SUSE-SU-2024:4315-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Fri Dec 13 16:33:29 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4315-1  
Release Date: 2024-12-13T15:23:51Z  
Rating: important  
References:

  * bsc#1082555
  * bsc#1194869
  * bsc#1218644
  * bsc#1220382
  * bsc#1221309
  * bsc#1221333
  * bsc#1222364
  * bsc#1222590
  * bsc#1223202
  * bsc#1223656
  * bsc#1223848
  * bsc#1223919
  * bsc#1223942
  * bsc#1224518
  * bsc#1224526
  * bsc#1224574
  * bsc#1225725
  * bsc#1225730
  * bsc#1225742
  * bsc#1225764
  * bsc#1225812
  * bsc#1226560
  * bsc#1226592
  * bsc#1226631
  * bsc#1226748
  * bsc#1226872
  * bsc#1227853
  * bsc#1228410
  * bsc#1228430
  * bsc#1228486
  * bsc#1228650
  * bsc#1228857
  * bsc#1229312
  * bsc#1229429
  * bsc#1229585
  * bsc#1229752
  * bsc#1229808
  * bsc#1230055
  * bsc#1230220
  * bsc#1230231
  * bsc#1230270
  * bsc#1230558
  * bsc#1230827
  * bsc#1230918
  * bsc#1231083
  * bsc#1231089
  * bsc#1231098
  * bsc#1231101
  * bsc#1231108
  * bsc#1231111
  * bsc#1231132
  * bsc#1231135
  * bsc#1231138
  * bsc#1231169
  * bsc#1231178
  * bsc#1231180
  * bsc#1231181
  * bsc#1231187
  * bsc#1231202
  * bsc#1231434
  * bsc#1231441
  * bsc#1231452
  * bsc#1231465
  * bsc#1231474
  * bsc#1231481
  * bsc#1231537
  * bsc#1231541
  * bsc#1231646
  * bsc#1231849
  * bsc#1231856
  * bsc#1231858
  * bsc#1231859
  * bsc#1231864
  * bsc#1231904
  * bsc#1231916
  * bsc#1231920
  * bsc#1231923
  * bsc#1231930
  * bsc#1231931
  * bsc#1231947
  * bsc#1231952
  * bsc#1231953
  * bsc#1231959
  * bsc#1231978
  * bsc#1232013
  * bsc#1232015
  * bsc#1232016
  * bsc#1232017
  * bsc#1232027
  * bsc#1232028
  * bsc#1232047
  * bsc#1232048
  * bsc#1232050
  * bsc#1232056
  * bsc#1232076
  * bsc#1232080
  * bsc#1232094
  * bsc#1232096
  * bsc#1232098
  * bsc#1232111
  * bsc#1232126
  * bsc#1232134
  * bsc#1232135
  * bsc#1232141
  * bsc#1232142
  * bsc#1232147
  * bsc#1232152
  * bsc#1232159
  * bsc#1232162
  * bsc#1232165
  * bsc#1232180
  * bsc#1232185
  * bsc#1232187
  * bsc#1232189
  * bsc#1232195
  * bsc#1232198
  * bsc#1232201
  * bsc#1232218
  * bsc#1232224
  * bsc#1232232
  * bsc#1232254
  * bsc#1232255
  * bsc#1232264
  * bsc#1232272
  * bsc#1232279
  * bsc#1232287
  * bsc#1232293
  * bsc#1232312
  * bsc#1232317
  * bsc#1232318
  * bsc#1232333
  * bsc#1232334
  * bsc#1232335
  * bsc#1232339
  * bsc#1232349
  * bsc#1232357
  * bsc#1232359
  * bsc#1232362
  * bsc#1232364
  * bsc#1232370
  * bsc#1232371
  * bsc#1232378
  * bsc#1232385
  * bsc#1232387
  * bsc#1232394
  * bsc#1232413
  * bsc#1232416
  * bsc#1232436
  * bsc#1232483
  * bsc#1232500
  * bsc#1232503
  * bsc#1232504
  * bsc#1232507
  * bsc#1232520
  * bsc#1232552
  * bsc#1232757
  * bsc#1232819
  * bsc#1232860
  * bsc#1232870
  * bsc#1232873
  * bsc#1232877
  * bsc#1232878
  * bsc#1232881
  * bsc#1232884
  * bsc#1232885
  * bsc#1232887
  * bsc#1232888
  * bsc#1232890
  * bsc#1232892
  * bsc#1232896
  * bsc#1232897
  * bsc#1232905
  * bsc#1232907
  * bsc#1232919
  * bsc#1232926
  * bsc#1232928
  * bsc#1232935
  * bsc#1233035
  * bsc#1233049
  * bsc#1233051
  * bsc#1233056
  * bsc#1233057
  * bsc#1233061
  * bsc#1233063
  * bsc#1233065
  * bsc#1233067
  * bsc#1233070
  * bsc#1233073
  * bsc#1233074
  * bsc#1233100
  * bsc#1233103
  * bsc#1233104
  * bsc#1233105
  * bsc#1233106
  * bsc#1233107
  * bsc#1233108
  * bsc#1233110
  * bsc#1233111
  * bsc#1233113
  * bsc#1233114
  * bsc#1233117
  * bsc#1233123
  * bsc#1233125
  * bsc#1233129
  * bsc#1233130
  * bsc#1233134
  * bsc#1233135
  * bsc#1233150
  * bsc#1233189
  * bsc#1233191
  * bsc#1233197
  * bsc#1233205
  * bsc#1233206
  * bsc#1233209
  * bsc#1233210
  * bsc#1233211
  * bsc#1233212
  * bsc#1233214
  * bsc#1233216
  * bsc#1233238
  * bsc#1233241
  * bsc#1233253
  * bsc#1233255
  * bsc#1233293
  * bsc#1233350
  * bsc#1233452
  * bsc#1233453
  * bsc#1233454
  * bsc#1233456
  * bsc#1233457
  * bsc#1233458
  * bsc#1233460
  * bsc#1233462
  * bsc#1233463
  * bsc#1233468
  * bsc#1233471
  * bsc#1233476
  * bsc#1233478
  * bsc#1233479
  * bsc#1233481
  * bsc#1233484
  * bsc#1233487
  * bsc#1233490
  * bsc#1233491
  * bsc#1233528
  * bsc#1233548
  * bsc#1233552
  * bsc#1233553
  * bsc#1233554
  * bsc#1233555
  * bsc#1233557
  * bsc#1233560
  * bsc#1233561
  * bsc#1233570
  * bsc#1233577
  * bsc#1233580
  * bsc#1233977
  * bsc#1234012
  * bsc#1234025
  * bsc#1234085
  * bsc#1234093
  * bsc#1234098
  * bsc#1234108

  
Cross-References:

