
* https://www.suse.com/security/cve/CVE-2020-12389.html
* https://www.suse.com/security/cve/CVE-2020-12390.html
* https://www.suse.com/security/cve/CVE-2020-12391.html
* https://www.suse.com/security/cve/CVE-2020-12392.html
* https://www.suse.com/security/cve/CVE-2020-12393.html
* https://www.suse.com/security/cve/CVE-2020-12394.html
* https://www.suse.com/security/cve/CVE-2020-12395.html
* https://www.suse.com/security/cve/CVE-2020-12396.html
* https://www.suse.com/security/cve/CVE-2020-12399.html
* https://www.suse.com/security/cve/CVE-2020-12400.html
* https://www.suse.com/security/cve/CVE-2020-12401.html
* https://www.suse.com/security/cve/CVE-2020-12402.html
* https://www.suse.com/security/cve/CVE-2020-12405.html
* https://www.suse.com/security/cve/CVE-2020-12406.html
* https://www.suse.com/security/cve/CVE-2020-12407.html
* https://www.suse.com/security/cve/CVE-2020-12408.html
* https://www.suse.com/security/cve/CVE-2020-12409.html
* https://www.suse.com/security/cve/CVE-2020-12411.html
* https://www.suse.com/security/cve/CVE-2020-12415.html
* https://www.suse.com/security/cve/CVE-2020-12416.html
* https://www.suse.com/security/cve/CVE-2020-12417.html
* https://www.suse.com/security/cve/CVE-2020-12418.html
* https://www.suse.com/security/cve/CVE-2020-12419.html
* https://www.suse.com/security/cve/CVE-2020-12420.html
* https://www.suse.com/security/cve/CVE-2020-12421.html
* https://www.suse.com/security/cve/CVE-2020-12422.html
* https://www.suse.com/security/cve/CVE-2020-12423.html
* https://www.suse.com/security/cve/CVE-2020-12424.html
* https://www.suse.com/security/cve/CVE-2020-12425.html
* https://www.suse.com/security/cve/CVE-2020-12426.html
* https://www.suse.com/security/cve/CVE-2020-15254.html
* https://www.suse.com/security/cve/CVE-2020-15652.html
* https://www.suse.com/security/cve/CVE-2020-15653.html
* https://www.suse.com/security/cve/CVE-2020-15654.html
* https://www.suse.com/security/cve/CVE-2020-15655.html
* https://www.suse.com/security/cve/CVE-2020-15656.html
* https://www.suse.com/security/cve/CVE-2020-15657.html
* https://www.suse.com/security/cve/CVE-2020-15658.html
* https://www.suse.com/security/cve/CVE-2020-15659.html
* https://www.suse.com/security/cve/CVE-2020-15663.html
* https://www.suse.com/security/cve/CVE-2020-15664.html
* https://www.suse.com/security/cve/CVE-2020-15665.html
* https://www.suse.com/security/cve/CVE-2020-15666.html
* https://www.suse.com/security/cve/CVE-2020-15667.html
* https://www.suse.com/security/cve/CVE-2020-15668.html
* https://www.suse.com/security/cve/CVE-2020-15670.html
* https://www.suse.com/security/cve/CVE-2020-15673.html
* https://www.suse.com/security/cve/CVE-2020-15674.html
* https://www.suse.com/security/cve/CVE-2020-15675.html
* https://www.suse.com/security/cve/CVE-2020-15676.html
* https://www.suse.com/security/cve/CVE-2020-15677.html
* https://www.suse.com/security/cve/CVE-2020-15678.html
* https://www.suse.com/security/cve/CVE-2020-15680.html
* https://www.suse.com/security/cve/CVE-2020-15681.html
* https://www.suse.com/security/cve/CVE-2020-15682.html
* https://www.suse.com/security/cve/CVE-2020-15683.html
* https://www.suse.com/security/cve/CVE-2020-15684.html
* https://www.suse.com/security/cve/CVE-2020-15969.html
* https://www.suse.com/security/cve/CVE-2020-15999.html
* https://www.suse.com/security/cve/CVE-2020-16012.html
* https://www.suse.com/security/cve/CVE-2020-16042.html
* https://www.suse.com/security/cve/CVE-2020-16044.html
* https://www.suse.com/security/cve/CVE-2020-26950.html
* https://www.suse.com/security/cve/CVE-2020-26951.html
* https://www.suse.com/security/cve/CVE-2020-26952.html
* https://www.suse.com/security/cve/CVE-2020-26953.html
* https://www.suse.com/security/cve/CVE-2020-26954.html
* https://www.suse.com/security/cve/CVE-2020-26955.html
* https://www.suse.com/security/cve/CVE-2020-26956.html
* https://www.suse.com/security/cve/CVE-2020-26957.html
* https://www.suse.com/security/cve/CVE-2020-26958.html
* https://www.suse.com/security/cve/CVE-2020-26959.html
* https://www.suse.com/security/cve/CVE-2020-26960.html
* https://www.suse.com/security/cve/CVE-2020-26961.html
* https://www.suse.com/security/cve/CVE-2020-26962.html
* https://www.suse.com/security/cve/CVE-2020-26963.html
* https://www.suse.com/security/cve/CVE-2020-26964.html
* https://www.suse.com/security/cve/CVE-2020-26965.html
* https://www.suse.com/security/cve/CVE-2020-26966.html
* https://www.suse.com/security/cve/CVE-2020-26967.html
* https://www.suse.com/security/cve/CVE-2020-26968.html
* https://www.suse.com/security/cve/CVE-2020-26969.html
* https://www.suse.com/security/cve/CVE-2020-26971.html
* https://www.suse.com/security/cve/CVE-2020-26972.html
* https://www.suse.com/security/cve/CVE-2020-26973.html
* https://www.suse.com/security/cve/CVE-2020-26974.html
* https://www.suse.com/security/cve/CVE-2020-26975.html
* https://www.suse.com/security/cve/CVE-2020-26976.html
* https://www.suse.com/security/cve/CVE-2020-26977.html
* https://www.suse.com/security/cve/CVE-2020-26978.html
* https://www.suse.com/security/cve/CVE-2020-26979.html
* https://www.suse.com/security/cve/CVE-2020-35111.html
* https://www.suse.com/security/cve/CVE-2020-35112.html
* https://www.suse.com/security/cve/CVE-2020-35113.html
* https://www.suse.com/security/cve/CVE-2020-35114.html
* https://www.suse.com/security/cve/CVE-2020-6463.html
* https://www.suse.com/security/cve/CVE-2020-6514.html
* https://www.suse.com/security/cve/CVE-2020-6796.html
* https://www.suse.com/security/cve/CVE-2020-6797.html
* https://www.suse.com/security/cve/CVE-2020-6798.html
* https://www.suse.com/security/cve/CVE-2020-6799.html
* https://www.suse.com/security/cve/CVE-2020-6800.html
* https://www.suse.com/security/cve/CVE-2020-6801.html
* https://www.suse.com/security/cve/CVE-2020-6805.html
* https://www.suse.com/security/cve/CVE-2020-6806.html
* https://www.suse.com/security/cve/CVE-2020-6807.html
* https://www.suse.com/security/cve/CVE-2020-6808.html
* https://www.suse.com/security/cve/CVE-2020-6809.html
* https://www.suse.com/security/cve/CVE-2020-6810.html
* https://www.suse.com/security/cve/CVE-2020-6811.html
* https://www.suse.com/security/cve/CVE-2020-6812.html
* https://www.suse.com/security/cve/CVE-2020-6813.html
* https://www.suse.com/security/cve/CVE-2020-6814.html
* https://www.suse.com/security/cve/CVE-2020-6815.html
* https://www.suse.com/security/cve/CVE-2020-6819.html
* https://www.suse.com/security/cve/CVE-2020-6820.html
* https://www.suse.com/security/cve/CVE-2020-6821.html
* https://www.suse.com/security/cve/CVE-2020-6822.html
* https://www.suse.com/security/cve/CVE-2020-6823.html
* https://www.suse.com/security/cve/CVE-2020-6824.html
* https://www.suse.com/security/cve/CVE-2020-6825.html
* https://www.suse.com/security/cve/CVE-2020-6826.html
* https://www.suse.com/security/cve/CVE-2020-6829.html
* https://www.suse.com/security/cve/CVE-2020-6831.html
* https://www.suse.com/security/cve/CVE-2021-23953.html
* https://www.suse.com/security/cve/CVE-2021-23954.html
* https://www.suse.com/security/cve/CVE-2021-23955.html
* https://www.suse.com/security/cve/CVE-2021-23956.html
* https://www.suse.com/security/cve/CVE-2021-23957.html
* https://www.suse.com/security/cve/CVE-2021-23958.html
* https://www.suse.com/security/cve/CVE-2021-23959.html
* https://www.suse.com/security/cve/CVE-2021-23960.html
* https://www.suse.com/security/cve/CVE-2021-23961.html
* https://www.suse.com/security/cve/CVE-2021-23962.html
* https://www.suse.com/security/cve/CVE-2021-23963.html
* https://www.suse.com/security/cve/CVE-2021-23964.html
* https://www.suse.com/security/cve/CVE-2021-23965.html
* https://www.suse.com/security/cve/CVE-2021-23968.html
