SUSE-SU-2024:4364-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Tue Dec 17 16:35:52 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4364-1  
Release Date: 2024-12-17T15:57:52Z  
Rating: important  
References:

  * bsc#1054914
  * bsc#1065729
  * bsc#1082555
  * bsc#1194869
  * bsc#1204171
  * bsc#1205796
  * bsc#1206188
  * bsc#1206344
  * bsc#1209290
  * bsc#1210449
  * bsc#1210627
  * bsc#1213034
  * bsc#1216813
  * bsc#1218562
  * bsc#1218644
  * bsc#1220382
  * bsc#1221309
  * bsc#1221333
  * bsc#1222364
  * bsc#1222590
  * bsc#1223202
  * bsc#1223384
  * bsc#1223524
  * bsc#1223656
  * bsc#1223824
  * bsc#1223848
  * bsc#1223919
  * bsc#1223942
  * bsc#1224518
  * bsc#1224526
  * bsc#1224574
  * bsc#1225189
  * bsc#1225336
  * bsc#1225611
  * bsc#1225725
  * bsc#1225730
  * bsc#1225742
  * bsc#1225762
  * bsc#1225764
  * bsc#1225812
  * bsc#1226498
  * bsc#1226560
  * bsc#1226592
  * bsc#1226631
  * bsc#1226748
  * bsc#1226797
  * bsc#1226872
  * bsc#1227437
  * bsc#1227853
  * bsc#1227885
  * bsc#1228119
  * bsc#1228269
  * bsc#1228410
  * bsc#1228430
  * bsc#1228486
  * bsc#1228650
  * bsc#1228709
  * bsc#1228743
  * bsc#1228747
  * bsc#1228857
  * bsc#1229005
  * bsc#1229019
  * bsc#1229312
  * bsc#1229429
  * bsc#1229450
  * bsc#1229454
  * bsc#1229456
  * bsc#1229556
  * bsc#1229585
  * bsc#1229752
  * bsc#1229769
  * bsc#1229808
  * bsc#1229837
  * bsc#1229891
  * bsc#1230055
  * bsc#1230179
  * bsc#1230220
  * bsc#1230231
  * bsc#1230270
  * bsc#1230289
  * bsc#1230405
  * bsc#1230414
  * bsc#1230429
  * bsc#1230456
  * bsc#1230550
  * bsc#1230558
  * bsc#1230600
  * bsc#1230620
  * bsc#1230715
  * bsc#1230722
  * bsc#1230763
  * bsc#1230773
  * bsc#1230774
  * bsc#1230801
  * bsc#1230827
  * bsc#1230903
  * bsc#1230918
  * bsc#1231016
  * bsc#1231072
  * bsc#1231073
  * bsc#1231083
  * bsc#1231084
  * bsc#1231085
  * bsc#1231087
  * bsc#1231089
  * bsc#1231094
  * bsc#1231096
  * bsc#1231098
  * bsc#1231101
  * bsc#1231105
  * bsc#1231108
  * bsc#1231111
  * bsc#1231114
  * bsc#1231115
  * bsc#1231132
  * bsc#1231135
  * bsc#1231138
  * bsc#1231148
  * bsc#1231169
  * bsc#1231178
  * bsc#1231179
  * bsc#1231180
  * bsc#1231181
  * bsc#1231187
  * bsc#1231191
  * bsc#1231193
  * bsc#1231195
  * bsc#1231197
  * bsc#1231200
  * bsc#1231202
  * bsc#1231203
  * bsc#1231277
  * bsc#1231293
  * bsc#1231327
  * bsc#1231344
  * bsc#1231375
  * bsc#1231383
  * bsc#1231434
  * bsc#1231439
  * bsc#1231441
  * bsc#1231442
  * bsc#1231452
  * bsc#1231465
  * bsc#1231474
  * bsc#1231481
  * bsc#1231496