  * CVE-2021-47594
  * CVE-2022-48674
  * CVE-2022-48979
  * CVE-2022-48982
  * CVE-2022-48983
  * CVE-2022-48989
  * CVE-2022-48990
  * CVE-2023-52915
  * CVE-2023-52917
  * CVE-2023-52918
  * CVE-2023-52921
  * CVE-2023-52922
  * CVE-2024-26782
  * CVE-2024-26906
  * CVE-2024-26953
  * CVE-2024-35888
  * CVE-2024-35937
  * CVE-2024-35980
  * CVE-2024-36484
  * CVE-2024-36883
  * CVE-2024-36886
  * CVE-2024-36905
  * CVE-2024-36953
  * CVE-2024-36954
  * CVE-2024-38577
  * CVE-2024-38589
  * CVE-2024-38615
  * CVE-2024-40997
  * CVE-2024-41016
  * CVE-2024-41023
  * CVE-2024-41049
  * CVE-2024-42131
  * CVE-2024-43817
  * CVE-2024-43897
  * CVE-2024-44932
  * CVE-2024-44964
  * CVE-2024-44995
  * CVE-2024-46681
  * CVE-2024-46800
  * CVE-2024-46802
  * CVE-2024-46804
  * CVE-2024-46805
  * CVE-2024-46807
  * CVE-2024-46810
  * CVE-2024-46812
  * CVE-2024-46819
  * CVE-2024-46821
  * CVE-2024-46835
  * CVE-2024-46842
  * CVE-2024-46853
  * CVE-2024-46859
  * CVE-2024-46864
  * CVE-2024-46871
  * CVE-2024-47663
  * CVE-2024-47665
  * CVE-2024-47667
  * CVE-2024-47669
  * CVE-2024-47670
  * CVE-2024-47671
  * CVE-2024-47679
  * CVE-2024-47682
  * CVE-2024-47693
  * CVE-2024-47695
  * CVE-2024-47696
  * CVE-2024-47697
  * CVE-2024-47698
  * CVE-2024-47699
  * CVE-2024-47701
  * CVE-2024-47709
  * CVE-2024-47712
  * CVE-2024-47713
  * CVE-2024-47718
  * CVE-2024-47723
  * CVE-2024-47728
  * CVE-2024-47735
  * CVE-2024-47737
  * CVE-2024-47742
  * CVE-2024-47745
  * CVE-2024-47749
  * CVE-2024-47756
  * CVE-2024-47757
  * CVE-2024-49850
  * CVE-2024-49851
  * CVE-2024-49852
  * CVE-2024-49855
  * CVE-2024-49861
  * CVE-2024-49863
  * CVE-2024-49868
  * CVE-2024-49870
  * CVE-2024-49871
  * CVE-2024-49875
  * CVE-2024-49877
  * CVE-2024-49879
  * CVE-2024-49884
  * CVE-2024-49891
  * CVE-2024-49900
  * CVE-2024-49902
  * CVE-2024-49903
  * CVE-2024-49905
  * CVE-2024-49907
  * CVE-2024-49908
  * CVE-2024-49921
  * CVE-2024-49924
  * CVE-2024-49925
  * CVE-2024-49934
  * CVE-2024-49935
  * CVE-2024-49938
  * CVE-2024-49945
  * CVE-2024-49947
  * CVE-2024-49950
  * CVE-2024-49957
  * CVE-2024-49963
  * CVE-2024-49965
  * CVE-2024-49966
  * CVE-2024-49968
  * CVE-2024-49981
  * CVE-2024-49983
  * CVE-2024-49985
  * CVE-2024-49989
  * CVE-2024-50003
  * CVE-2024-50007
  * CVE-2024-50008
  * CVE-2024-50009
  * CVE-2024-50013
  * CVE-2024-50017
  * CVE-2024-50025
  * CVE-2024-50026
  * CVE-2024-50031
  * CVE-2024-50044
  * CVE-2024-50062
  * CVE-2024-50067
  * CVE-2024-50073
  * CVE-2024-50074
  * CVE-2024-50077
  * CVE-2024-50078
  * CVE-2024-50082
  * CVE-2024-50089
  * CVE-2024-50093
  * CVE-2024-50095
  * CVE-2024-50096
  * CVE-2024-50098
  * CVE-2024-50099
  * CVE-2024-50103
  * CVE-2024-50108
  * CVE-2024-50110
  * CVE-2024-50115
  * CVE-2024-50116
  * CVE-2024-50117
  * CVE-2024-50124
  * CVE-2024-50125
  * CVE-2024-50127
  * CVE-2024-50128
  * CVE-2024-50131
  * CVE-2024-50134
  * CVE-2024-50135
  * CVE-2024-50138
  * CVE-2024-50141
  * CVE-2024-50146
  * CVE-2024-50147
  * CVE-2024-50148
  * CVE-2024-50150
  * CVE-2024-50153
  * CVE-2024-50154
  * CVE-2024-50155
  * CVE-2024-50156
  * CVE-2024-50160
  * CVE-2024-50167
  * CVE-2024-50171
  * CVE-2024-50179
  * CVE-2024-50180
  * CVE-2024-50182
  * CVE-2024-50183
  * CVE-2024-50184
  * CVE-2024-50186
  * CVE-2024-50187
  * CVE-2024-50188
  * CVE-2024-50189
  * CVE-2024-50192
  * CVE-2024-50194
  * CVE-2024-50195
  * CVE-2024-50196
  * CVE-2024-50198
  * CVE-2024-50201
  * CVE-2024-50205
  * CVE-2024-50208
  * CVE-2024-50209
  * CVE-2024-50215
  * CVE-2024-50218
  * CVE-2024-50229
  * CVE-2024-50230
  * CVE-2024-50232
  * CVE-2024-50233
  * CVE-2024-50234
  * CVE-2024-50236
  * CVE-2024-50237
  * CVE-2024-50249
  * CVE-2024-50255
  * CVE-2024-50259
  * CVE-2024-50261
  * CVE-2024-50264
  * CVE-2024-50265
  * CVE-2024-50267
  * CVE-2024-50268
  * CVE-2024-50269
  * CVE-2024-50271
  * CVE-2024-50273
  * CVE-2024-50274
  * CVE-2024-50279
  * CVE-2024-50282
  * CVE-2024-50287
  * CVE-2024-50289
  * CVE-2024-50290
  * CVE-2024-50292
  * CVE-2024-50295
  * CVE-2024-50298
  * CVE-2024-50301
  * CVE-2024-50302
  * CVE-2024-53052
  * CVE-2024-53058
  * CVE-2024-53059
  * CVE-2024-53060
  * CVE-2024-53061
  * CVE-2024-53063
  * CVE-2024-53066
  * CVE-2024-53068
  * CVE-2024-53079
  * CVE-2024-53085
  * CVE-2024-53088
  * CVE-2024-53104
  * CVE-2024-53110

  
CVSS scores:

  * CVE-2021-47594 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47594 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48674 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48674 ( NVD ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48674 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48979 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48979 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48982 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48982 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48983 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48983 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48989 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48989 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48989 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48990 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48990 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48990 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52915 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52917 ( SUSE ):  4.6
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-52917 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52917 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52918 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52918 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52921 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52921 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52921 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52922 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52922 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52922 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26782 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26906 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35888 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35888 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35937 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-36484 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36883 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36886 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36886 ( NVD ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36905 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36953 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36953 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36954 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38577 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38577 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38589 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38615 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40997 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40997 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-41023 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-41023 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-41049 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41049 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42131 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43817 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43897 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43897 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44932 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44932 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44964 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
  * CVE-2024-44964 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44964 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44995 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44995 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46681 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
  * CVE-2024-46681 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-46681 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46800 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46800 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46800 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46802 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46802 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46802 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46804 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46804 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-46804 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46805 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46805 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46805 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46807 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46807 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46807 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46810 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46810 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46812 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46812 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46812 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46819 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46819 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46821 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46835 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46835 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46842 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46853 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46859 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46864 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46871 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46871 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-46871 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47663 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47663 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47665 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47665 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47665 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47667 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47667 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2024-47667 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47669 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47669 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-47669 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47670 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47670 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47670 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47671 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-47671 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-47679 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47679 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47679 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47682 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47682 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47682 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47693 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47693 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-47693 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47695 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47695 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47695 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47696 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47696 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47696 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47697 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47697 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47697 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47698 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47698 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47698 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47699 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47699 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47701 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47701 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47701 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47709 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47709 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47709 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47712 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47712 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47713 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47713 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47718 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47718 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47723 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47723 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47723 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47728 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47735 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47737 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47737 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47737 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47742 ( SUSE ):  8.3
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47742 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2024-47742 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47745 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47745 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47745 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47749 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47749 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47749 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47756 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47756 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47756 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47757 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47757 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47757 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49850 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49850 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49851 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49851 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49852 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49852 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49855 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49855 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49855 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49861 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-49861 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-49861 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-49863 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49863 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49868 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49868 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49868 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49870 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-49870 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-49870 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49871 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49871 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49875 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49875 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49875 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-49877 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49877 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49879 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49879 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49891 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49891 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49891 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49900 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49900 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49900 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49902 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49902 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49902 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49903 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49903 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49903 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49905 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49905 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49907 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49907 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49907 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49908 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49908 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49921 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49921 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49921 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49924 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49924 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49924 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49925 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49925 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49925 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49934 ( SUSE ):  4.1
    CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49934 ( SUSE ):  4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49934 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49935 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49935 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49935 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49938 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49938 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49945 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49945 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49947 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49957 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49963 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49963 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49965 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49965 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49966 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49966 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49968 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49968 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-49968 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49981 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49981 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49983 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49983 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49985 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49989 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49989 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49989 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50003 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50003 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50003 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50007 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50007 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50007 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50008 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50008 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-50008 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50009 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50009 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50009 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50013 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50013 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50017 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50025 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50025 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50026 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50026 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50031 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50031 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50044 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50044 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50062 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50062 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50067 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50067 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50067 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50073 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50074 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50074 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50077 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50077 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50078 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50078 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50082 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50089 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50089 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2024-50089 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50093 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50095 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50096 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50096 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50098 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50099 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50099 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50103 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50103 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50108 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50108 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50110 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50110 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50115 ( SUSE ):  4.5
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
  * CVE-2024-50115 ( SUSE ):  7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
  * CVE-2024-50115 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50116 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50116 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50116 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50117 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50117 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50117 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50124 ( SUSE ):  7.5
    CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50124 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50124 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50124 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( SUSE ):  7.5
    CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50125 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50127 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50128 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50128 ( SUSE ):  6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50128 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50131 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50134 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50134 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-50134 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50135 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50135 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50135 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50138 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50138 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50138 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50141 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50141 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50146 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50146 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50146 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50147 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50147 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50147 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50148 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50148 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50148 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50150 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50150 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50150 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50153 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50153 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50153 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50154 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50154 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50155 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50155 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50156 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50156 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50160 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50160 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50160 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50167 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50167 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50171 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50171 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-50171 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50179 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50179 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50180 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50180 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-50180 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50182 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50182 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50182 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50183 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50183 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50183 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50184 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50184 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50184 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50186 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50186 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50187 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50187 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50188 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50189 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50189 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50192 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50192 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50194 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50194 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50195 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50196 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50196 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50198 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50198 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50201 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50205 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50205 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50205 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50208 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50208 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50208 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50209 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50209 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50209 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50215 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50215 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50218 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50229 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50229 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50229 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50230 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50230 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50230 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50232 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50232 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-50232 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50233 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50233 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-50233 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50234 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50234 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50234 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50236 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50236 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50236 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50237 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50237 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50237 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50249 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50249 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50255 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50255 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50255 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50259 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50259 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50259 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50261 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50261 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50261 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50261 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50265 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50265 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50267 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50267 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50267 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50268 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50268 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50269 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50269 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50271 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50271 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50273 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50273 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50274 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50274 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50279 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50279 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50282 ( SUSE ):  7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2024-50282 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50287 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50290 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50292 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50295 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50298 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50298 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50301 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50301 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50302 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50302 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53052 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53052 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53058 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53058 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53059 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53060 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53061 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53061 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53063 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53066 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53066 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53068 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53068 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53079 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-53079 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53085 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53085 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53088 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53088 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53104 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53104 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53110 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53110 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53110 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * openSUSE Leap 15.5
  * openSUSE Leap Micro 5.5
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Live Patching 15-SP5
  * SUSE Linux Enterprise Micro 5.5
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Real Time Module 15-SP5

  
  