* https://www.suse.com/security/cve/CVE-2021-23969.html
* https://www.suse.com/security/cve/CVE-2021-23970.html
* https://www.suse.com/security/cve/CVE-2021-23971.html
* https://www.suse.com/security/cve/CVE-2021-23972.html
* https://www.suse.com/security/cve/CVE-2021-23973.html
* https://www.suse.com/security/cve/CVE-2021-23974.html
* https://www.suse.com/security/cve/CVE-2021-23975.html
* https://www.suse.com/security/cve/CVE-2021-23976.html
* https://www.suse.com/security/cve/CVE-2021-23977.html
* https://www.suse.com/security/cve/CVE-2021-23978.html
* https://www.suse.com/security/cve/CVE-2021-23979.html
* https://www.suse.com/security/cve/CVE-2021-23981.html
* https://www.suse.com/security/cve/CVE-2021-23982.html
* https://www.suse.com/security/cve/CVE-2021-23983.html
* https://www.suse.com/security/cve/CVE-2021-23984.html
* https://www.suse.com/security/cve/CVE-2021-23985.html
* https://www.suse.com/security/cve/CVE-2021-23986.html
* https://www.suse.com/security/cve/CVE-2021-23987.html
* https://www.suse.com/security/cve/CVE-2021-23988.html
* https://www.suse.com/security/cve/CVE-2021-23994.html
* https://www.suse.com/security/cve/CVE-2021-23995.html
* https://www.suse.com/security/cve/CVE-2021-23996.html
* https://www.suse.com/security/cve/CVE-2021-23997.html
* https://www.suse.com/security/cve/CVE-2021-23998.html
* https://www.suse.com/security/cve/CVE-2021-23999.html
* https://www.suse.com/security/cve/CVE-2021-24000.html
* https://www.suse.com/security/cve/CVE-2021-24001.html
* https://www.suse.com/security/cve/CVE-2021-24002.html
* https://www.suse.com/security/cve/CVE-2021-29944.html
* https://www.suse.com/security/cve/CVE-2021-29945.html
* https://www.suse.com/security/cve/CVE-2021-29946.html
* https://www.suse.com/security/cve/CVE-2021-29947.html
* https://www.suse.com/security/cve/CVE-2021-29952.html
* https://www.suse.com/security/cve/CVE-2021-29959.html
* https://www.suse.com/security/cve/CVE-2021-29960.html
* https://www.suse.com/security/cve/CVE-2021-29961.html
* https://www.suse.com/security/cve/CVE-2021-29962.html
* https://www.suse.com/security/cve/CVE-2021-29963.html
* https://www.suse.com/security/cve/CVE-2021-29964.html
* https://www.suse.com/security/cve/CVE-2021-29965.html
* https://www.suse.com/security/cve/CVE-2021-29966.html
* https://www.suse.com/security/cve/CVE-2021-29967.html
* https://www.suse.com/security/cve/CVE-2021-29970.html
* https://www.suse.com/security/cve/CVE-2021-29971.html
* https://www.suse.com/security/cve/CVE-2021-29972.html
* https://www.suse.com/security/cve/CVE-2021-29973.html
* https://www.suse.com/security/cve/CVE-2021-29974.html
* https://www.suse.com/security/cve/CVE-2021-29975.html
* https://www.suse.com/security/cve/CVE-2021-29976.html
* https://www.suse.com/security/cve/CVE-2021-29977.html
* https://www.suse.com/security/cve/CVE-2021-29980.html
* https://www.suse.com/security/cve/CVE-2021-29981.html
* https://www.suse.com/security/cve/CVE-2021-29982.html
* https://www.suse.com/security/cve/CVE-2021-29983.html
* https://www.suse.com/security/cve/CVE-2021-29984.html
* https://www.suse.com/security/cve/CVE-2021-29985.html
* https://www.suse.com/security/cve/CVE-2021-29986.html
* https://www.suse.com/security/cve/CVE-2021-29987.html
* https://www.suse.com/security/cve/CVE-2021-29988.html
* https://www.suse.com/security/cve/CVE-2021-29989.html
* https://www.suse.com/security/cve/CVE-2021-29990.html
* https://www.suse.com/security/cve/CVE-2021-29991.html
* https://www.suse.com/security/cve/CVE-2021-29993.html
* https://www.suse.com/security/cve/CVE-2021-30547.html
* https://www.suse.com/security/cve/CVE-2021-32810.html
* https://www.suse.com/security/cve/CVE-2021-38491.html
* https://www.suse.com/security/cve/CVE-2021-38492.html
* https://www.suse.com/security/cve/CVE-2021-38493.html
* https://www.suse.com/security/cve/CVE-2021-38494.html
* https://www.suse.com/security/cve/CVE-2021-38496.html
* https://www.suse.com/security/cve/CVE-2021-38497.html
* https://www.suse.com/security/cve/CVE-2021-38498.html
* https://www.suse.com/security/cve/CVE-2021-38499.html
* https://www.suse.com/security/cve/CVE-2021-38500.html
* https://www.suse.com/security/cve/CVE-2021-38501.html
* https://www.suse.com/security/cve/CVE-2021-38503.html
* https://www.suse.com/security/cve/CVE-2021-38504.html
* https://www.suse.com/security/cve/CVE-2021-38505.html
* https://www.suse.com/security/cve/CVE-2021-38506.html
* https://www.suse.com/security/cve/CVE-2021-38507.html
* https://www.suse.com/security/cve/CVE-2021-38508.html
* https://www.suse.com/security/cve/CVE-2021-38509.html
* https://www.suse.com/security/cve/CVE-2021-38510.html
* https://www.suse.com/security/cve/CVE-2021-4140.html
* https://www.suse.com/security/cve/CVE-2021-43536.html
* https://www.suse.com/security/cve/CVE-2021-43537.html
* https://www.suse.com/security/cve/CVE-2021-43538.html
* https://www.suse.com/security/cve/CVE-2021-43539.html
* https://www.suse.com/security/cve/CVE-2021-43540.html
* https://www.suse.com/security/cve/CVE-2021-43541.html
* https://www.suse.com/security/cve/CVE-2021-43542.html
* https://www.suse.com/security/cve/CVE-2021-43543.html
* https://www.suse.com/security/cve/CVE-2021-43544.html
* https://www.suse.com/security/cve/CVE-2021-43545.html
* https://www.suse.com/security/cve/CVE-2021-43546.html
* https://www.suse.com/security/cve/CVE-2022-0511.html
* https://www.suse.com/security/cve/CVE-2022-0843.html
* https://www.suse.com/security/cve/CVE-2022-1097.html
* https://www.suse.com/security/cve/CVE-2022-1529.html
* https://www.suse.com/security/cve/CVE-2022-1802.html
* https://www.suse.com/security/cve/CVE-2022-1919.html
* https://www.suse.com/security/cve/CVE-2022-2200.html
* https://www.suse.com/security/cve/CVE-2022-22736.html
* https://www.suse.com/security/cve/CVE-2022-22737.html
* https://www.suse.com/security/cve/CVE-2022-22738.html
* https://www.suse.com/security/cve/CVE-2022-22739.html
* https://www.suse.com/security/cve/CVE-2022-22740.html
* https://www.suse.com/security/cve/CVE-2022-22741.html
* https://www.suse.com/security/cve/CVE-2022-22742.html
* https://www.suse.com/security/cve/CVE-2022-22743.html
* https://www.suse.com/security/cve/CVE-2022-22744.html
* https://www.suse.com/security/cve/CVE-2022-22745.html
* https://www.suse.com/security/cve/CVE-2022-22746.html
* https://www.suse.com/security/cve/CVE-2022-22747.html
* https://www.suse.com/security/cve/CVE-2022-22748.html
* https://www.suse.com/security/cve/CVE-2022-22749.html
* https://www.suse.com/security/cve/CVE-2022-22750.html
* https://www.suse.com/security/cve/CVE-2022-22751.html
* https://www.suse.com/security/cve/CVE-2022-22752.html
* https://www.suse.com/security/cve/CVE-2022-22753.html
* https://www.suse.com/security/cve/CVE-2022-22754.html
* https://www.suse.com/security/cve/CVE-2022-22755.html
* https://www.suse.com/security/cve/CVE-2022-22756.html
* https://www.suse.com/security/cve/CVE-2022-22757.html
* https://www.suse.com/security/cve/CVE-2022-22758.html
* https://www.suse.com/security/cve/CVE-2022-22759.html
* https://www.suse.com/security/cve/CVE-2022-22760.html
* https://www.suse.com/security/cve/CVE-2022-22761.html
* https://www.suse.com/security/cve/CVE-2022-22762.html
* https://www.suse.com/security/cve/CVE-2022-22764.html
* https://www.suse.com/security/cve/CVE-2022-24713.html
* https://www.suse.com/security/cve/CVE-2022-2505.html
* https://www.suse.com/security/cve/CVE-2022-26381.html
* https://www.suse.com/security/cve/CVE-2022-26382.html
* https://www.suse.com/security/cve/CVE-2022-26383.html
* https://www.suse.com/security/cve/CVE-2022-26384.html
* https://www.suse.com/security/cve/CVE-2022-26385.html
* https://www.suse.com/security/cve/CVE-2022-26387.html