  * bsc#1231502
  * bsc#1231537
  * bsc#1231539
  * bsc#1231540
  * bsc#1231541
  * bsc#1231578
  * bsc#1231646
  * bsc#1231673
  * bsc#1231849
  * bsc#1231856
  * bsc#1231857
  * bsc#1231858
  * bsc#1231859
  * bsc#1231861
  * bsc#1231864
  * bsc#1231872
  * bsc#1231883
  * bsc#1231885
  * bsc#1231887
  * bsc#1231888
  * bsc#1231889
  * bsc#1231890
  * bsc#1231892
  * bsc#1231893
  * bsc#1231895
  * bsc#1231896
  * bsc#1231897
  * bsc#1231902
  * bsc#1231903
  * bsc#1231904
  * bsc#1231907
  * bsc#1231914
  * bsc#1231916
  * bsc#1231920
  * bsc#1231923
  * bsc#1231929
  * bsc#1231930
  * bsc#1231931
  * bsc#1231935
  * bsc#1231936
  * bsc#1231937
  * bsc#1231938
  * bsc#1231939
  * bsc#1231940
  * bsc#1231941
  * bsc#1231942
  * bsc#1231944
  * bsc#1231947
  * bsc#1231950
  * bsc#1231952
  * bsc#1231953
  * bsc#1231954
  * bsc#1231958
  * bsc#1231959
  * bsc#1231960
  * bsc#1231961
  * bsc#1231962
  * bsc#1231965
  * bsc#1231967
  * bsc#1231968
  * bsc#1231972
  * bsc#1231973
  * bsc#1231976
  * bsc#1231978
  * bsc#1231979
  * bsc#1231987
  * bsc#1231988
  * bsc#1231990
  * bsc#1231991
  * bsc#1231992
  * bsc#1231995
  * bsc#1231996
  * bsc#1231997
  * bsc#1231998
  * bsc#1232001
  * bsc#1232004
  * bsc#1232005
  * bsc#1232006
  * bsc#1232007
  * bsc#1232013
  * bsc#1232015
  * bsc#1232016
  * bsc#1232017
  * bsc#1232025
  * bsc#1232026
  * bsc#1232027
  * bsc#1232028
  * bsc#1232033
  * bsc#1232034
  * bsc#1232035
  * bsc#1232036
  * bsc#1232037
  * bsc#1232038
  * bsc#1232039
  * bsc#1232043
  * bsc#1232047
  * bsc#1232048
  * bsc#1232049
  * bsc#1232050
  * bsc#1232056
  * bsc#1232067
  * bsc#1232069
  * bsc#1232070
  * bsc#1232071
  * bsc#1232075
  * bsc#1232076
  * bsc#1232080
  * bsc#1232083
  * bsc#1232084
  * bsc#1232085
  * bsc#1232089
  * bsc#1232094
  * bsc#1232096
  * bsc#1232097
  * bsc#1232098
  * bsc#1232104
  * bsc#1232105
  * bsc#1232108
  * bsc#1232111
  * bsc#1232114
  * bsc#1232116
  * bsc#1232119
  * bsc#1232120
  * bsc#1232123
  * bsc#1232124
  * bsc#1232126
  * bsc#1232133
  * bsc#1232134
  * bsc#1232135
  * bsc#1232136
  * bsc#1232140
  * bsc#1232141
  * bsc#1232142
  * bsc#1232145
  * bsc#1232147
  * bsc#1232149
  * bsc#1232150
  * bsc#1232151
  * bsc#1232152
  * bsc#1232154
  * bsc#1232155
  * bsc#1232159
  * bsc#1232160
  * bsc#1232162
  * bsc#1232163
  * bsc#1232164
  * bsc#1232165
  * bsc#1232170
  * bsc#1232172
  * bsc#1232174
  * bsc#1232175
  * bsc#1232180
  * bsc#1232185
  * bsc#1232187
  * bsc#1232189
  * bsc#1232191
  * bsc#1232195
  * bsc#1232196
  * bsc#1232198
  * bsc#1232199