An update that solves 230 vulnerabilities and has 33 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
    (bsc#1226560).
  * CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
    (bsc#1231959).
  * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
  * CVE-2024-26906: Fixed invalid vsyscall page read for
    copy_from_kernel_nofault() (bsc#1223202).
  * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
    (bsc#1223656).
  * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
    (bsc#1224518).
  * CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
    (bsc#1224526).
  * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
  * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
  * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
    (bsc#1225742).
  * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
    (bsc#1225764).
  * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
    (bsc#1226748).
  * CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
  * CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
    (bsc#1227853).
  * CVE-2024-41023: sched/deadline: Fix task_struct reference leak
    (bsc#1228430).
  * CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
  * CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
    reset (bsc#1230220).
  * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
    resetting (bsc#1230231).
  * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
  * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
    (bsc#1230827).
  * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
    (bsc#1231930).
  * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
    the filesystem (bsc#1231920).
  * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in
    remap_file_pages() (bsc#1232135).
  * CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete()
    (bsc#1232187).
  * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
    new trasacntion (bsc#1232272).
  * CVE-2024-49921: drm/amd/display: Check null pointers before used
    (bsc#1232371).
  * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
    (bsc#1232224)
  * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
    dentry.d_name.name (bsc#1232387).
  * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
    associated structure (bsc#1232165).
  * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
  * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
    with siphash (bsc#1232264).
  * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
    double-free (bsc#1232096).
  * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
    unload (bsc#1232483).
  * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
    value (bsc#1232318).
  * CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
    (bsc#1232520).
  * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
    rq_qos_wake_function race (bsc#1232500).
  * CVE-2024-50089: unicode: Do not special case ignorable code points
    (bsc#1232860).
  * CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during
    module unload (bsc#1232877).
  * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
    (bsc#1232881).
  * CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too
    (bsc#1232884).
  * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
    (bsc#1232885).
  * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
    (bsc#1232919).
  * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
  * CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
    (bsc#1232907).
  * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
  * CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
    vbva_mouse_pointer_shape (bsc#1232890).
  * CVE-2024-50135: nvme-pci: fix race condition between reset and
    nvme_dev_disable() (bsc#1232888).
  * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
  * CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure
    (bsc#1233056).
  * CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
  * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
    target_alloc_device() (bsc#1233061).
  * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
    (bsc#1233070).
  * CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
    (bsc#1233049).
  * CVE-2024-50171: net: systemport: fix potential memory leak in
    bcm_sysport_xmit() (bsc#1233057).
  * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
    map (bsc#1233129).
  * CVE-2024-50184: virtio_pmem: Check device status before requesting flush
    (bsc#1233135).
  * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
    (bsc#1233110).
  * CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber
    (bsc#1233107).
  * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
    (bsc#1233106).
  * CVE-2024-50195: posix-clock: Fix missing timespec64 check in
    pc_clock_settime() (bsc#1233103).
  * CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts
    (bsc#1233113).
  * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
    apply_constraint_to_size() (bsc#1233293).
  * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
    (bsc#1233117).
  * CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks
    (bsc#1233205).
  * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
    flag (bsc#1233206).
  * CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
    nsim_nexthop_bucket_activity_write() (bsc#1233214).
  * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
    packet (bsc#1233253).
  * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
    occurring in vsk->trans (bsc#1233453).
  * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk
    (bsc#1233456).
  * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
  * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
    the list (bsc#1233462).
  * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
    (bsc#1233463).
  * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
    resizing (bsc#1233468).
  * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
  * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
    (bsc#1233484).
  * CVE-2024-50298: net: enetc: allocate vf_state during PF probes
    (bsc#1233487).
  * CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start
    write (bsc#1233548).
  * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
    SKB data (bsc#1233552).
  * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
  * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
    (bsc#1233557).
  * CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
    scmi_bus_notifier() (bsc#1233561).
  * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
    (bsc#1233570).
  * CVE-2024-53088: i40e: fix race condition by adding filter's intermediate
    sync state (bsc#1233580).
  * CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
    UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
  * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
    (bsc#1234085).

The following non-security bugs were fixed:

  * Drop OCFS2 patch causing a regression (bsc#1233255)
  * Fix regression on AMDGPU driver (bsc#1233134)
  * Removed the duplicated check of static_assert(sizeof(struct work_struct) >=
    sizeof(struct rcu_head)).
  * Removed unnecessary white-space change in kernel/bpf/syscall.c
  * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
    (bsc#1234108).
  * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI"
    (git-fixes).
  * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
    fixes).
  * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
    fixes).
  * Update config files (bsc#1218644).
  * Update config files. Enabled IDPF for ARM64 (bsc#1221309)
  * acpi: CPPC: Fix _CPC register setting issue (git-fixes).
  * acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
  * acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
    detection issue (stable-fixes).
  * acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
    fixes).
  * ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
  * adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed
    with "suse_" to make it more obvious its a downstream thing.
  * add bugreference to a hv_netvsc patch (bsc#1232413).
  * add commit message for the kABI patch
  * alsa: 6fire: Release resources at card release (git-fixes).
  * alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
  * alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
    fixes).
  * alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
  * alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
    fixes).
  * alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
  * alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
    fixes).
  * alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
  * alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
  * alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
  * alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
    fixes).
  * alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
  * alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
  * alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * amd-pstate: Set min_perf to nominal_perf for active mode performance gov
    (git-fixes).
  * arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
  * arm64: Force position-independent veneers (git-fixes).
  * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
  * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
  * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
    fixes)
  * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
  * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
    fixes)
  * arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
  * asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
  * asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
    (git-fixes).
  * asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
    default regs values (stable-fixes).
  * asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
  * asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
  * asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
    fixes).
  * asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
    fixes).
  * blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
  * block: Avoid leaking hctx->nr_active counter on batched completion
    (bsc#1231923).
  * bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
    fixes).
  * bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
  * bnxt_en: Fix the PCI-AER routines (git-fixes).
  * bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
  * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
    (git-fixes).
  * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
  * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
  * bnxt_en: Wait for FLR to complete during probe (git-fixes).
  * bnxt_en: refactor reset close code (git-fixes).
  * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
    fails (git-fixes).
  * can: c_can: fix {rx,tx}_errors statistics (git-fixes).
  * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
  * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
    (git-fixes).
  * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
  * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
    fixes).
  * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
    (git-fixes).
  * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
  * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
  * chtls: fix tp->rcv_tstamp initialization (git-fixes).
  * comedi: Flush partial mappings in error case (git-fixes).
  * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
  * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
  * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
  * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
    fixes).
  * crypto: cavium - Fix the if condition to exit loop after timeout (git-
    fixes).
  * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
    (git-fixes).
  * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
  * cxgb4: Properly lock TX queue for the selftest (git-fixes).
  * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
  * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
    fixes).
  * drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-
    fixes).
  * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
  * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
    fixes).
  * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
    fixes).
  * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
    fixes).
  * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
  * drm/bridge: tc358767: Fix link properties discovery (git-fixes).
  * drm/bridge: tc358768: Fix DSI command tx (git-fixes).
  * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
    fixes).
  * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
    fixes).
  * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
    (git-fixes).
  * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
  * drm/omap: Fix possible NULL dereference (git-fixes).
  * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
  * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
  * drm/sti: avoid potential dereference of error pointers (git-fixes).
  * drm/sti: avoid potential dereference of error pointers in
    sti_gdp_atomic_check (git-fixes).
  * drm/sti: avoid potential dereference of error pointers in
    sti_hqvdp_atomic_check (git-fixes).
  * drm/v3d: Address race-condition in MMU flush (git-fixes).
  * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
    VLA (stable-fixes).
  * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
  * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
    fixes).
  * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
    fixes).
  * drm/vmwgfx: Limit display layout ioctl array size to
    VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
  * e1000e: Fix S0ix residency on corporate systems (git-fixes).
  * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
  * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
    fixes).
  * firmware: google: Unregister driver_info on failure (git-fixes).
  * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
  * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
  * gve: Fix XDP TX completion handling when counters overflow (git-fixes).
  * gve: Fix an edge case for TSO skb validity check (git-fixes).
  * gve: Fix skb truesize underestimation (git-fixes).
  * gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
    fixes).
  * hid: core: zero-initialize the report buffer (git-fixes).
  * hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
    fixes).
  * hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
    fixes).
  * hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
    (stable-fixes).
  * hid: multitouch: Add support for B2402FVA track point (stable-fixes).
  * hid: wacom: Defer calculation of resolution until resolution_code is known
    (git-fixes).
  * hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
    fixes).
  * hid: wacom: fix when get product name maybe null pointer (git-fixes).
  * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
    fixes).
  * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
  * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
    fixes).
  * i40e: Fix XDP program unloading while removing the driver (git-fixes).
  * i40e: Fix filter input checks to prevent config with invalid values (git-
    fixes).
  * i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
  * i40e: Report MFS in decimal base instead of hex (git-fixes).
  * i40e: Restore VF MSI-X state during PCI reset (git-fixes).
  * i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
  * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
    fixes).
  * i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
  * i40e: take into account XDP Tx queues when stopping rings (git-fixes).
  * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
  * iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
  * iavf: Fix promiscuous mode configuration flow messages (git-fixes).
  * iavf: Introduce new state machines for flow director (git-fixes).
  * iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-
    fixes).
  * iavf: fix FDIR rule fields masks validation (git-fixes).
  * iavf: in iavf_down, disable queues when removing the driver (git-fixes).
  * iavf: initialize waitqueues before starting watchdog_task (git-fixes).
  * iavf: send VLAN offloading caps once after VFR (git-fixes).
  * iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-
    fixes).
  * ibmvnic: Do partial reset on login failure (bsc#1233150).
  * ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
  * ibmvnic: Ensure login failure recovery is safe from other resets
    (bsc#1233150).
  * ibmvnic: Handle DMA unmapping of login buffs in release functions
    (bsc#1233150).
  * ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
  * ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
  * ice: Fix NULL pointer deref during VF reset (git-fixes).
  * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
  * ice: Fix link_down_on_close message (git-fixes).
  * ice: Fix netif_is_ice() in Safe Mode (git-fixes).
  * ice: Interpret .set_channels() input differently (git-fixes).
  * ice: Shut down VSI with "link-down-on-close" enabled (git-fixes).
  * ice: avoid executing commands on other ports when driving sync (git-fixes).
  * ice: change q_index variable type to s16 to store -1 value (git-fixes).
  * ice: fix ICE_LAST_OFFSET formula (git-fixes).
  * ice: fix VLAN replay after reset (git-fixes).
  * ice: fix accounting for filters shared by multiple VSIs (git-fixes).
  * ice: fix accounting if a VLAN already exists (git-fixes).
  * ice: fix over-shifted variable (git-fixes).
  * ice: fix receive buffer size miscalculation (git-fixes).
  * ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-
    fixes).
  * ice: reset first in crash dump kernels (git-fixes).
  * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
  * ice: tc: allow zero flags in parsing tc flower (git-fixes).
  * ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
    fixes).
  * idpf: Interpret .set_channels() input differently (git-fixes).
  * idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-
    fixes).
  * idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
  * idpf: disable local BH when scheduling napi for marker packets (git-fixes).
  * idpf: distinguish vports by the dev_port attribute (git-fixes).
  * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
    fixes).
  * idpf: fix UAFs when destroying the queues (git-fixes).
  * idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
  * idpf: fix memleak in vport interrupt configuration (git-fixes).
  * idpf: fix memory leaks and crashes while performing a soft reset (git-
    fixes).
  * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
  * igb: Fix missing time sync events (git-fixes).
  * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
  * igb: extend PTP timestamp adjustments to i211 (git-fixes).
  * igc: Check VLAN EtherType mask (git-fixes).
  * igc: Check VLAN TCI mask (git-fixes).
  * igc: Fix hicredit calculation (git-fixes).
  * igc: Fix missing time sync events (git-fixes).
  * igc: Remove temporary workaround (git-fixes).
  * igc: Report VLAN EtherType matching back to user (git-fixes).
  * igc: Unlock on error in igc_io_resume() (git-fixes).
  * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
    fixes).
  * iio: adc: ad7606: Fix typo in the driver name (git-fixes).
  * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
  * iio: light: al3010: Fix an error handling path in al3010_probe() (git-
    fixes).
  * iio: light: veml6030: fix microlux value calculation (git-fixes).
  * initramfs: avoid filename buffer overrun (bsc#1232436).
  * input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
  * input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
  * input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
    (git-fixes).
  * input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-
    fixes).
  * input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
    (git-fixes).
  * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
  * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
    fixes).
  * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
  * ixgbe: fix crash with empty VF macvlan list (git-fixes).
  * ixgbe: fix timestamp configuration code (git-fixes).
  * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
  * kABI: Restore exported __arm_smccc_sve_check (git-fixes)
  * kernel-binary: Enable livepatch package only when livepatch is enabled
    Otherwise the filelist may be empty failing the build (bsc#1218644).
  * kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
  * kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
  * kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
  * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
  * media: adv7604: prevent underflow condition when reporting colorspace (git-
    fixes).
  * media: cx24116: prevent overflows on SNR calculus (git-fixes).
  * media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer
    (stable-fixes).
  * media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
  * media: dvb_frontend: do not play tricks with underflow values (git-fixes).
  * media: dvbdev: prevent the risk of out of memory access (git-fixes).
  * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
  * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
  * media: stb0899_algo: initialize cfr before using it (git-fixes).
  * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
  * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
  * mei: use kvmalloc for read buffer (git-fixes).
  * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
  * mm/hugetlb: fix nodes huge page allocation when there are surplus pages
    (bsc#1234012).
  * mm/memory: add non-anonymous page check in the copy_present_page()
    (bsc#1231646).
  * modpost: remove incorrect code in do_eisa_entry() (git-fixes).
  * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
    fixes).
  * net/mlx5: Added cond_resched() to crdump collection (git-fixes).
  * net/mlx5: Allow 0 for total host VFs (git-fixes).
  * net/mlx5: Correctly compare pkt reformat ids (git-fixes).
  * net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
  * net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
  * net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
  * net/mlx5: Drain health before unregistering devlink (git-fixes).
  * net/mlx5: E-switch, register event handler before arming the event (git-
    fixes).
  * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
  * net/mlx5: Fix fw tracer first block check (git-fixes).
  * net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
  * net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
  * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
  * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
  * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
    (git-fixes).
  * net/mlx5: Skip clock update work when device is in error state (git-fixes).
  * net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
  * net/mlx5: Update the list of the PCI supported devices (git-fixes).
  * net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
  * net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO
    (git-fixes).
  * net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
  * net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
  * net/mlx5: fs, lock FTE when checking if active (git-fixes).
  * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
    (git-fixes).
  * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
  * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
    fixes).
  * net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
  * net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
  * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
  * net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
    fixes).
  * net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-
    fixes).
  * net/mlx5e: Check return value of snprintf writing to fw_version buffer for
    representors (git-fixes).
  * net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-
    fixes).
  * net/mlx5e: Correct snprintf truncation handling for fw_version buffer used
    by representors (git-fixes).
  * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
  * net/mlx5e: Do not offload internal port if filter device is out device (git-
    fixes).
  * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
  * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
  * net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set
    (git-fixes).
  * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
    packets (git-fixes).
  * net/mlx5e: Fix pedit endianness (git-fixes).
  * net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
  * net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-
    fixes).
  * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
  * net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
  * net/mlx5e: Reduce the size of icosq_str (git-fixes).
  * net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
  * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
    exhaustion (git-fixes).
  * net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
  * net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-
    fixes).
  * net/mlx5e: fix double free of encap_header (git-fixes).
  * net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-
    fixes).
  * net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
  * net: ena: Fix potential sign extension issue (git-fixes).
  * net: ena: Remove ena_select_queue (git-fixes).
  * net: ena: Wrong missing IO completions check order (git-fixes).
  * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
  * net: relax socket state check at accept time (git-fixes).
  * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
    (git-fixes).
  * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
    configuration (git-fixes).
  * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
  * net: usb: usbnet: fix race in probe failure (git-fixes).
  * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
  * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
  * nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
  * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
  * ocfs2: remove entry once instead of null-ptr-dereference in
    ocfs2_xa_remove() (git-fixes).
  * pci: Add T_PVPERL macro (git-fixes).
  * pci: Fix reset_method_store() memory leak (git-fixes).
  * pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
    (git-fixes).
  * pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
    (git-fixes).
  * pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
  * pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
    (git-fixes).
  * pci: rockchip-ep: Fix address translation unit programming (git-fixes).
  * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
  * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
    fixes).
  * platform/surface: aggregator: Fix warning when controller is destroyed in
    probe (git-fixes).
  * platform/x86: dell-sysman: add support for alienware products (stable-
    fixes).
  * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
  * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
  * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
  * power: supply: core: Remove might_sleep() from power_supply_put() (git-
    fixes).
  * powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
  * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
  * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
  * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
  * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
  * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
    (bsc#1194869).
  * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
  * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
    (bsc#1194869).
  * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
  * powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
  * qed: avoid truncating work queue length (git-fixes).
  * rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
  * rdma/hns: Add clear_hem return value to log (git-fixes)
  * rdma/hns: Add mutex_destroy() (git-fixes)
  * rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
  * rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
    (git-fixes)
  * rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
  * rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
  * rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
  * rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
  * rdma/hns: Remove unnecessary QP type checks (git-fixes)
  * rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
  * rdma/hns: Use macro instead of magic number (git-fixes)
  * rdma/mlx5: Move events notifier registration to be after device registration
    (git-fixes)
  * rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
    fixes).
  * rdma/rxe: Fix the qp flush warnings in req (git-fixes)
  * rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
  * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
    by the new klp-convert implementation. (bsc#1218644)
  * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
    (git-fixes).
  * rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
  * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
    fixes).
  * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
  * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
    (bsc#1233241).
  * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
    (bsc#1233241).
  * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
    FDMI (bsc#1233241).
  * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
    (bsc#1233241).
  * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
  * scsi: lpfc: Modify CGN warning signal calculation based on EDC response
    (bsc#1233241).
  * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
    (bsc#1233241).
  * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
    (bsc#1233241).
  * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
  * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
    flag (bsc#1233241).
  * scsi: scsi_transport_fc: Allow setting rport state to current state (git-
    fixes).
  * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
  * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
  * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
  * sfc: Check firmware supports Ethernet PTP filter (git-fixes).
  * sfc: do not unregister flow_indr if it was never registered (git-fixes).
  * sfc: fix a double-free bug in efx_probe_filters (git-fixes).
  * signal: Replace BUG_ON()s (bsc#1234093).
  * spi: Fix acpi deferred irq probe (git-fixes).
  * spi: atmel-quadspi: Fix register name in verbose logging function (git-
    fixes).
  * staging: iio: frequency: ad9832: fix division by zero in
    ad9832_calc_freqreg() (git-fixes).
  * thermal: core: Initialize thermal zones before registering them (git-fixes).
  * thermal: intel: int340x: processor: Fix warning during module unload (git-
    fixes).
  * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
  * tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
  * tun: prevent negative ifindex (git-fixes).
  * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
  * usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
  * usb: chaoskey: fail open after removal (git-fixes).
  * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
    logic (git-fixes).
  * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
  * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
  * usb: ehci-spear: fix call balance of sehci clk handling routines (git-
    fixes).
  * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
  * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
  * usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
    fixes).
  * usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
  * usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
  * usb: serial: option: add Quectel RG650V (stable-fixes).
  * usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
    fixes).
  * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
    (git-fixes).
  * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
    (git-fixes).
  * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
    (git-fixes).
  * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
  * usb: yurex: make waiting on yurex_write interruptible (git-fixes).
  * usbip: tools: Fix detach_port() invalid port error path (git-fixes).
  * vdpa/mlx5: preserve CVQ vringh index (git-fixes).
  * watchdog: mediatek: Make sure system reset gets asserted in
    mtk_wdt_restart() (git-fixes).
  * watchdog: rti: of: honor timeout-sec property (git-fixes).
  * wifi: ath10k: Fix memory leak in management tx (git-fixes).
  * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
    (git-fixes).
  * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
    (git-fixes).
  * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
  * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
    (git-fixes).
  * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
  * wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
    fixes).
  * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
    (git-fixes).
  * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-
    fixes).
  * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
    (git-fixes).
  * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
  * wifi: mwifiex: Fix memcpy() field-spanning write warning in
    mwifiex_config_scan() (git-fixes).
  * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * x86/kvm: fix is_stale_page_fault() (bsc#1221333).
  * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
  * xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
  * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Real Time Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-4315=1