* https://www.suse.com/security/cve/CVE-2022-28281.html
* https://www.suse.com/security/cve/CVE-2022-28282.html
* https://www.suse.com/security/cve/CVE-2022-28283.html
* https://www.suse.com/security/cve/CVE-2022-28284.html
* https://www.suse.com/security/cve/CVE-2022-28285.html
* https://www.suse.com/security/cve/CVE-2022-28286.html
* https://www.suse.com/security/cve/CVE-2022-28287.html
* https://www.suse.com/security/cve/CVE-2022-28288.html
* https://www.suse.com/security/cve/CVE-2022-28289.html
* https://www.suse.com/security/cve/CVE-2022-29909.html
* https://www.suse.com/security/cve/CVE-2022-29910.html
* https://www.suse.com/security/cve/CVE-2022-29911.html
* https://www.suse.com/security/cve/CVE-2022-29912.html
* https://www.suse.com/security/cve/CVE-2022-29914.html
* https://www.suse.com/security/cve/CVE-2022-29915.html
* https://www.suse.com/security/cve/CVE-2022-29916.html
* https://www.suse.com/security/cve/CVE-2022-29917.html
* https://www.suse.com/security/cve/CVE-2022-29918.html
* https://www.suse.com/security/cve/CVE-2022-31736.html
* https://www.suse.com/security/cve/CVE-2022-31737.html
* https://www.suse.com/security/cve/CVE-2022-31738.html
* https://www.suse.com/security/cve/CVE-2022-31739.html
* https://www.suse.com/security/cve/CVE-2022-31740.html
* https://www.suse.com/security/cve/CVE-2022-31741.html
* https://www.suse.com/security/cve/CVE-2022-31742.html
* https://www.suse.com/security/cve/CVE-2022-31743.html
* https://www.suse.com/security/cve/CVE-2022-31744.html
* https://www.suse.com/security/cve/CVE-2022-31745.html
* https://www.suse.com/security/cve/CVE-2022-31747.html
* https://www.suse.com/security/cve/CVE-2022-31748.html
* https://www.suse.com/security/cve/CVE-2022-34468.html
* https://www.suse.com/security/cve/CVE-2022-34469.html
* https://www.suse.com/security/cve/CVE-2022-34470.html
* https://www.suse.com/security/cve/CVE-2022-34471.html
* https://www.suse.com/security/cve/CVE-2022-34472.html
* https://www.suse.com/security/cve/CVE-2022-34473.html
* https://www.suse.com/security/cve/CVE-2022-34474.html
* https://www.suse.com/security/cve/CVE-2022-34475.html
* https://www.suse.com/security/cve/CVE-2022-34476.html
* https://www.suse.com/security/cve/CVE-2022-34477.html
* https://www.suse.com/security/cve/CVE-2022-34478.html
* https://www.suse.com/security/cve/CVE-2022-34479.html
* https://www.suse.com/security/cve/CVE-2022-34480.html
* https://www.suse.com/security/cve/CVE-2022-34481.html
* https://www.suse.com/security/cve/CVE-2022-34482.html
* https://www.suse.com/security/cve/CVE-2022-34483.html
* https://www.suse.com/security/cve/CVE-2022-34484.html
* https://www.suse.com/security/cve/CVE-2022-34485.html
* https://www.suse.com/security/cve/CVE-2022-36314.html
* https://www.suse.com/security/cve/CVE-2022-36315.html
* https://www.suse.com/security/cve/CVE-2022-36316.html
* https://www.suse.com/security/cve/CVE-2022-36317.html
* https://www.suse.com/security/cve/CVE-2022-36318.html
* https://www.suse.com/security/cve/CVE-2022-36319.html
* https://www.suse.com/security/cve/CVE-2022-36320.html
* https://www.suse.com/security/cve/CVE-2022-38472.html
* https://www.suse.com/security/cve/CVE-2022-38473.html
* https://www.suse.com/security/cve/CVE-2022-38474.html
* https://www.suse.com/security/cve/CVE-2022-38475.html
* https://www.suse.com/security/cve/CVE-2022-38477.html
* https://www.suse.com/security/cve/CVE-2022-38478.html
* https://www.suse.com/security/cve/CVE-2022-40674.html
* https://www.suse.com/security/cve/CVE-2022-40956.html
* https://www.suse.com/security/cve/CVE-2022-40957.html
* https://www.suse.com/security/cve/CVE-2022-40958.html
* https://www.suse.com/security/cve/CVE-2022-40959.html
* https://www.suse.com/security/cve/CVE-2022-40960.html
* https://www.suse.com/security/cve/CVE-2022-40961.html
* https://www.suse.com/security/cve/CVE-2022-40962.html
* https://www.suse.com/security/cve/CVE-2022-42927.html
* https://www.suse.com/security/cve/CVE-2022-42928.html
* https://www.suse.com/security/cve/CVE-2022-42929.html
* https://www.suse.com/security/cve/CVE-2022-42930.html
* https://www.suse.com/security/cve/CVE-2022-42931.html
* https://www.suse.com/security/cve/CVE-2022-42932.html
* https://www.suse.com/security/cve/CVE-2022-45403.html
* https://www.suse.com/security/cve/CVE-2022-45404.html
* https://www.suse.com/security/cve/CVE-2022-45405.html
* https://www.suse.com/security/cve/CVE-2022-45406.html
* https://www.suse.com/security/cve/CVE-2022-45407.html
* https://www.suse.com/security/cve/CVE-2022-45408.html
* https://www.suse.com/security/cve/CVE-2022-45409.html
* https://www.suse.com/security/cve/CVE-2022-45410.html
* https://www.suse.com/security/cve/CVE-2022-45411.html
* https://www.suse.com/security/cve/CVE-2022-45412.html
* https://www.suse.com/security/cve/CVE-2022-45413.html
* https://www.suse.com/security/cve/CVE-2022-45415.html
* https://www.suse.com/security/cve/CVE-2022-45416.html
* https://www.suse.com/security/cve/CVE-2022-45417.html
* https://www.suse.com/security/cve/CVE-2022-45418.html
* https://www.suse.com/security/cve/CVE-2022-45419.html
* https://www.suse.com/security/cve/CVE-2022-45420.html
* https://www.suse.com/security/cve/CVE-2022-45421.html
* https://www.suse.com/security/cve/CVE-2022-46871.html
* https://www.suse.com/security/cve/CVE-2022-46872.html
* https://www.suse.com/security/cve/CVE-2022-46873.html
* https://www.suse.com/security/cve/CVE-2022-46874.html
* https://www.suse.com/security/cve/CVE-2022-46875.html
* https://www.suse.com/security/cve/CVE-2022-46877.html
* https://www.suse.com/security/cve/CVE-2022-46878.html
* https://www.suse.com/security/cve/CVE-2022-46879.html
* https://www.suse.com/security/cve/CVE-2023-0767.html
* https://www.suse.com/security/cve/CVE-2023-23597.html
* https://www.suse.com/security/cve/CVE-2023-23598.html
* https://www.suse.com/security/cve/CVE-2023-23599.html
* https://www.suse.com/security/cve/CVE-2023-23600.html
* https://www.suse.com/security/cve/CVE-2023-23601.html
* https://www.suse.com/security/cve/CVE-2023-23602.html
* https://www.suse.com/security/cve/CVE-2023-23603.html
* https://www.suse.com/security/cve/CVE-2023-23604.html
* https://www.suse.com/security/cve/CVE-2023-23605.html
* https://www.suse.com/security/cve/CVE-2023-23606.html
* https://www.suse.com/security/cve/CVE-2023-25728.html
* https://www.suse.com/security/cve/CVE-2023-25729.html
* https://www.suse.com/security/cve/CVE-2023-25730.html
* https://www.suse.com/security/cve/CVE-2023-25731.html
* https://www.suse.com/security/cve/CVE-2023-25732.html
* https://www.suse.com/security/cve/CVE-2023-25733.html
* https://www.suse.com/security/cve/CVE-2023-25734.html
* https://www.suse.com/security/cve/CVE-2023-25735.html
* https://www.suse.com/security/cve/CVE-2023-25736.html
* https://www.suse.com/security/cve/CVE-2023-25737.html
* https://www.suse.com/security/cve/CVE-2023-25738.html
* https://www.suse.com/security/cve/CVE-2023-25739.html
* https://www.suse.com/security/cve/CVE-2023-25740.html
* https://www.suse.com/security/cve/CVE-2023-25741.html
* https://www.suse.com/security/cve/CVE-2023-25742.html
* https://www.suse.com/security/cve/CVE-2023-25743.html
* https://www.suse.com/security/cve/CVE-2023-25744.html
* https://www.suse.com/security/cve/CVE-2023-25745.html
* https://www.suse.com/security/cve/CVE-2023-25748.html
* https://www.suse.com/security/cve/CVE-2023-25749.html
* https://www.suse.com/security/cve/CVE-2023-25750.html
* https://www.suse.com/security/cve/CVE-2023-25751.html
* https://www.suse.com/security/cve/CVE-2023-25752.html
* https://www.suse.com/security/cve/CVE-2023-28159.html
* https://www.suse.com/security/cve/CVE-2023-28160.html
* https://www.suse.com/security/cve/CVE-2023-28161.html