  * bsc#1232200
  * bsc#1232201
  * bsc#1232217
  * bsc#1232218
  * bsc#1232220
  * bsc#1232221
  * bsc#1232224
  * bsc#1232229
  * bsc#1232232
  * bsc#1232233
  * bsc#1232237
  * bsc#1232251
  * bsc#1232253
  * bsc#1232254
  * bsc#1232255
  * bsc#1232259
  * bsc#1232260
  * bsc#1232262
  * bsc#1232263
  * bsc#1232264
  * bsc#1232272
  * bsc#1232279
  * bsc#1232282
  * bsc#1232285
  * bsc#1232286
  * bsc#1232287
  * bsc#1232293
  * bsc#1232304
  * bsc#1232305
  * bsc#1232307
  * bsc#1232309
  * bsc#1232310
  * bsc#1232312
  * bsc#1232313
  * bsc#1232314
  * bsc#1232316
  * bsc#1232317
  * bsc#1232318
  * bsc#1232329
  * bsc#1232332
  * bsc#1232333
  * bsc#1232334
  * bsc#1232335
  * bsc#1232337
  * bsc#1232339
  * bsc#1232342
  * bsc#1232345
  * bsc#1232349
  * bsc#1232352
  * bsc#1232354
  * bsc#1232355
  * bsc#1232357
  * bsc#1232358
  * bsc#1232359
  * bsc#1232361
  * bsc#1232362
  * bsc#1232364
  * bsc#1232366
  * bsc#1232367
  * bsc#1232368
  * bsc#1232369
  * bsc#1232370
  * bsc#1232371
  * bsc#1232374
  * bsc#1232378
  * bsc#1232381
  * bsc#1232383
  * bsc#1232385
  * bsc#1232387
  * bsc#1232392
  * bsc#1232394
  * bsc#1232395
  * bsc#1232413
  * bsc#1232416
  * bsc#1232418
  * bsc#1232424
  * bsc#1232432
  * bsc#1232435
  * bsc#1232436
  * bsc#1232442
  * bsc#1232446
  * bsc#1232483
  * bsc#1232500
  * bsc#1232501
  * bsc#1232503
  * bsc#1232504
  * bsc#1232507
  * bsc#1232519
  * bsc#1232520
  * bsc#1232552
  * bsc#1232630
  * bsc#1232631
  * bsc#1232632
  * bsc#1232757
  * bsc#1232819
  * bsc#1232860
  * bsc#1232870
  * bsc#1232873
  * bsc#1232877
  * bsc#1232878
  * bsc#1232881
  * bsc#1232884
  * bsc#1232885
  * bsc#1232887
  * bsc#1232888
  * bsc#1232890
  * bsc#1232892
  * bsc#1232896
  * bsc#1232897
  * bsc#1232905
  * bsc#1232907
  * bsc#1232919
  * bsc#1232926
  * bsc#1232928
  * bsc#1232935
  * bsc#1233035
  * bsc#1233049
  * bsc#1233051
  * bsc#1233056
  * bsc#1233057
  * bsc#1233061
  * bsc#1233063
  * bsc#1233065
  * bsc#1233067
  * bsc#1233070
  * bsc#1233073
  * bsc#1233074
  * bsc#1233100
  * bsc#1233103
  * bsc#1233104
  * bsc#1233105
  * bsc#1233106
  * bsc#1233107
  * bsc#1233108
  * bsc#1233110
  * bsc#1233111
  * bsc#1233113
  * bsc#1233114
  * bsc#1233117
  * bsc#1233123
  * bsc#1233125
  * bsc#1233129
  * bsc#1233130
  * bsc#1233134
  * bsc#1233135
  * bsc#1233150
  * bsc#1233189
  * bsc#1233191
  * bsc#1233197
  * bsc#1233205
  * bsc#1233206
  * bsc#1233209
  * bsc#1233210
  * bsc#1233211
  * bsc#1233212
  * bsc#1233214
  * bsc#1233216
  * bsc#1233238
  * bsc#1233241
  * bsc#1233253