  * openSUSE Leap 15.5  
    zypper in -t patch SUSE-2024-4315=1 openSUSE-SLE-15.5-2024-4315=1

  * openSUSE Leap Micro 5.5  
    zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4315=1

  * SUSE Linux Enterprise Micro 5.5  
    zypper in -t patch SUSE-SLE-Micro-5.5-2024-4315=1

  * SUSE Linux Enterprise Live Patching 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4315=1

## Package List:

  * SUSE Real Time Module 15-SP5 (x86_64)
    * kernel-rt_debug-vdso-5.14.21-150500.13.79.1
    * kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-debugsource-5.14.21-150500.13.79.1
    * kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
    * cluster-md-kmp-rt-5.14.21-150500.13.79.1
    * kernel-rt_debug-devel-5.14.21-150500.13.79.1
    * dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
    * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-vdso-5.14.21-150500.13.79.1
    * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
    * kernel-syms-rt-5.14.21-150500.13.79.1
    * gfs2-kmp-rt-5.14.21-150500.13.79.1
    * kernel-rt-devel-5.14.21-150500.13.79.1
    * dlm-kmp-rt-5.14.21-150500.13.79.1
    * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
    * ocfs2-kmp-rt-5.14.21-150500.13.79.1
  * SUSE Real Time Module 15-SP5 (noarch)
    * kernel-devel-rt-5.14.21-150500.13.79.1
    * kernel-source-rt-5.14.21-150500.13.79.1
  * SUSE Real Time Module 15-SP5 (nosrc x86_64)
    * kernel-rt_debug-5.14.21-150500.13.79.1
    * kernel-rt-5.14.21-150500.13.79.1
  * openSUSE Leap 15.5 (noarch)
    * kernel-devel-rt-5.14.21-150500.13.79.1
    * kernel-source-rt-5.14.21-150500.13.79.1
  * openSUSE Leap 15.5 (x86_64)
    * kernel-rt-extra-5.14.21-150500.13.79.1
    * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-livepatch-5.14.21-150500.13.79.1
    * kernel-rt_debug-vdso-5.14.21-150500.13.79.1
    * kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-debuginfo-5.14.21-150500.13.79.1
    * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1
    * kernel-rt-debugsource-5.14.21-150500.13.79.1
    * kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
    * kernel-rt-optional-5.14.21-150500.13.79.1
    * kernel-rt-extra-debuginfo-5.14.21-150500.13.79.1
    * reiserfs-kmp-rt-5.14.21-150500.13.79.1
    * cluster-md-kmp-rt-5.14.21-150500.13.79.1
    * kernel-rt_debug-devel-5.14.21-150500.13.79.1
    * dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
    * kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
    * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
    * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-vdso-5.14.21-150500.13.79.1
    * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
    * gfs2-kmp-rt-5.14.21-150500.13.79.1
    * kernel-syms-rt-5.14.21-150500.13.79.1
    * kselftests-kmp-rt-5.14.21-150500.13.79.1
    * kernel-rt-optional-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-devel-5.14.21-150500.13.79.1
    * dlm-kmp-rt-5.14.21-150500.13.79.1
    * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
    * kernel-rt-livepatch-devel-5.14.21-150500.13.79.1
    * ocfs2-kmp-rt-5.14.21-150500.13.79.1
  * openSUSE Leap 15.5 (nosrc x86_64)
    * kernel-rt_debug-5.14.21-150500.13.79.1
    * kernel-rt-5.14.21-150500.13.79.1
  * openSUSE Leap Micro 5.5 (nosrc x86_64)
    * kernel-rt-5.14.21-150500.13.79.1
  * openSUSE Leap Micro 5.5 (x86_64)
    * kernel-rt-debugsource-5.14.21-150500.13.79.1
    * kernel-rt-debuginfo-5.14.21-150500.13.79.1
  * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
    * kernel-rt-5.14.21-150500.13.79.1
  * SUSE Linux Enterprise Micro 5.5 (x86_64)
    * kernel-rt-debugsource-5.14.21-150500.13.79.1
    * kernel-rt-debuginfo-5.14.21-150500.13.79.1
  * SUSE Linux Enterprise Micro 5.5 (noarch)
    * kernel-source-rt-5.14.21-150500.13.79.1
  * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
    * kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
    * kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
    * kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-47594.html
  * https://www.suse.com/security/cve/CVE-2022-48674.html
  * https://www.suse.com/security/cve/CVE-2022-48979.html
  * https://www.suse.com/security/cve/CVE-2022-48982.html
  * https://www.suse.com/security/cve/CVE-2022-48983.html
  * https://www.suse.com/security/cve/CVE-2022-48989.html
  * https://www.suse.com/security/cve/CVE-2022-48990.html
  * https://www.suse.com/security/cve/CVE-2023-52915.html
  * https://www.suse.com/security/cve/CVE-2023-52917.html
  * https://www.suse.com/security/cve/CVE-2023-52918.html
  * https://www.suse.com/security/cve/CVE-2023-52921.html
  * https://www.suse.com/security/cve/CVE-2023-52922.html
  * https://www.suse.com/security/cve/CVE-2024-26782.html
  * https://www.suse.com/security/cve/CVE-2024-26906.html
  * https://www.suse.com/security/cve/CVE-2024-26953.html
  * https://www.suse.com/security/cve/CVE-2024-35888.html
  * https://www.suse.com/security/cve/CVE-2024-35937.html
  * https://www.suse.com/security/cve/CVE-2024-35980.html
  * https://www.suse.com/security/cve/CVE-2024-36484.html
  * https://www.suse.com/security/cve/CVE-2024-36883.html
  * https://www.suse.com/security/cve/CVE-2024-36886.html
  * https://www.suse.com/security/cve/CVE-2024-36905.html
  * https://www.suse.com/security/cve/CVE-2024-36953.html
  * https://www.suse.com/security/cve/CVE-2024-36954.html
  * https://www.suse.com/security/cve/CVE-2024-38577.html
  * https://www.suse.com/security/cve/CVE-2024-38589.html
  * https://www.suse.com/security/cve/CVE-2024-38615.html
  * https://www.suse.com/security/cve/CVE-2024-40997.html
  * https://www.suse.com/security/cve/CVE-2024-41016.html
  * https://www.suse.com/security/cve/CVE-2024-41023.html
  * https://www.suse.com/security/cve/CVE-2024-41049.html
  * https://www.suse.com/security/cve/CVE-2024-42131.html
  * https://www.suse.com/security/cve/CVE-2024-43817.html
  * https://www.suse.com/security/cve/CVE-2024-43897.html
  * https://www.suse.com/security/cve/CVE-2024-44932.html
  * https://www.suse.com/security/cve/CVE-2024-44964.html
  * https://www.suse.com/security/cve/CVE-2024-44995.html
  * https://www.suse.com/security/cve/CVE-2024-46681.html
  * https://www.suse.com/security/cve/CVE-2024-46800.html
  * https://www.suse.com/security/cve/CVE-2024-46802.html
  * https://www.suse.com/security/cve/CVE-2024-46804.html
  * https://www.suse.com/security/cve/CVE-2024-46805.html
  * https://www.suse.com/security/cve/CVE-2024-46807.html
  * https://www.suse.com/security/cve/CVE-2024-46810.html
  * https://www.suse.com/security/cve/CVE-2024-46812.html
  * https://www.suse.com/security/cve/CVE-2024-46819.html
  * https://www.suse.com/security/cve/CVE-2024-46821.html
  * https://www.suse.com/security/cve/CVE-2024-46835.html
  * https://www.suse.com/security/cve/CVE-2024-46842.html
  * https://www.suse.com/security/cve/CVE-2024-46853.html
  * https://www.suse.com/security/cve/CVE-2024-46859.html
  * https://www.suse.com/security/cve/CVE-2024-46864.html
  * https://www.suse.com/security/cve/CVE-2024-46871.html
  * https://www.suse.com/security/cve/CVE-2024-47663.html
  * https://www.suse.com/security/cve/CVE-2024-47665.html
  * https://www.suse.com/security/cve/CVE-2024-47667.html
  * https://www.suse.com/security/cve/CVE-2024-47669.html
  * https://www.suse.com/security/cve/CVE-2024-47670.html
  * https://www.suse.com/security/cve/CVE-2024-47671.html
  * https://www.suse.com/security/cve/CVE-2024-47679.html
  * https://www.suse.com/security/cve/CVE-2024-47682.html
  * https://www.suse.com/security/cve/CVE-2024-47693.html
  * https://www.suse.com/security/cve/CVE-2024-47695.html
  * https://www.suse.com/security/cve/CVE-2024-47696.html
  * https://www.suse.com/security/cve/CVE-2024-47697.html
  * https://www.suse.com/security/cve/CVE-2024-47698.html
  * https://www.suse.com/security/cve/CVE-2024-47699.html
  * https://www.suse.com/security/cve/CVE-2024-47701.html