* https://www.suse.com/security/cve/CVE-2023-28162.html
* https://www.suse.com/security/cve/CVE-2023-28163.html
* https://www.suse.com/security/cve/CVE-2023-28164.html
* https://www.suse.com/security/cve/CVE-2023-28176.html
* https://www.suse.com/security/cve/CVE-2023-28177.html
* https://www.suse.com/security/cve/CVE-2023-29531.html
* https://www.suse.com/security/cve/CVE-2023-29532.html
* https://www.suse.com/security/cve/CVE-2023-29533.html
* https://www.suse.com/security/cve/CVE-2023-29534.html
* https://www.suse.com/security/cve/CVE-2023-29535.html
* https://www.suse.com/security/cve/CVE-2023-29536.html
* https://www.suse.com/security/cve/CVE-2023-29537.html
* https://www.suse.com/security/cve/CVE-2023-29538.html
* https://www.suse.com/security/cve/CVE-2023-29539.html
* https://www.suse.com/security/cve/CVE-2023-29540.html
* https://www.suse.com/security/cve/CVE-2023-29541.html
* https://www.suse.com/security/cve/CVE-2023-29542.html
* https://www.suse.com/security/cve/CVE-2023-29543.html
* https://www.suse.com/security/cve/CVE-2023-29544.html
* https://www.suse.com/security/cve/CVE-2023-29545.html
* https://www.suse.com/security/cve/CVE-2023-29546.html
* https://www.suse.com/security/cve/CVE-2023-29547.html
* https://www.suse.com/security/cve/CVE-2023-29548.html
* https://www.suse.com/security/cve/CVE-2023-29549.html
* https://www.suse.com/security/cve/CVE-2023-29550.html
* https://www.suse.com/security/cve/CVE-2023-29551.html
* https://www.suse.com/security/cve/CVE-2023-32205.html
* https://www.suse.com/security/cve/CVE-2023-32206.html
* https://www.suse.com/security/cve/CVE-2023-32207.html
* https://www.suse.com/security/cve/CVE-2023-32208.html
* https://www.suse.com/security/cve/CVE-2023-32209.html
* https://www.suse.com/security/cve/CVE-2023-32210.html
* https://www.suse.com/security/cve/CVE-2023-32211.html
* https://www.suse.com/security/cve/CVE-2023-32212.html
* https://www.suse.com/security/cve/CVE-2023-32213.html
* https://www.suse.com/security/cve/CVE-2023-32214.html
* https://www.suse.com/security/cve/CVE-2023-32215.html
* https://www.suse.com/security/cve/CVE-2023-32216.html
* https://www.suse.com/security/cve/CVE-2023-34414.html
* https://www.suse.com/security/cve/CVE-2023-34415.html
* https://www.suse.com/security/cve/CVE-2023-34416.html
* https://www.suse.com/security/cve/CVE-2023-34417.html
* https://www.suse.com/security/cve/CVE-2023-3482.html
* https://www.suse.com/security/cve/CVE-2023-3600.html
* https://www.suse.com/security/cve/CVE-2023-37201.html
* https://www.suse.com/security/cve/CVE-2023-37202.html
* https://www.suse.com/security/cve/CVE-2023-37203.html
* https://www.suse.com/security/cve/CVE-2023-37204.html
* https://www.suse.com/security/cve/CVE-2023-37205.html
* https://www.suse.com/security/cve/CVE-2023-37206.html
* https://www.suse.com/security/cve/CVE-2023-37207.html
* https://www.suse.com/security/cve/CVE-2023-37208.html
* https://www.suse.com/security/cve/CVE-2023-37209.html
* https://www.suse.com/security/cve/CVE-2023-37210.html
* https://www.suse.com/security/cve/CVE-2023-37211.html
* https://www.suse.com/security/cve/CVE-2023-37212.html
* https://www.suse.com/security/cve/CVE-2023-4045.html
* https://www.suse.com/security/cve/CVE-2023-4046.html
* https://www.suse.com/security/cve/CVE-2023-4047.html
* https://www.suse.com/security/cve/CVE-2023-4048.html
* https://www.suse.com/security/cve/CVE-2023-4049.html
* https://www.suse.com/security/cve/CVE-2023-4050.html
* https://www.suse.com/security/cve/CVE-2023-4051.html
* https://www.suse.com/security/cve/CVE-2023-4052.html
* https://www.suse.com/security/cve/CVE-2023-4053.html
* https://www.suse.com/security/cve/CVE-2023-4054.html
* https://www.suse.com/security/cve/CVE-2023-4055.html
* https://www.suse.com/security/cve/CVE-2023-4056.html
* https://www.suse.com/security/cve/CVE-2023-4057.html
* https://www.suse.com/security/cve/CVE-2023-4058.html
* https://www.suse.com/security/cve/CVE-2023-4573.html
* https://www.suse.com/security/cve/CVE-2023-4574.html
* https://www.suse.com/security/cve/CVE-2023-4575.html
* https://www.suse.com/security/cve/CVE-2023-4576.html
* https://www.suse.com/security/cve/CVE-2023-4577.html
* https://www.suse.com/security/cve/CVE-2023-4578.html
* https://www.suse.com/security/cve/CVE-2023-4579.html
* https://www.suse.com/security/cve/CVE-2023-4580.html
* https://www.suse.com/security/cve/CVE-2023-4581.html
* https://www.suse.com/security/cve/CVE-2023-4582.html
* https://www.suse.com/security/cve/CVE-2023-4583.html
* https://www.suse.com/security/cve/CVE-2023-4584.html
* https://www.suse.com/security/cve/CVE-2023-4585.html
* https://www.suse.com/security/cve/CVE-2023-4863.html
* https://www.suse.com/security/cve/CVE-2023-5168.html
* https://www.suse.com/security/cve/CVE-2023-5169.html
* https://www.suse.com/security/cve/CVE-2023-5170.html
* https://www.suse.com/security/cve/CVE-2023-5171.html
* https://www.suse.com/security/cve/CVE-2023-5172.html
* https://www.suse.com/security/cve/CVE-2023-5173.html
* https://www.suse.com/security/cve/CVE-2023-5174.html
* https://www.suse.com/security/cve/CVE-2023-5175.html
* https://www.suse.com/security/cve/CVE-2023-5176.html
* https://www.suse.com/security/cve/CVE-2023-5217.html
* https://www.suse.com/security/cve/CVE-2023-5388.html
* https://www.suse.com/security/cve/CVE-2023-5721.html
* https://www.suse.com/security/cve/CVE-2023-5722.html
* https://www.suse.com/security/cve/CVE-2023-5723.html
* https://www.suse.com/security/cve/CVE-2023-5724.html
* https://www.suse.com/security/cve/CVE-2023-5725.html
* https://www.suse.com/security/cve/CVE-2023-5726.html
* https://www.suse.com/security/cve/CVE-2023-5727.html
* https://www.suse.com/security/cve/CVE-2023-5728.html
* https://www.suse.com/security/cve/CVE-2023-5729.html
* https://www.suse.com/security/cve/CVE-2023-5730.html
* https://www.suse.com/security/cve/CVE-2023-5731.html
* https://www.suse.com/security/cve/CVE-2023-6135.html
* https://www.suse.com/security/cve/CVE-2023-6204.html
* https://www.suse.com/security/cve/CVE-2023-6205.html
* https://www.suse.com/security/cve/CVE-2023-6206.html
* https://www.suse.com/security/cve/CVE-2023-6207.html
* https://www.suse.com/security/cve/CVE-2023-6208.html
* https://www.suse.com/security/cve/CVE-2023-6209.html
* https://www.suse.com/security/cve/CVE-2023-6210.html
* https://www.suse.com/security/cve/CVE-2023-6211.html
* https://www.suse.com/security/cve/CVE-2023-6212.html
* https://www.suse.com/security/cve/CVE-2023-6213.html
* https://www.suse.com/security/cve/CVE-2023-6856.html
* https://www.suse.com/security/cve/CVE-2023-6857.html
* https://www.suse.com/security/cve/CVE-2023-6858.html
* https://www.suse.com/security/cve/CVE-2023-6859.html
* https://www.suse.com/security/cve/CVE-2023-6860.html
* https://www.suse.com/security/cve/CVE-2023-6861.html
* https://www.suse.com/security/cve/CVE-2023-6863.html
* https://www.suse.com/security/cve/CVE-2023-6864.html
* https://www.suse.com/security/cve/CVE-2023-6865.html
* https://www.suse.com/security/cve/CVE-2023-6866.html
* https://www.suse.com/security/cve/CVE-2023-6867.html
* https://www.suse.com/security/cve/CVE-2023-6868.html
* https://www.suse.com/security/cve/CVE-2023-6869.html
* https://www.suse.com/security/cve/CVE-2023-6870.html
* https://www.suse.com/security/cve/CVE-2023-6871.html
* https://www.suse.com/security/cve/CVE-2023-6872.html
* https://www.suse.com/security/cve/CVE-2023-6873.html
* https://www.suse.com/security/cve/CVE-2024-0741.html
* https://www.suse.com/security/cve/CVE-2024-0742.html
* https://www.suse.com/security/cve/CVE-2024-0743.html
* https://www.suse.com/security/cve/CVE-2024-0744.html
* https://www.suse.com/security/cve/CVE-2024-0745.html
* https://www.suse.com/security/cve/CVE-2024-0746.html