  * bsc#1233255
  * bsc#1233293
  * bsc#1233350
  * bsc#1233452
  * bsc#1233453
  * bsc#1233454
  * bsc#1233456
  * bsc#1233457
  * bsc#1233458
  * bsc#1233460
  * bsc#1233462
  * bsc#1233463
  * bsc#1233468
  * bsc#1233471
  * bsc#1233476
  * bsc#1233478
  * bsc#1233479
  * bsc#1233481
  * bsc#1233484
  * bsc#1233487
  * bsc#1233490
  * bsc#1233491
  * bsc#1233528
  * bsc#1233548
  * bsc#1233552
  * bsc#1233553
  * bsc#1233554
  * bsc#1233555
  * bsc#1233557
  * bsc#1233560
  * bsc#1233561
  * bsc#1233570
  * bsc#1233577
  * bsc#1233580
  * bsc#1233977
  * bsc#1234012
  * bsc#1234025
  * bsc#1234085
  * bsc#1234093
  * bsc#1234098
  * bsc#1234108
  * jsc#PED-1166
  * jsc#PED-1168
  * jsc#PED-1170
  * jsc#PED-1218
  * jsc#PED-1220
  * jsc#PED-1222
  * jsc#PED-1223
  * jsc#PED-1225
  * jsc#PED-2849

  
Cross-References:

  * CVE-2021-47416
  * CVE-2021-47534
  * CVE-2021-47594
  * CVE-2022-3435
  * CVE-2022-45934
  * CVE-2022-48664
  * CVE-2022-48674
  * CVE-2022-48879
  * CVE-2022-48946
  * CVE-2022-48947
  * CVE-2022-48948
  * CVE-2022-48949
  * CVE-2022-48951
  * CVE-2022-48953
  * CVE-2022-48954
  * CVE-2022-48955
  * CVE-2022-48956
  * CVE-2022-48957
  * CVE-2022-48958
  * CVE-2022-48959
  * CVE-2022-48960
  * CVE-2022-48961
  * CVE-2022-48962
  * CVE-2022-48966
  * CVE-2022-48967
  * CVE-2022-48968
  * CVE-2022-48969
  * CVE-2022-48970
  * CVE-2022-48971
  * CVE-2022-48972
  * CVE-2022-48973
  * CVE-2022-48975
  * CVE-2022-48977
  * CVE-2022-48978
  * CVE-2022-48979
  * CVE-2022-48980
  * CVE-2022-48981
  * CVE-2022-48982
  * CVE-2022-48983
  * CVE-2022-48985
  * CVE-2022-48987
  * CVE-2022-48988
  * CVE-2022-48989
  * CVE-2022-48990
  * CVE-2022-48991
  * CVE-2022-48992
  * CVE-2022-48994
  * CVE-2022-48995
  * CVE-2022-48997
  * CVE-2022-48999
  * CVE-2022-49000
  * CVE-2022-49002
  * CVE-2022-49003
  * CVE-2022-49005
  * CVE-2022-49006
  * CVE-2022-49007
  * CVE-2022-49010
  * CVE-2022-49011
  * CVE-2022-49012
  * CVE-2022-49014
  * CVE-2022-49015
  * CVE-2022-49016
  * CVE-2022-49017
  * CVE-2022-49019
  * CVE-2022-49020
  * CVE-2022-49021
  * CVE-2022-49022
  * CVE-2022-49023
  * CVE-2022-49024
  * CVE-2022-49025
  * CVE-2022-49026
  * CVE-2022-49027
  * CVE-2022-49028
  * CVE-2022-49029
  * CVE-2022-49031
  * CVE-2022-49032
  * CVE-2023-2166
  * CVE-2023-28327
  * CVE-2023-52766
  * CVE-2023-52800
  * CVE-2023-52881
  * CVE-2023-52915
  * CVE-2023-52917
  * CVE-2023-52918
  * CVE-2023-52919
  * CVE-2023-52921
  * CVE-2023-52922
  * CVE-2023-6270
  * CVE-2024-26782
  * CVE-2024-26906
  * CVE-2024-26953
  * CVE-2024-27043