  * https://www.suse.com/security/cve/CVE-2024-47709.html
  * https://www.suse.com/security/cve/CVE-2024-47712.html
  * https://www.suse.com/security/cve/CVE-2024-47713.html
  * https://www.suse.com/security/cve/CVE-2024-47718.html
  * https://www.suse.com/security/cve/CVE-2024-47723.html
  * https://www.suse.com/security/cve/CVE-2024-47728.html
  * https://www.suse.com/security/cve/CVE-2024-47735.html
  * https://www.suse.com/security/cve/CVE-2024-47737.html
  * https://www.suse.com/security/cve/CVE-2024-47742.html
  * https://www.suse.com/security/cve/CVE-2024-47745.html
  * https://www.suse.com/security/cve/CVE-2024-47749.html
  * https://www.suse.com/security/cve/CVE-2024-47756.html
  * https://www.suse.com/security/cve/CVE-2024-47757.html
  * https://www.suse.com/security/cve/CVE-2024-49850.html
  * https://www.suse.com/security/cve/CVE-2024-49851.html
  * https://www.suse.com/security/cve/CVE-2024-49852.html
  * https://www.suse.com/security/cve/CVE-2024-49855.html
  * https://www.suse.com/security/cve/CVE-2024-49861.html
  * https://www.suse.com/security/cve/CVE-2024-49863.html
  * https://www.suse.com/security/cve/CVE-2024-49868.html
  * https://www.suse.com/security/cve/CVE-2024-49870.html
  * https://www.suse.com/security/cve/CVE-2024-49871.html
  * https://www.suse.com/security/cve/CVE-2024-49875.html
  * https://www.suse.com/security/cve/CVE-2024-49877.html
  * https://www.suse.com/security/cve/CVE-2024-49879.html
  * https://www.suse.com/security/cve/CVE-2024-49884.html
  * https://www.suse.com/security/cve/CVE-2024-49891.html
  * https://www.suse.com/security/cve/CVE-2024-49900.html
  * https://www.suse.com/security/cve/CVE-2024-49902.html
  * https://www.suse.com/security/cve/CVE-2024-49903.html
  * https://www.suse.com/security/cve/CVE-2024-49905.html
  * https://www.suse.com/security/cve/CVE-2024-49907.html
  * https://www.suse.com/security/cve/CVE-2024-49908.html
  * https://www.suse.com/security/cve/CVE-2024-49921.html
  * https://www.suse.com/security/cve/CVE-2024-49924.html
  * https://www.suse.com/security/cve/CVE-2024-49925.html
  * https://www.suse.com/security/cve/CVE-2024-49934.html
  * https://www.suse.com/security/cve/CVE-2024-49935.html
  * https://www.suse.com/security/cve/CVE-2024-49938.html
  * https://www.suse.com/security/cve/CVE-2024-49945.html
  * https://www.suse.com/security/cve/CVE-2024-49947.html
  * https://www.suse.com/security/cve/CVE-2024-49950.html
  * https://www.suse.com/security/cve/CVE-2024-49957.html
  * https://www.suse.com/security/cve/CVE-2024-49963.html
  * https://www.suse.com/security/cve/CVE-2024-49965.html
  * https://www.suse.com/security/cve/CVE-2024-49966.html
  * https://www.suse.com/security/cve/CVE-2024-49968.html
  * https://www.suse.com/security/cve/CVE-2024-49981.html
  * https://www.suse.com/security/cve/CVE-2024-49983.html
  * https://www.suse.com/security/cve/CVE-2024-49985.html
  * https://www.suse.com/security/cve/CVE-2024-49989.html
  * https://www.suse.com/security/cve/CVE-2024-50003.html
  * https://www.suse.com/security/cve/CVE-2024-50007.html
  * https://www.suse.com/security/cve/CVE-2024-50008.html
  * https://www.suse.com/security/cve/CVE-2024-50009.html
  * https://www.suse.com/security/cve/CVE-2024-50013.html
  * https://www.suse.com/security/cve/CVE-2024-50017.html
  * https://www.suse.com/security/cve/CVE-2024-50025.html
  * https://www.suse.com/security/cve/CVE-2024-50026.html
  * https://www.suse.com/security/cve/CVE-2024-50031.html
  * https://www.suse.com/security/cve/CVE-2024-50044.html
  * https://www.suse.com/security/cve/CVE-2024-50062.html
  * https://www.suse.com/security/cve/CVE-2024-50067.html
  * https://www.suse.com/security/cve/CVE-2024-50073.html
  * https://www.suse.com/security/cve/CVE-2024-50074.html
  * https://www.suse.com/security/cve/CVE-2024-50077.html
  * https://www.suse.com/security/cve/CVE-2024-50078.html
  * https://www.suse.com/security/cve/CVE-2024-50082.html
  * https://www.suse.com/security/cve/CVE-2024-50089.html
  * https://www.suse.com/security/cve/CVE-2024-50093.html
  * https://www.suse.com/security/cve/CVE-2024-50095.html
  * https://www.suse.com/security/cve/CVE-2024-50096.html
  * https://www.suse.com/security/cve/CVE-2024-50098.html
  * https://www.suse.com/security/cve/CVE-2024-50099.html
  * https://www.suse.com/security/cve/CVE-2024-50103.html
  * https://www.suse.com/security/cve/CVE-2024-50108.html
  * https://www.suse.com/security/cve/CVE-2024-50110.html
  * https://www.suse.com/security/cve/CVE-2024-50115.html
  * https://www.suse.com/security/cve/CVE-2024-50116.html
  * https://www.suse.com/security/cve/CVE-2024-50117.html
  * https://www.suse.com/security/cve/CVE-2024-50124.html
  * https://www.suse.com/security/cve/CVE-2024-50125.html
  * https://www.suse.com/security/cve/CVE-2024-50127.html
  * https://www.suse.com/security/cve/CVE-2024-50128.html
  * https://www.suse.com/security/cve/CVE-2024-50131.html
  * https://www.suse.com/security/cve/CVE-2024-50134.html
  * https://www.suse.com/security/cve/CVE-2024-50135.html
  * https://www.suse.com/security/cve/CVE-2024-50138.html
  * https://www.suse.com/security/cve/CVE-2024-50141.html
  * https://www.suse.com/security/cve/CVE-2024-50146.html
  * https://www.suse.com/security/cve/CVE-2024-50147.html
  * https://www.suse.com/security/cve/CVE-2024-50148.html
  * https://www.suse.com/security/cve/CVE-2024-50150.html
  * https://www.suse.com/security/cve/CVE-2024-50153.html
  * https://www.suse.com/security/cve/CVE-2024-50154.html
  * https://www.suse.com/security/cve/CVE-2024-50155.html
  * https://www.suse.com/security/cve/CVE-2024-50156.html
  * https://www.suse.com/security/cve/CVE-2024-50160.html
  * https://www.suse.com/security/cve/CVE-2024-50167.html
  * https://www.suse.com/security/cve/CVE-2024-50171.html
  * https://www.suse.com/security/cve/CVE-2024-50179.html
  * https://www.suse.com/security/cve/CVE-2024-50180.html
  * https://www.suse.com/security/cve/CVE-2024-50182.html
  * https://www.suse.com/security/cve/CVE-2024-50183.html
  * https://www.suse.com/security/cve/CVE-2024-50184.html
  * https://www.suse.com/security/cve/CVE-2024-50186.html
  * https://www.suse.com/security/cve/CVE-2024-50187.html
  * https://www.suse.com/security/cve/CVE-2024-50188.html
  * https://www.suse.com/security/cve/CVE-2024-50189.html
  * https://www.suse.com/security/cve/CVE-2024-50192.html
  * https://www.suse.com/security/cve/CVE-2024-50194.html
  * https://www.suse.com/security/cve/CVE-2024-50195.html
  * https://www.suse.com/security/cve/CVE-2024-50196.html
  * https://www.suse.com/security/cve/CVE-2024-50198.html
  * https://www.suse.com/security/cve/CVE-2024-50201.html
  * https://www.suse.com/security/cve/CVE-2024-50205.html
  * https://www.suse.com/security/cve/CVE-2024-50208.html
  * https://www.suse.com/security/cve/CVE-2024-50209.html
  * https://www.suse.com/security/cve/CVE-2024-50215.html
  * https://www.suse.com/security/cve/CVE-2024-50218.html
  * https://www.suse.com/security/cve/CVE-2024-50229.html
  * https://www.suse.com/security/cve/CVE-2024-50230.html
  * https://www.suse.com/security/cve/CVE-2024-50232.html
  * https://www.suse.com/security/cve/CVE-2024-50233.html
  * https://www.suse.com/security/cve/CVE-2024-50234.html
  * https://www.suse.com/security/cve/CVE-2024-50236.html
  * https://www.suse.com/security/cve/CVE-2024-50237.html
  * https://www.suse.com/security/cve/CVE-2024-50249.html
  * https://www.suse.com/security/cve/CVE-2024-50255.html
  * https://www.suse.com/security/cve/CVE-2024-50259.html
  * https://www.suse.com/security/cve/CVE-2024-50261.html
  * https://www.suse.com/security/cve/CVE-2024-50264.html
  * https://www.suse.com/security/cve/CVE-2024-50265.html
  * https://www.suse.com/security/cve/CVE-2024-50267.html
  * https://www.suse.com/security/cve/CVE-2024-50268.html
  * https://www.suse.com/security/cve/CVE-2024-50269.html