* https://www.suse.com/security/cve/CVE-2024-0747.html
* https://www.suse.com/security/cve/CVE-2024-0748.html
* https://www.suse.com/security/cve/CVE-2024-0749.html
* https://www.suse.com/security/cve/CVE-2024-0750.html
* https://www.suse.com/security/cve/CVE-2024-0751.html
* https://www.suse.com/security/cve/CVE-2024-0752.html
* https://www.suse.com/security/cve/CVE-2024-0753.html
* https://www.suse.com/security/cve/CVE-2024-0754.html
* https://www.suse.com/security/cve/CVE-2024-0755.html
* https://www.suse.com/security/cve/CVE-2024-10458.html
* https://www.suse.com/security/cve/CVE-2024-10459.html
* https://www.suse.com/security/cve/CVE-2024-10460.html
* https://www.suse.com/security/cve/CVE-2024-10461.html
* https://www.suse.com/security/cve/CVE-2024-10462.html
* https://www.suse.com/security/cve/CVE-2024-10463.html
* https://www.suse.com/security/cve/CVE-2024-10464.html
* https://www.suse.com/security/cve/CVE-2024-10465.html
* https://www.suse.com/security/cve/CVE-2024-10466.html
* https://www.suse.com/security/cve/CVE-2024-10467.html
* https://www.suse.com/security/cve/CVE-2024-11691.html
* https://www.suse.com/security/cve/CVE-2024-11692.html
* https://www.suse.com/security/cve/CVE-2024-11693.html
* https://www.suse.com/security/cve/CVE-2024-11694.html
* https://www.suse.com/security/cve/CVE-2024-11695.html
* https://www.suse.com/security/cve/CVE-2024-11696.html
* https://www.suse.com/security/cve/CVE-2024-11697.html
* https://www.suse.com/security/cve/CVE-2024-11698.html
* https://www.suse.com/security/cve/CVE-2024-11699.html
* https://www.suse.com/security/cve/CVE-2024-1546.html
* https://www.suse.com/security/cve/CVE-2024-1547.html
* https://www.suse.com/security/cve/CVE-2024-1548.html
* https://www.suse.com/security/cve/CVE-2024-1549.html
* https://www.suse.com/security/cve/CVE-2024-1550.html
* https://www.suse.com/security/cve/CVE-2024-1551.html
* https://www.suse.com/security/cve/CVE-2024-1552.html
* https://www.suse.com/security/cve/CVE-2024-1553.html
* https://www.suse.com/security/cve/CVE-2024-1554.html
* https://www.suse.com/security/cve/CVE-2024-1555.html
* https://www.suse.com/security/cve/CVE-2024-1556.html
* https://www.suse.com/security/cve/CVE-2024-1557.html
* https://www.suse.com/security/cve/CVE-2024-2605.html
* https://www.suse.com/security/cve/CVE-2024-2606.html
* https://www.suse.com/security/cve/CVE-2024-2607.html
* https://www.suse.com/security/cve/CVE-2024-2608.html
* https://www.suse.com/security/cve/CVE-2024-2609.html
* https://www.suse.com/security/cve/CVE-2024-2610.html
* https://www.suse.com/security/cve/CVE-2024-2611.html
* https://www.suse.com/security/cve/CVE-2024-2612.html
* https://www.suse.com/security/cve/CVE-2024-2613.html
* https://www.suse.com/security/cve/CVE-2024-2614.html
* https://www.suse.com/security/cve/CVE-2024-2615.html
* https://www.suse.com/security/cve/CVE-2024-29943.html
* https://www.suse.com/security/cve/CVE-2024-29944.html
* https://www.suse.com/security/cve/CVE-2024-3302.html
* https://www.suse.com/security/cve/CVE-2024-3852.html
* https://www.suse.com/security/cve/CVE-2024-3853.html
* https://www.suse.com/security/cve/CVE-2024-3854.html
* https://www.suse.com/security/cve/CVE-2024-3855.html
* https://www.suse.com/security/cve/CVE-2024-3856.html
* https://www.suse.com/security/cve/CVE-2024-3857.html
* https://www.suse.com/security/cve/CVE-2024-3858.html
* https://www.suse.com/security/cve/CVE-2024-3859.html
* https://www.suse.com/security/cve/CVE-2024-3860.html
* https://www.suse.com/security/cve/CVE-2024-3861.html
* https://www.suse.com/security/cve/CVE-2024-3862.html
* https://www.suse.com/security/cve/CVE-2024-3863.html
* https://www.suse.com/security/cve/CVE-2024-3864.html
* https://www.suse.com/security/cve/CVE-2024-3865.html
* https://www.suse.com/security/cve/CVE-2024-4367.html
* https://www.suse.com/security/cve/CVE-2024-4764.html
* https://www.suse.com/security/cve/CVE-2024-4765.html
* https://www.suse.com/security/cve/CVE-2024-4766.html
* https://www.suse.com/security/cve/CVE-2024-4767.html
* https://www.suse.com/security/cve/CVE-2024-4768.html
* https://www.suse.com/security/cve/CVE-2024-4769.html
* https://www.suse.com/security/cve/CVE-2024-4770.html
* https://www.suse.com/security/cve/CVE-2024-4771.html
* https://www.suse.com/security/cve/CVE-2024-4772.html
* https://www.suse.com/security/cve/CVE-2024-4773.html
* https://www.suse.com/security/cve/CVE-2024-4774.html
* https://www.suse.com/security/cve/CVE-2024-4775.html
* https://www.suse.com/security/cve/CVE-2024-4776.html
* https://www.suse.com/security/cve/CVE-2024-4777.html
* https://www.suse.com/security/cve/CVE-2024-4778.html
* https://www.suse.com/security/cve/CVE-2024-5687.html
* https://www.suse.com/security/cve/CVE-2024-5688.html
* https://www.suse.com/security/cve/CVE-2024-5689.html
* https://www.suse.com/security/cve/CVE-2024-5690.html
* https://www.suse.com/security/cve/CVE-2024-5691.html
* https://www.suse.com/security/cve/CVE-2024-5692.html
* https://www.suse.com/security/cve/CVE-2024-5693.html
* https://www.suse.com/security/cve/CVE-2024-5694.html
* https://www.suse.com/security/cve/CVE-2024-5695.html
* https://www.suse.com/security/cve/CVE-2024-5696.html
* https://www.suse.com/security/cve/CVE-2024-5697.html
* https://www.suse.com/security/cve/CVE-2024-5698.html
* https://www.suse.com/security/cve/CVE-2024-5699.html
* https://www.suse.com/security/cve/CVE-2024-5700.html
* https://www.suse.com/security/cve/CVE-2024-5701.html
* https://www.suse.com/security/cve/CVE-2024-6600.html
* https://www.suse.com/security/cve/CVE-2024-6601.html
* https://www.suse.com/security/cve/CVE-2024-6602.html
* https://www.suse.com/security/cve/CVE-2024-6603.html
* https://www.suse.com/security/cve/CVE-2024-6604.html
* https://www.suse.com/security/cve/CVE-2024-6605.html
* https://www.suse.com/security/cve/CVE-2024-6606.html
* https://www.suse.com/security/cve/CVE-2024-6607.html
* https://www.suse.com/security/cve/CVE-2024-6608.html
* https://www.suse.com/security/cve/CVE-2024-6609.html
* https://www.suse.com/security/cve/CVE-2024-6610.html
* https://www.suse.com/security/cve/CVE-2024-6611.html
* https://www.suse.com/security/cve/CVE-2024-6612.html
* https://www.suse.com/security/cve/CVE-2024-6613.html
* https://www.suse.com/security/cve/CVE-2024-6614.html
* https://www.suse.com/security/cve/CVE-2024-6615.html
* https://www.suse.com/security/cve/CVE-2024-7518.html
* https://www.suse.com/security/cve/CVE-2024-7519.html
* https://www.suse.com/security/cve/CVE-2024-7520.html
* https://www.suse.com/security/cve/CVE-2024-7521.html
* https://www.suse.com/security/cve/CVE-2024-7522.html
* https://www.suse.com/security/cve/CVE-2024-7524.html
* https://www.suse.com/security/cve/CVE-2024-7525.html
* https://www.suse.com/security/cve/CVE-2024-7526.html
* https://www.suse.com/security/cve/CVE-2024-7527.html
* https://www.suse.com/security/cve/CVE-2024-7528.html
* https://www.suse.com/security/cve/CVE-2024-7529.html
* https://www.suse.com/security/cve/CVE-2024-7531.html
* https://www.suse.com/security/cve/CVE-2024-8381.html
* https://www.suse.com/security/cve/CVE-2024-8382.html
* https://www.suse.com/security/cve/CVE-2024-8383.html
* https://www.suse.com/security/cve/CVE-2024-8384.html
* https://www.suse.com/security/cve/CVE-2024-8385.html
* https://www.suse.com/security/cve/CVE-2024-8386.html
* https://www.suse.com/security/cve/CVE-2024-8387.html
* https://www.suse.com/security/cve/CVE-2024-8900.html
* https://www.suse.com/security/cve/CVE-2024-9392.html
* https://www.suse.com/security/cve/CVE-2024-9393.html
* https://www.suse.com/security/cve/CVE-2024-9394.html
* https://www.suse.com/security/cve/CVE-2024-9396.html
* https://www.suse.com/security/cve/CVE-2024-9397.html