  * CVE-2024-35888
  * CVE-2024-35937
  * CVE-2024-35980
  * CVE-2024-36244
  * CVE-2024-36484
  * CVE-2024-36883
  * CVE-2024-36886
  * CVE-2024-36905
  * CVE-2024-36953
  * CVE-2024-36954
  * CVE-2024-36957
  * CVE-2024-38577
  * CVE-2024-38589
  * CVE-2024-38615
  * CVE-2024-39476
  * CVE-2024-40965
  * CVE-2024-40997
  * CVE-2024-41016
  * CVE-2024-41023
  * CVE-2024-41049
  * CVE-2024-42131
  * CVE-2024-42145
  * CVE-2024-42226
  * CVE-2024-42253
  * CVE-2024-43817
  * CVE-2024-43897
  * CVE-2024-44931
  * CVE-2024-44932
  * CVE-2024-44947
  * CVE-2024-44958
  * CVE-2024-44964
  * CVE-2024-44995
  * CVE-2024-45016
  * CVE-2024-45025
  * CVE-2024-46678
  * CVE-2024-46681
  * CVE-2024-46716
  * CVE-2024-46719
  * CVE-2024-46754
  * CVE-2024-46770
  * CVE-2024-46775
  * CVE-2024-46777
  * CVE-2024-46800
  * CVE-2024-46802
  * CVE-2024-46804
  * CVE-2024-46805
  * CVE-2024-46807
  * CVE-2024-46809
  * CVE-2024-46810
  * CVE-2024-46811
  * CVE-2024-46812
  * CVE-2024-46813
  * CVE-2024-46814
  * CVE-2024-46815
  * CVE-2024-46816
  * CVE-2024-46817
  * CVE-2024-46818
  * CVE-2024-46819
  * CVE-2024-46821
  * CVE-2024-46826
  * CVE-2024-46828
  * CVE-2024-46834
  * CVE-2024-46835
  * CVE-2024-46840
  * CVE-2024-46841
  * CVE-2024-46842
  * CVE-2024-46848
  * CVE-2024-46849
  * CVE-2024-46853
  * CVE-2024-46854
  * CVE-2024-46855
  * CVE-2024-46857
  * CVE-2024-46859
  * CVE-2024-46864
  * CVE-2024-46871
  * CVE-2024-47660
  * CVE-2024-47661
  * CVE-2024-47663
  * CVE-2024-47664
  * CVE-2024-47665
  * CVE-2024-47667
  * CVE-2024-47668
  * CVE-2024-47669
  * CVE-2024-47670
  * CVE-2024-47671
  * CVE-2024-47672
  * CVE-2024-47673
  * CVE-2024-47674
  * CVE-2024-47679
  * CVE-2024-47682
  * CVE-2024-47684
  * CVE-2024-47685
  * CVE-2024-47692
  * CVE-2024-47693
  * CVE-2024-47695
  * CVE-2024-47696
  * CVE-2024-47697
  * CVE-2024-47698
  * CVE-2024-47699
  * CVE-2024-47701
  * CVE-2024-47704
  * CVE-2024-47705
  * CVE-2024-47706
  * CVE-2024-47707
  * CVE-2024-47709
  * CVE-2024-47710
  * CVE-2024-47712
  * CVE-2024-47713
  * CVE-2024-47718
  * CVE-2024-47720
  * CVE-2024-47723
  * CVE-2024-47727
  * CVE-2024-47728
  * CVE-2024-47730
  * CVE-2024-47735
  * CVE-2024-47737
  * CVE-2024-47738
  * CVE-2024-47739
  * CVE-2024-47742
  * CVE-2024-47745
  * CVE-2024-47747
  * CVE-2024-47748
  * CVE-2024-47749
  * CVE-2024-47756
  * CVE-2024-47757
  * CVE-2024-49850
  * CVE-2024-49851
  * CVE-2024-49852
  * CVE-2024-49855
  * CVE-2024-49858
  * CVE-2024-49860
  * CVE-2024-49861
  * CVE-2024-49863
  * CVE-2024-49866