  * https://www.suse.com/security/cve/CVE-2024-50271.html
  * https://www.suse.com/security/cve/CVE-2024-50273.html
  * https://www.suse.com/security/cve/CVE-2024-50274.html
  * https://www.suse.com/security/cve/CVE-2024-50279.html
  * https://www.suse.com/security/cve/CVE-2024-50282.html
  * https://www.suse.com/security/cve/CVE-2024-50287.html
  * https://www.suse.com/security/cve/CVE-2024-50289.html
  * https://www.suse.com/security/cve/CVE-2024-50290.html
  * https://www.suse.com/security/cve/CVE-2024-50292.html
  * https://www.suse.com/security/cve/CVE-2024-50295.html
  * https://www.suse.com/security/cve/CVE-2024-50298.html
  * https://www.suse.com/security/cve/CVE-2024-50301.html
  * https://www.suse.com/security/cve/CVE-2024-50302.html
  * https://www.suse.com/security/cve/CVE-2024-53052.html
  * https://www.suse.com/security/cve/CVE-2024-53058.html
  * https://www.suse.com/security/cve/CVE-2024-53059.html
  * https://www.suse.com/security/cve/CVE-2024-53060.html
  * https://www.suse.com/security/cve/CVE-2024-53061.html
  * https://www.suse.com/security/cve/CVE-2024-53063.html
  * https://www.suse.com/security/cve/CVE-2024-53066.html
  * https://www.suse.com/security/cve/CVE-2024-53068.html
  * https://www.suse.com/security/cve/CVE-2024-53079.html
  * https://www.suse.com/security/cve/CVE-2024-53085.html
  * https://www.suse.com/security/cve/CVE-2024-53088.html
  * https://www.suse.com/security/cve/CVE-2024-53104.html
  * https://www.suse.com/security/cve/CVE-2024-53110.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1082555
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1218644
  * https://bugzilla.suse.com/show_bug.cgi?id=1220382
  * https://bugzilla.suse.com/show_bug.cgi?id=1221309
  * https://bugzilla.suse.com/show_bug.cgi?id=1221333
  * https://bugzilla.suse.com/show_bug.cgi?id=1222364
  * https://bugzilla.suse.com/show_bug.cgi?id=1222590
  * https://bugzilla.suse.com/show_bug.cgi?id=1223202
  * https://bugzilla.suse.com/show_bug.cgi?id=1223656
  * https://bugzilla.suse.com/show_bug.cgi?id=1223848
  * https://bugzilla.suse.com/show_bug.cgi?id=1223919
  * https://bugzilla.suse.com/show_bug.cgi?id=1223942
  * https://bugzilla.suse.com/show_bug.cgi?id=1224518
  * https://bugzilla.suse.com/show_bug.cgi?id=1224526
  * https://bugzilla.suse.com/show_bug.cgi?id=1224574
  * https://bugzilla.suse.com/show_bug.cgi?id=1225725
  * https://bugzilla.suse.com/show_bug.cgi?id=1225730
  * https://bugzilla.suse.com/show_bug.cgi?id=1225742
  * https://bugzilla.suse.com/show_bug.cgi?id=1225764
  * https://bugzilla.suse.com/show_bug.cgi?id=1225812
  * https://bugzilla.suse.com/show_bug.cgi?id=1226560
  * https://bugzilla.suse.com/show_bug.cgi?id=1226592
  * https://bugzilla.suse.com/show_bug.cgi?id=1226631
  * https://bugzilla.suse.com/show_bug.cgi?id=1226748
  * https://bugzilla.suse.com/show_bug.cgi?id=1226872
  * https://bugzilla.suse.com/show_bug.cgi?id=1227853
  * https://bugzilla.suse.com/show_bug.cgi?id=1228410
  * https://bugzilla.suse.com/show_bug.cgi?id=1228430
  * https://bugzilla.suse.com/show_bug.cgi?id=1228486
  * https://bugzilla.suse.com/show_bug.cgi?id=1228650
  * https://bugzilla.suse.com/show_bug.cgi?id=1228857
  * https://bugzilla.suse.com/show_bug.cgi?id=1229312
  * https://bugzilla.suse.com/show_bug.cgi?id=1229429
  * https://bugzilla.suse.com/show_bug.cgi?id=1229585
  * https://bugzilla.suse.com/show_bug.cgi?id=1229752
  * https://bugzilla.suse.com/show_bug.cgi?id=1229808
  * https://bugzilla.suse.com/show_bug.cgi?id=1230055
  * https://bugzilla.suse.com/show_bug.cgi?id=1230220
  * https://bugzilla.suse.com/show_bug.cgi?id=1230231
  * https://bugzilla.suse.com/show_bug.cgi?id=1230270
  * https://bugzilla.suse.com/show_bug.cgi?id=1230558
  * https://bugzilla.suse.com/show_bug.cgi?id=1230827
  * https://bugzilla.suse.com/show_bug.cgi?id=1230918
  * https://bugzilla.suse.com/show_bug.cgi?id=1231083
  * https://bugzilla.suse.com/show_bug.cgi?id=1231089
  * https://bugzilla.suse.com/show_bug.cgi?id=1231098
  * https://bugzilla.suse.com/show_bug.cgi?id=1231101
  * https://bugzilla.suse.com/show_bug.cgi?id=1231108
  * https://bugzilla.suse.com/show_bug.cgi?id=1231111
  * https://bugzilla.suse.com/show_bug.cgi?id=1231132
  * https://bugzilla.suse.com/show_bug.cgi?id=1231135
  * https://bugzilla.suse.com/show_bug.cgi?id=1231138
  * https://bugzilla.suse.com/show_bug.cgi?id=1231169
  * https://bugzilla.suse.com/show_bug.cgi?id=1231178
  * https://bugzilla.suse.com/show_bug.cgi?id=1231180
  * https://bugzilla.suse.com/show_bug.cgi?id=1231181
  * https://bugzilla.suse.com/show_bug.cgi?id=1231187
  * https://bugzilla.suse.com/show_bug.cgi?id=1231202
  * https://bugzilla.suse.com/show_bug.cgi?id=1231434
  * https://bugzilla.suse.com/show_bug.cgi?id=1231441
  * https://bugzilla.suse.com/show_bug.cgi?id=1231452
  * https://bugzilla.suse.com/show_bug.cgi?id=1231465
  * https://bugzilla.suse.com/show_bug.cgi?id=1231474
  * https://bugzilla.suse.com/show_bug.cgi?id=1231481
  * https://bugzilla.suse.com/show_bug.cgi?id=1231537
  * https://bugzilla.suse.com/show_bug.cgi?id=1231541
  * https://bugzilla.suse.com/show_bug.cgi?id=1231646
  * https://bugzilla.suse.com/show_bug.cgi?id=1231849
  * https://bugzilla.suse.com/show_bug.cgi?id=1231856
  * https://bugzilla.suse.com/show_bug.cgi?id=1231858
  * https://bugzilla.suse.com/show_bug.cgi?id=1231859
  * https://bugzilla.suse.com/show_bug.cgi?id=1231864
  * https://bugzilla.suse.com/show_bug.cgi?id=1231904
  * https://bugzilla.suse.com/show_bug.cgi?id=1231916
  * https://bugzilla.suse.com/show_bug.cgi?id=1231920
  * https://bugzilla.suse.com/show_bug.cgi?id=1231923
  * https://bugzilla.suse.com/show_bug.cgi?id=1231930
  * https://bugzilla.suse.com/show_bug.cgi?id=1231931
  * https://bugzilla.suse.com/show_bug.cgi?id=1231947
  * https://bugzilla.suse.com/show_bug.cgi?id=1231952
  * https://bugzilla.suse.com/show_bug.cgi?id=1231953
  * https://bugzilla.suse.com/show_bug.cgi?id=1231959
  * https://bugzilla.suse.com/show_bug.cgi?id=1231978
  * https://bugzilla.suse.com/show_bug.cgi?id=1232013
  * https://bugzilla.suse.com/show_bug.cgi?id=1232015
  * https://bugzilla.suse.com/show_bug.cgi?id=1232016
  * https://bugzilla.suse.com/show_bug.cgi?id=1232017
  * https://bugzilla.suse.com/show_bug.cgi?id=1232027
  * https://bugzilla.suse.com/show_bug.cgi?id=1232028
  * https://bugzilla.suse.com/show_bug.cgi?id=1232047
  * https://bugzilla.suse.com/show_bug.cgi?id=1232048
  * https://bugzilla.suse.com/show_bug.cgi?id=1232050
  * https://bugzilla.suse.com/show_bug.cgi?id=1232056
  * https://bugzilla.suse.com/show_bug.cgi?id=1232076
  * https://bugzilla.suse.com/show_bug.cgi?id=1232080
  * https://bugzilla.suse.com/show_bug.cgi?id=1232094
  * https://bugzilla.suse.com/show_bug.cgi?id=1232096
  * https://bugzilla.suse.com/show_bug.cgi?id=1232098
  * https://bugzilla.suse.com/show_bug.cgi?id=1232111
  * https://bugzilla.suse.com/show_bug.cgi?id=1232126
  * https://bugzilla.suse.com/show_bug.cgi?id=1232134
  * https://bugzilla.suse.com/show_bug.cgi?id=1232135
  * https://bugzilla.suse.com/show_bug.cgi?id=1232141
  * https://bugzilla.suse.com/show_bug.cgi?id=1232142
  * https://bugzilla.suse.com/show_bug.cgi?id=1232147
  * https://bugzilla.suse.com/show_bug.cgi?id=1232152
  * https://bugzilla.suse.com/show_bug.cgi?id=1232159
  * https://bugzilla.suse.com/show_bug.cgi?id=1232162
  * https://bugzilla.suse.com/show_bug.cgi?id=1232165
  * https://bugzilla.suse.com/show_bug.cgi?id=1232180
  * https://bugzilla.suse.com/show_bug.cgi?id=1232185
  * https://bugzilla.suse.com/show_bug.cgi?id=1232187
  * https://bugzilla.suse.com/show_bug.cgi?id=1232189
  * https://bugzilla.suse.com/show_bug.cgi?id=1232195
  * https://bugzilla.suse.com/show_bug.cgi?id=1232198
  * https://bugzilla.suse.com/show_bug.cgi?id=1232201
  * https://bugzilla.suse.com/show_bug.cgi?id=1232218
  * https://bugzilla.suse.com/show_bug.cgi?id=1232224