* https://www.suse.com/security/cve/CVE-2024-9398.html
* https://www.suse.com/security/cve/CVE-2024-9399.html
* https://www.suse.com/security/cve/CVE-2024-9400.html
* https://www.suse.com/security/cve/CVE-2024-9401.html
* https://www.suse.com/security/cve/CVE-2024-9402.html
* https://www.suse.com/security/cve/CVE-2024-9680.html



SUSE-SU-2024:4315-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4315-1
Release Date: 2024-12-13T15:23:51Z
Rating: important
References:

* bsc#1082555
* bsc#1194869
* bsc#1218644
* bsc#1220382
* bsc#1221309
* bsc#1221333
* bsc#1222364
* bsc#1222590
* bsc#1223202
* bsc#1223656
* bsc#1223848
* bsc#1223919
* bsc#1223942
* bsc#1224518
* bsc#1224526
* bsc#1224574
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225812
* bsc#1226560
* bsc#1226592
* bsc#1226631
* bsc#1226748
* bsc#1226872
* bsc#1227853
* bsc#1228410
* bsc#1228430
* bsc#1228486
* bsc#1228650
* bsc#1228857
* bsc#1229312
* bsc#1229429
* bsc#1229585
* bsc#1229752
* bsc#1229808
* bsc#1230055
* bsc#1230220
* bsc#1230231
* bsc#1230270
* bsc#1230558
* bsc#1230827
* bsc#1230918
* bsc#1231083
* bsc#1231089
* bsc#1231098
* bsc#1231101
* bsc#1231108
* bsc#1231111
* bsc#1231132
* bsc#1231135
* bsc#1231138
* bsc#1231169
* bsc#1231178
* bsc#1231180
* bsc#1231181
* bsc#1231187
* bsc#1231202
* bsc#1231434
* bsc#1231441
* bsc#1231452
* bsc#1231465
* bsc#1231474
* bsc#1231481
* bsc#1231537
* bsc#1231541
* bsc#1231646
* bsc#1231849
* bsc#1231856
* bsc#1231858
* bsc#1231859
* bsc#1231864
* bsc#1231904
* bsc#1231916
* bsc#1231920
* bsc#1231923
* bsc#1231930
* bsc#1231931
* bsc#1231947
* bsc#1231952
* bsc#1231953
* bsc#1231959
* bsc#1231978
* bsc#1232013
* bsc#1232015
* bsc#1232016
* bsc#1232017
* bsc#1232027
* bsc#1232028
* bsc#1232047
* bsc#1232048
* bsc#1232050
* bsc#1232056
* bsc#1232076
* bsc#1232080
* bsc#1232094
* bsc#1232096
* bsc#1232098
* bsc#1232111
* bsc#1232126
* bsc#1232134
* bsc#1232135
* bsc#1232141
* bsc#1232142
* bsc#1232147
* bsc#1232152
* bsc#1232159
* bsc#1232162
* bsc#1232165
* bsc#1232180
* bsc#1232185
* bsc#1232187
* bsc#1232189
* bsc#1232195
* bsc#1232198
* bsc#1232201
* bsc#1232218
* bsc#1232224
* bsc#1232232
* bsc#1232254
* bsc#1232255
* bsc#1232264
* bsc#1232272
* bsc#1232279
* bsc#1232287
* bsc#1232293
* bsc#1232312
* bsc#1232317
* bsc#1232318
* bsc#1232333
* bsc#1232334
* bsc#1232335
* bsc#1232339
* bsc#1232349
* bsc#1232357
* bsc#1232359
* bsc#1232362
* bsc#1232364
* bsc#1232370
* bsc#1232371
* bsc#1232378
* bsc#1232385
* bsc#1232387
* bsc#1232394
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232483
* bsc#1232500
* bsc#1232503
* bsc#1232504
* bsc#1232507
* bsc#1232520
* bsc#1232552
* bsc#1232757
* bsc#1232819
* bsc#1232860
* bsc#1232870
* bsc#1232873
* bsc#1232877
* bsc#1232878
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232919
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233035
* bsc#1233049
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233117
* bsc#1233123
* bsc#1233125
* bsc#1233129
* bsc#1233130
* bsc#1233134
* bsc#1233135
* bsc#1233150
* bsc#1233189
* bsc#1233191
* bsc#1233197
* bsc#1233205
* bsc#1233206
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233214
* bsc#1233216
* bsc#1233238
* bsc#1233241
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233350
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233528
* bsc#1233548
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233570
* bsc#1233577
* bsc#1233580
* bsc#1233977
* bsc#1234012
* bsc#1234025
* bsc#1234085
* bsc#1234093
* bsc#1234098
* bsc#1234108

Cross-References:

* CVE-2021-47594
* CVE-2022-48674
* CVE-2022-48979
* CVE-2022-48982
* CVE-2022-48983
* CVE-2022-48989
* CVE-2022-48990
* CVE-2023-52915
* CVE-2023-52917
* CVE-2023-52918
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26782
* CVE-2024-26906
* CVE-2024-26953
* CVE-2024-35888
* CVE-2024-35937
* CVE-2024-35980
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36953
* CVE-2024-36954
* CVE-2024-38577
* CVE-2024-38589
* CVE-2024-38615
* CVE-2024-40997
* CVE-2024-41016
* CVE-2024-41023
* CVE-2024-41049
* CVE-2024-42131
* CVE-2024-43817
* CVE-2024-43897
* CVE-2024-44932
* CVE-2024-44964
* CVE-2024-44995
* CVE-2024-46681
* CVE-2024-46800
* CVE-2024-46802
* CVE-2024-46804
* CVE-2024-46805
* CVE-2024-46807
* CVE-2024-46810
* CVE-2024-46812
* CVE-2024-46819
* CVE-2024-46821
* CVE-2024-46835
* CVE-2024-46842
* CVE-2024-46853
* CVE-2024-46859
* CVE-2024-46864
* CVE-2024-46871
* CVE-2024-47663
* CVE-2024-47665
* CVE-2024-47667
* CVE-2024-47669
* CVE-2024-47670
* CVE-2024-47671
* CVE-2024-47679
* CVE-2024-47682
* CVE-2024-47693
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47701
* CVE-2024-47709
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47718
* CVE-2024-47723
* CVE-2024-47728
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47742
* CVE-2024-47745
* CVE-2024-47749
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49852
* CVE-2024-49855
* CVE-2024-49861
* CVE-2024-49863
* CVE-2024-49868
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49875
* CVE-2024-49877
* CVE-2024-49879
* CVE-2024-49884
* CVE-2024-49891
* CVE-2024-49900
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49905
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49921
* CVE-2024-49924
* CVE-2024-49925
* CVE-2024-49934
* CVE-2024-49935
* CVE-2024-49938
* CVE-2024-49945
* CVE-2024-49947
* CVE-2024-49950
* CVE-2024-49957
* CVE-2024-49963
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49968
* CVE-2024-49981
* CVE-2024-49983
* CVE-2024-49985
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50009
* CVE-2024-50013
* CVE-2024-50017
* CVE-2024-50025
* CVE-2024-50026
* CVE-2024-50031
* CVE-2024-50044
* CVE-2024-50062
* CVE-2024-50067
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50077
* CVE-2024-50078
* CVE-2024-50082
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50138
* CVE-2024-50141
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50160
* CVE-2024-50167
* CVE-2024-50171
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50215
* CVE-2024-50218
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50249
* CVE-2024-50255
* CVE-2024-50259
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53052
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53079
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53104
* CVE-2024-53110

CVSS scores:

* CVE-2021-47594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48674 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48979 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48990 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48990 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52917 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46804 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46805 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46871 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47667 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47669 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47693 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47695 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49861 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49870 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49875 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49902 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49903 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49924 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50008 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50259 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5

An update that solves 230 vulnerabilities and has 33 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
(bsc#1226560).
* CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
(bsc#1231959).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26906: Fixed invalid vsyscall page read for
copy_from_kernel_nofault() (bsc#1223202).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
(bsc#1224526).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
* CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
(bsc#1227853).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
* CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
reset (bsc#1230220).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47745: mm: call the security_mmap_file() LSM hook in
remap_file_pages() (bsc#1232135).
* CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete()
(bsc#1232187).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
(bsc#1232520).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during
module unload (bsc#1232877).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too
(bsc#1232884).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
vbva_mouse_pointer_shape (bsc#1232890).
* CVE-2024-50135: nvme-pci: fix race condition between reset and
nvme_dev_disable() (bsc#1232888).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure
(bsc#1233056).
* CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber
(bsc#1233107).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50195: posix-clock: Fix missing timespec64 check in
pc_clock_settime() (bsc#1233103).
* CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts
(bsc#1233113).
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
(bsc#1233117).
* CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks
(bsc#1233205).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
nsim_nexthop_bucket_activity_write() (bsc#1233214).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk
(bsc#1233456).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start
write (bsc#1233548).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).
* CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
scmi_bus_notifier() (bsc#1233561).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53088: i40e: fix race condition by adding filter's intermediate
sync state (bsc#1233580).
* CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).

The following non-security bugs were fixed:

* Drop OCFS2 patch causing a regression (bsc#1233255)
* Fix regression on AMDGPU driver (bsc#1233134)
* Removed the duplicated check of static_assert(sizeof(struct work_struct) >=
sizeof(struct rcu_head)).
* Removed unnecessary white-space change in kernel/bpf/syscall.c
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI"
(git-fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* acpi: CPPC: Fix _CPC register setting issue (git-fixes).
* acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
* acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
detection issue (stable-fixes).
* acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed
with "suse_" to make it more obvious its a downstream thing.
* add bugreference to a hv_netvsc patch (bsc#1232413).
* add commit message for the kABI patch
* alsa: 6fire: Release resources at card release (git-fixes).
* alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
* alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
fixes).
* alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
* alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
* alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
* alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
* alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
* arm64: Force position-independent veneers (git-fixes).
* arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
* asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).
* asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
* asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
* asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
fixes).
* asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
* block: Avoid leaking hctx->nr_active counter on batched completion
(bsc#1231923).
* bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
* bnxt_en: Fix the PCI-AER routines (git-fixes).
* bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
* bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
(git-fixes).
* bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
* bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
* bnxt_en: Wait for FLR to complete during probe (git-fixes).
* bnxt_en: refactor reset close code (git-fixes).
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* chtls: fix tp->rcv_tstamp initialization (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxgb4: Properly lock TX queue for the selftest (git-fixes).
* cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
* cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
fixes).
* drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-
fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
VLA (stable-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* e1000e: Fix S0ix residency on corporate systems (git-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gve: Fix XDP TX completion handling when counters overflow (git-fixes).
* gve: Fix an edge case for TSO skb validity check (git-fixes).
* gve: Fix skb truesize underestimation (git-fixes).
* gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
fixes).
* hid: core: zero-initialize the report buffer (git-fixes).
* hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* hid: multitouch: Add support for B2402FVA track point (stable-fixes).
* hid: wacom: Defer calculation of resolution until resolution_code is known
(git-fixes).
* hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* hid: wacom: fix when get product name maybe null pointer (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i40e: Fix XDP program unloading while removing the driver (git-fixes).
* i40e: Fix filter input checks to prevent config with invalid values (git-
fixes).
* i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
* i40e: Report MFS in decimal base instead of hex (git-fixes).
* i40e: Restore VF MSI-X state during PCI reset (git-fixes).
* i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
* i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
fixes).
* i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
* i40e: take into account XDP Tx queues when stopping rings (git-fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
* iavf: Fix promiscuous mode configuration flow messages (git-fixes).
* iavf: Introduce new state machines for flow director (git-fixes).
* iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-
fixes).
* iavf: fix FDIR rule fields masks validation (git-fixes).
* iavf: in iavf_down, disable queues when removing the driver (git-fixes).
* iavf: initialize waitqueues before starting watchdog_task (git-fixes).
* iavf: send VLAN offloading caps once after VFR (git-fixes).
* iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-
fixes).
* ibmvnic: Do partial reset on login failure (bsc#1233150).
* ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
* ibmvnic: Ensure login failure recovery is safe from other resets
(bsc#1233150).
* ibmvnic: Handle DMA unmapping of login buffs in release functions
(bsc#1233150).
* ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
* ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
* ice: Fix NULL pointer deref during VF reset (git-fixes).
* ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
* ice: Fix link_down_on_close message (git-fixes).
* ice: Fix netif_is_ice() in Safe Mode (git-fixes).
* ice: Interpret .set_channels() input differently (git-fixes).
* ice: Shut down VSI with "link-down-on-close" enabled (git-fixes).
* ice: avoid executing commands on other ports when driving sync (git-fixes).
* ice: change q_index variable type to s16 to store -1 value (git-fixes).
* ice: fix ICE_LAST_OFFSET formula (git-fixes).
* ice: fix VLAN replay after reset (git-fixes).
* ice: fix accounting for filters shared by multiple VSIs (git-fixes).
* ice: fix accounting if a VLAN already exists (git-fixes).
* ice: fix over-shifted variable (git-fixes).
* ice: fix receive buffer size miscalculation (git-fixes).
* ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-
fixes).
* ice: reset first in crash dump kernels (git-fixes).
* ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
* ice: tc: allow zero flags in parsing tc flower (git-fixes).
* ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
fixes).
* idpf: Interpret .set_channels() input differently (git-fixes).
* idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-
fixes).
* idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
* idpf: disable local BH when scheduling napi for marker packets (git-fixes).
* idpf: distinguish vports by the dev_port attribute (git-fixes).
* idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
fixes).
* idpf: fix UAFs when destroying the queues (git-fixes).
* idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
* idpf: fix memleak in vport interrupt configuration (git-fixes).
* idpf: fix memory leaks and crashes while performing a soft reset (git-
fixes).
* igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
* igb: Fix missing time sync events (git-fixes).
* igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
* igb: extend PTP timestamp adjustments to i211 (git-fixes).
* igc: Check VLAN EtherType mask (git-fixes).
* igc: Check VLAN TCI mask (git-fixes).
* igc: Fix hicredit calculation (git-fixes).
* igc: Fix missing time sync events (git-fixes).
* igc: Remove temporary workaround (git-fixes).
* igc: Report VLAN EtherType matching back to user (git-fixes).
* igc: Unlock on error in igc_io_resume() (git-fixes).
* iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* iio: light: veml6030: fix microlux value calculation (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
* input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
* input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
(git-fixes).
* input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-
fixes).
* input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
(git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
fixes).
* ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
* ixgbe: fix crash with empty VF macvlan list (git-fixes).
* ixgbe: fix timestamp configuration code (git-fixes).
* ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
* kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
* kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
* mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer
(stable-fixes).
* media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* mei: use kvmalloc for read buffer (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm/memory: add non-anonymous page check in the copy_present_page()
(bsc#1231646).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
fixes).
* net/mlx5: Added cond_resched() to crdump collection (git-fixes).
* net/mlx5: Allow 0 for total host VFs (git-fixes).
* net/mlx5: Correctly compare pkt reformat ids (git-fixes).
* net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
* net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
* net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
* net/mlx5: Drain health before unregistering devlink (git-fixes).
* net/mlx5: E-switch, register event handler before arming the event (git-
fixes).
* net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
* net/mlx5: Fix fw tracer first block check (git-fixes).