  * https://bugzilla.suse.com/show_bug.cgi?id=1232232
  * https://bugzilla.suse.com/show_bug.cgi?id=1232254
  * https://bugzilla.suse.com/show_bug.cgi?id=1232255
  * https://bugzilla.suse.com/show_bug.cgi?id=1232264
  * https://bugzilla.suse.com/show_bug.cgi?id=1232272
  * https://bugzilla.suse.com/show_bug.cgi?id=1232279
  * https://bugzilla.suse.com/show_bug.cgi?id=1232287
  * https://bugzilla.suse.com/show_bug.cgi?id=1232293
  * https://bugzilla.suse.com/show_bug.cgi?id=1232312
  * https://bugzilla.suse.com/show_bug.cgi?id=1232317
  * https://bugzilla.suse.com/show_bug.cgi?id=1232318
  * https://bugzilla.suse.com/show_bug.cgi?id=1232333
  * https://bugzilla.suse.com/show_bug.cgi?id=1232334
  * https://bugzilla.suse.com/show_bug.cgi?id=1232335
  * https://bugzilla.suse.com/show_bug.cgi?id=1232339
  * https://bugzilla.suse.com/show_bug.cgi?id=1232349
  * https://bugzilla.suse.com/show_bug.cgi?id=1232357
  * https://bugzilla.suse.com/show_bug.cgi?id=1232359
  * https://bugzilla.suse.com/show_bug.cgi?id=1232362
  * https://bugzilla.suse.com/show_bug.cgi?id=1232364
  * https://bugzilla.suse.com/show_bug.cgi?id=1232370
  * https://bugzilla.suse.com/show_bug.cgi?id=1232371
  * https://bugzilla.suse.com/show_bug.cgi?id=1232378
  * https://bugzilla.suse.com/show_bug.cgi?id=1232385
  * https://bugzilla.suse.com/show_bug.cgi?id=1232387
  * https://bugzilla.suse.com/show_bug.cgi?id=1232394
  * https://bugzilla.suse.com/show_bug.cgi?id=1232413
  * https://bugzilla.suse.com/show_bug.cgi?id=1232416
  * https://bugzilla.suse.com/show_bug.cgi?id=1232436
  * https://bugzilla.suse.com/show_bug.cgi?id=1232483
  * https://bugzilla.suse.com/show_bug.cgi?id=1232500
  * https://bugzilla.suse.com/show_bug.cgi?id=1232503
  * https://bugzilla.suse.com/show_bug.cgi?id=1232504
  * https://bugzilla.suse.com/show_bug.cgi?id=1232507
  * https://bugzilla.suse.com/show_bug.cgi?id=1232520
  * https://bugzilla.suse.com/show_bug.cgi?id=1232552
  * https://bugzilla.suse.com/show_bug.cgi?id=1232757
  * https://bugzilla.suse.com/show_bug.cgi?id=1232819
  * https://bugzilla.suse.com/show_bug.cgi?id=1232860
  * https://bugzilla.suse.com/show_bug.cgi?id=1232870
  * https://bugzilla.suse.com/show_bug.cgi?id=1232873
  * https://bugzilla.suse.com/show_bug.cgi?id=1232877
  * https://bugzilla.suse.com/show_bug.cgi?id=1232878
  * https://bugzilla.suse.com/show_bug.cgi?id=1232881
  * https://bugzilla.suse.com/show_bug.cgi?id=1232884
  * https://bugzilla.suse.com/show_bug.cgi?id=1232885
  * https://bugzilla.suse.com/show_bug.cgi?id=1232887
  * https://bugzilla.suse.com/show_bug.cgi?id=1232888
  * https://bugzilla.suse.com/show_bug.cgi?id=1232890
  * https://bugzilla.suse.com/show_bug.cgi?id=1232892
  * https://bugzilla.suse.com/show_bug.cgi?id=1232896
  * https://bugzilla.suse.com/show_bug.cgi?id=1232897
  * https://bugzilla.suse.com/show_bug.cgi?id=1232905
  * https://bugzilla.suse.com/show_bug.cgi?id=1232907
  * https://bugzilla.suse.com/show_bug.cgi?id=1232919
  * https://bugzilla.suse.com/show_bug.cgi?id=1232926
  * https://bugzilla.suse.com/show_bug.cgi?id=1232928
  * https://bugzilla.suse.com/show_bug.cgi?id=1232935
  * https://bugzilla.suse.com/show_bug.cgi?id=1233035
  * https://bugzilla.suse.com/show_bug.cgi?id=1233049
  * https://bugzilla.suse.com/show_bug.cgi?id=1233051
  * https://bugzilla.suse.com/show_bug.cgi?id=1233056
  * https://bugzilla.suse.com/show_bug.cgi?id=1233057
  * https://bugzilla.suse.com/show_bug.cgi?id=1233061
  * https://bugzilla.suse.com/show_bug.cgi?id=1233063
  * https://bugzilla.suse.com/show_bug.cgi?id=1233065
  * https://bugzilla.suse.com/show_bug.cgi?id=1233067
  * https://bugzilla.suse.com/show_bug.cgi?id=1233070
  * https://bugzilla.suse.com/show_bug.cgi?id=1233073
  * https://bugzilla.suse.com/show_bug.cgi?id=1233074
  * https://bugzilla.suse.com/show_bug.cgi?id=1233100
  * https://bugzilla.suse.com/show_bug.cgi?id=1233103
  * https://bugzilla.suse.com/show_bug.cgi?id=1233104
  * https://bugzilla.suse.com/show_bug.cgi?id=1233105
  * https://bugzilla.suse.com/show_bug.cgi?id=1233106
  * https://bugzilla.suse.com/show_bug.cgi?id=1233107
  * https://bugzilla.suse.com/show_bug.cgi?id=1233108
  * https://bugzilla.suse.com/show_bug.cgi?id=1233110
  * https://bugzilla.suse.com/show_bug.cgi?id=1233111
  * https://bugzilla.suse.com/show_bug.cgi?id=1233113
  * https://bugzilla.suse.com/show_bug.cgi?id=1233114
  * https://bugzilla.suse.com/show_bug.cgi?id=1233117
  * https://bugzilla.suse.com/show_bug.cgi?id=1233123
  * https://bugzilla.suse.com/show_bug.cgi?id=1233125
  * https://bugzilla.suse.com/show_bug.cgi?id=1233129
  * https://bugzilla.suse.com/show_bug.cgi?id=1233130
  * https://bugzilla.suse.com/show_bug.cgi?id=1233134
  * https://bugzilla.suse.com/show_bug.cgi?id=1233135
  * https://bugzilla.suse.com/show_bug.cgi?id=1233150
  * https://bugzilla.suse.com/show_bug.cgi?id=1233189
  * https://bugzilla.suse.com/show_bug.cgi?id=1233191
  * https://bugzilla.suse.com/show_bug.cgi?id=1233197
  * https://bugzilla.suse.com/show_bug.cgi?id=1233205
  * https://bugzilla.suse.com/show_bug.cgi?id=1233206
  * https://bugzilla.suse.com/show_bug.cgi?id=1233209
  * https://bugzilla.suse.com/show_bug.cgi?id=1233210
  * https://bugzilla.suse.com/show_bug.cgi?id=1233211
  * https://bugzilla.suse.com/show_bug.cgi?id=1233212
  * https://bugzilla.suse.com/show_bug.cgi?id=1233214
  * https://bugzilla.suse.com/show_bug.cgi?id=1233216
  * https://bugzilla.suse.com/show_bug.cgi?id=1233238
  * https://bugzilla.suse.com/show_bug.cgi?id=1233241
  * https://bugzilla.suse.com/show_bug.cgi?id=1233253
  * https://bugzilla.suse.com/show_bug.cgi?id=1233255
  * https://bugzilla.suse.com/show_bug.cgi?id=1233293
  * https://bugzilla.suse.com/show_bug.cgi?id=1233350
  * https://bugzilla.suse.com/show_bug.cgi?id=1233452
  * https://bugzilla.suse.com/show_bug.cgi?id=1233453
  * https://bugzilla.suse.com/show_bug.cgi?id=1233454
  * https://bugzilla.suse.com/show_bug.cgi?id=1233456
  * https://bugzilla.suse.com/show_bug.cgi?id=1233457
  * https://bugzilla.suse.com/show_bug.cgi?id=1233458
  * https://bugzilla.suse.com/show_bug.cgi?id=1233460
  * https://bugzilla.suse.com/show_bug.cgi?id=1233462
  * https://bugzilla.suse.com/show_bug.cgi?id=1233463
  * https://bugzilla.suse.com/show_bug.cgi?id=1233468
  * https://bugzilla.suse.com/show_bug.cgi?id=1233471
  * https://bugzilla.suse.com/show_bug.cgi?id=1233476
  * https://bugzilla.suse.com/show_bug.cgi?id=1233478
  * https://bugzilla.suse.com/show_bug.cgi?id=1233479
  * https://bugzilla.suse.com/show_bug.cgi?id=1233481
  * https://bugzilla.suse.com/show_bug.cgi?id=1233484
  * https://bugzilla.suse.com/show_bug.cgi?id=1233487
  * https://bugzilla.suse.com/show_bug.cgi?id=1233490
  * https://bugzilla.suse.com/show_bug.cgi?id=1233491
  * https://bugzilla.suse.com/show_bug.cgi?id=1233528
  * https://bugzilla.suse.com/show_bug.cgi?id=1233548
  * https://bugzilla.suse.com/show_bug.cgi?id=1233552
  * https://bugzilla.suse.com/show_bug.cgi?id=1233553
  * https://bugzilla.suse.com/show_bug.cgi?id=1233554
  * https://bugzilla.suse.com/show_bug.cgi?id=1233555
  * https://bugzilla.suse.com/show_bug.cgi?id=1233557
  * https://bugzilla.suse.com/show_bug.cgi?id=1233560
  * https://bugzilla.suse.com/show_bug.cgi?id=1233561
  * https://bugzilla.suse.com/show_bug.cgi?id=1233570
  * https://bugzilla.suse.com/show_bug.cgi?id=1233577
  * https://bugzilla.suse.com/show_bug.cgi?id=1233580
  * https://bugzilla.suse.com/show_bug.cgi?id=1233977
  * https://bugzilla.suse.com/show_bug.cgi?id=1234012
  * https://bugzilla.suse.com/show_bug.cgi?id=1234025
  * https://bugzilla.suse.com/show_bug.cgi?id=1234085
  * https://bugzilla.suse.com/show_bug.cgi?id=1234093
  * https://bugzilla.suse.com/show_bug.cgi?id=1234098
  * https://bugzilla.suse.com/show_bug.cgi?id=1234108

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20241213/a316309a/attachment-0001.htm>


More information about the sle-security-updates mailing list