* net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
* net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
* net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
* net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
* net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
(git-fixes).
* net/mlx5: Skip clock update work when device is in error state (git-fixes).
* net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
* net/mlx5: Update the list of the PCI supported devices (git-fixes).
* net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
* net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO
(git-fixes).
* net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
* net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
* net/mlx5: fs, lock FTE when checking if active (git-fixes).
* net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
(git-fixes).
* net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
* net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
fixes).
* net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
* net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
* net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
* net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer for
representors (git-fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-
fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer used
by representors (git-fixes).
* net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
* net/mlx5e: Do not offload internal port if filter device is out device (git-
fixes).
* net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
* net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
* net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set
(git-fixes).
* net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).
* net/mlx5e: Fix pedit endianness (git-fixes).
* net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
* net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-
fixes).
* net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
* net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
* net/mlx5e: Reduce the size of icosq_str (git-fixes).
* net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
* net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
exhaustion (git-fixes).
* net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
* net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-
fixes).
* net/mlx5e: fix double free of encap_header (git-fixes).
* net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-
fixes).
* net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
* net: ena: Fix potential sign extension issue (git-fixes).
* net: ena: Remove ena_select_queue (git-fixes).
* net: ena: Wrong missing IO completions check order (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: usb: usbnet: fix race in probe failure (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* pci: Add T_PVPERL macro (git-fixes).
* pci: Fix reset_method_store() memory leak (git-fixes).
* pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* pci: rockchip-ep: Fix address translation unit programming (git-fixes).
* phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/surface: aggregator: Fix warning when controller is destroyed in
probe (git-fixes).
* platform/x86: dell-sysman: add support for alienware products (stable-
fixes).
* platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
* qed: avoid truncating work queue length (git-fixes).
* rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* rdma/hns: Add clear_hem return value to log (git-fixes)
* rdma/hns: Add mutex_destroy() (git-fixes)
* rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* rdma/hns: Remove unnecessary QP type checks (git-fixes)
* rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* rdma/hns: Use macro instead of magic number (git-fixes)
* rdma/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
fixes).
* rdma/rxe: Fix the qp flush warnings in req (git-fixes)
* rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* sfc: Check firmware supports Ethernet PTP filter (git-fixes).
* sfc: do not unregister flow_indr if it was never registered (git-fixes).
* sfc: fix a double-free bug in efx_probe_filters (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
* tun: prevent negative ifindex (git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* usb: chaoskey: fail open after removal (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
* usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* usb: serial: option: add Quectel RG650V (stable-fixes).
* usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* usbip: tools: Fix detach_port() invalid port error path (git-fixes).
* vdpa/mlx5: preserve CVQ vringh index (git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: Fix memory leak in management tx (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
(git-fixes).
* wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-
fixes).
* wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
(git-fixes).
* wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* x86/kvm: fix is_stale_page_fault() (bsc#1221333).
* xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
* xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
* xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-4315=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4315=1 openSUSE-SLE-15.5-2024-4315=1

* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4315=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4315=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4315=1

## Package List:

* SUSE Real Time Module 15-SP5 (x86_64)
* kernel-rt_debug-vdso-5.14.21-150500.13.79.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-syms-rt-5.14.21-150500.13.79.1
* gfs2-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-5.14.21-150500.13.79.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.79.1
* kernel-source-rt-5.14.21-150500.13.79.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.79.1
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.79.1
* kernel-source-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-extra-5.14.21-150500.13.79.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-livepatch-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-5.14.21-150500.13.79.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
* kernel-rt-optional-5.14.21-150500.13.79.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.79.1
* reiserfs-kmp-rt-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
* gfs2-kmp-rt-5.14.21-150500.13.79.1
* kernel-syms-rt-5.14.21-150500.13.79.1
* kselftests-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.79.1
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
* kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47594.html
* https://www.suse.com/security/cve/CVE-2022-48674.html
* https://www.suse.com/security/cve/CVE-2022-48979.html
* https://www.suse.com/security/cve/CVE-2022-48982.html
* https://www.suse.com/security/cve/CVE-2022-48983.html
* https://www.suse.com/security/cve/CVE-2022-48989.html
* https://www.suse.com/security/cve/CVE-2022-48990.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-35937.html
* https://www.suse.com/security/cve/CVE-2024-35980.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36953.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-38577.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-38615.html
* https://www.suse.com/security/cve/CVE-2024-40997.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-41049.html
* https://www.suse.com/security/cve/CVE-2024-42131.html
* https://www.suse.com/security/cve/CVE-2024-43817.html
* https://www.suse.com/security/cve/CVE-2024-43897.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46804.html
* https://www.suse.com/security/cve/CVE-2024-46805.html
* https://www.suse.com/security/cve/CVE-2024-46807.html
* https://www.suse.com/security/cve/CVE-2024-46810.html
* https://www.suse.com/security/cve/CVE-2024-46812.html
* https://www.suse.com/security/cve/CVE-2024-46819.html
* https://www.suse.com/security/cve/CVE-2024-46821.html
* https://www.suse.com/security/cve/CVE-2024-46835.html
* https://www.suse.com/security/cve/CVE-2024-46842.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://www.suse.com/security/cve/CVE-2024-46864.html
* https://www.suse.com/security/cve/CVE-2024-46871.html
* https://www.suse.com/security/cve/CVE-2024-47663.html
* https://www.suse.com/security/cve/CVE-2024-47665.html
* https://www.suse.com/security/cve/CVE-2024-47667.html
* https://www.suse.com/security/cve/CVE-2024-47669.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50259.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1221333
* https://bugzilla.suse.com/show_bug.cgi?id=1222364
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1223919
* https://bugzilla.suse.com/show_bug.cgi?id=1223942
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224526
* https://bugzilla.suse.com/show_bug.cgi?id=1224574
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225812
* https://bugzilla.suse.com/show_bug.cgi?id=1226560
* https://bugzilla.suse.com/show_bug.cgi?id=1226592
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227853
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228486
* https://bugzilla.suse.com/show_bug.cgi?id=1228650
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229752
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231098
* https://bugzilla.suse.com/show_bug.cgi?id=1231101
* https://bugzilla.suse.com/show_bug.cgi?id=1231108
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231132
* https://bugzilla.suse.com/show_bug.cgi?id=1231135
* https://bugzilla.suse.com/show_bug.cgi?id=1231138
* https://bugzilla.suse.com/show_bug.cgi?id=1231169
* https://bugzilla.suse.com/show_bug.cgi?id=1231178
* https://bugzilla.suse.com/show_bug.cgi?id=1231180
* https://bugzilla.suse.com/show_bug.cgi?id=1231181
* https://bugzilla.suse.com/show_bug.cgi?id=1231187
* https://bugzilla.suse.com/show_bug.cgi?id=1231202
* https://bugzilla.suse.com/show_bug.cgi?id=1231434
* https://bugzilla.suse.com/show_bug.cgi?id=1231441
* https://bugzilla.suse.com/show_bug.cgi?id=1231452
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231474
* https://bugzilla.suse.com/show_bug.cgi?id=1231481
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231541
* https://bugzilla.suse.com/show_bug.cgi?id=1231646
* https://bugzilla.suse.com/show_bug.cgi?id=1231849
* https://bugzilla.suse.com/show_bug.cgi?id=1231856
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231904
* https://bugzilla.suse.com/show_bug.cgi?id=1231916
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231923
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231931
* https://bugzilla.suse.com/show_bug.cgi?id=1231947
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1231953
* https://bugzilla.suse.com/show_bug.cgi?id=1231959
* https://bugzilla.suse.com/show_bug.cgi?id=1231978
* https://bugzilla.suse.com/show_bug.cgi?id=1232013
* https://bugzilla.suse.com/show_bug.cgi?id=1232015
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232017
* https://bugzilla.suse.com/show_bug.cgi?id=1232027
* https://bugzilla.suse.com/show_bug.cgi?id=1232028
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232050
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232076
* https://bugzilla.suse.com/show_bug.cgi?id=1232080
* https://bugzilla.suse.com/show_bug.cgi?id=1232094
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232098
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232162
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232185
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232189
* https://bugzilla.suse.com/show_bug.cgi?id=1232195
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232232
* https://bugzilla.suse.com/show_bug.cgi?id=1232254
* https://bugzilla.suse.com/show_bug.cgi?id=1232255
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232279
* https://bugzilla.suse.com/show_bug.cgi?id=1232287
* https://bugzilla.suse.com/show_bug.cgi?id=1232293
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232317
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232333
* https://bugzilla.suse.com/show_bug.cgi?id=1232334
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232349
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232359
* https://bugzilla.suse.com/show_bug.cgi?id=1232362
* https://bugzilla.suse.com/show_bug.cgi?id=1232364
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232378
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232503
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232507
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232552
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233134
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233150
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233214
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233528
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108