  * CVE-2024-49867
  * CVE-2024-49868
  * CVE-2024-49870
  * CVE-2024-49871
  * CVE-2024-49875
  * CVE-2024-49877
  * CVE-2024-49879
  * CVE-2024-49881
  * CVE-2024-49882
  * CVE-2024-49883
  * CVE-2024-49884
  * CVE-2024-49886
  * CVE-2024-49890
  * CVE-2024-49891
  * CVE-2024-49892
  * CVE-2024-49894
  * CVE-2024-49895
  * CVE-2024-49896
  * CVE-2024-49897
  * CVE-2024-49899
  * CVE-2024-49900
  * CVE-2024-49901
  * CVE-2024-49902
  * CVE-2024-49903
  * CVE-2024-49905
  * CVE-2024-49906
  * CVE-2024-49907
  * CVE-2024-49908
  * CVE-2024-49909
  * CVE-2024-49911
  * CVE-2024-49912
  * CVE-2024-49913
  * CVE-2024-49914
  * CVE-2024-49917
  * CVE-2024-49918
  * CVE-2024-49919
  * CVE-2024-49920
  * CVE-2024-49921
  * CVE-2024-49922
  * CVE-2024-49923
  * CVE-2024-49924
  * CVE-2024-49925
  * CVE-2024-49929
  * CVE-2024-49930
  * CVE-2024-49933
  * CVE-2024-49934
  * CVE-2024-49935
  * CVE-2024-49936
  * CVE-2024-49938
  * CVE-2024-49939
  * CVE-2024-49945
  * CVE-2024-49946
  * CVE-2024-49947
  * CVE-2024-49949
  * CVE-2024-49950
  * CVE-2024-49954
  * CVE-2024-49955
  * CVE-2024-49957
  * CVE-2024-49958
  * CVE-2024-49959
  * CVE-2024-49960
  * CVE-2024-49962
  * CVE-2024-49963
  * CVE-2024-49965
  * CVE-2024-49966
  * CVE-2024-49967
  * CVE-2024-49968
  * CVE-2024-49969
  * CVE-2024-49973
  * CVE-2024-49974
  * CVE-2024-49975
  * CVE-2024-49981
  * CVE-2024-49982
  * CVE-2024-49983
  * CVE-2024-49985
  * CVE-2024-49989
  * CVE-2024-49991
  * CVE-2024-49993
  * CVE-2024-49995
  * CVE-2024-49996
  * CVE-2024-50000
  * CVE-2024-50001
  * CVE-2024-50002
  * CVE-2024-50003
  * CVE-2024-50006
  * CVE-2024-50007
  * CVE-2024-50008
  * CVE-2024-50009
  * CVE-2024-50013
  * CVE-2024-50014
  * CVE-2024-50017
  * CVE-2024-50019
  * CVE-2024-50024
  * CVE-2024-50025
  * CVE-2024-50026
  * CVE-2024-50028
  * CVE-2024-50031
  * CVE-2024-50033
  * CVE-2024-50035
  * CVE-2024-50041
  * CVE-2024-50044
  * CVE-2024-50045
  * CVE-2024-50046
  * CVE-2024-50047
  * CVE-2024-50048
  * CVE-2024-50049
  * CVE-2024-50055
  * CVE-2024-50058
  * CVE-2024-50059
  * CVE-2024-50061
  * CVE-2024-50062
  * CVE-2024-50063
  * CVE-2024-50067
  * CVE-2024-50073
  * CVE-2024-50074
  * CVE-2024-50077
  * CVE-2024-50078
  * CVE-2024-50081
  * CVE-2024-50082
  * CVE-2024-50089
  * CVE-2024-50093
  * CVE-2024-50095
  * CVE-2024-50096
  * CVE-2024-50098
  * CVE-2024-50099
  * CVE-2024-50103
  * CVE-2024-50108
  * CVE-2024-50110
  * CVE-2024-50115
  * CVE-2024-50116
  * CVE-2024-50117
  * CVE-2024-50124
  * CVE-2024-50125
  * CVE-2024-50127
  * CVE-2024-50128
  * CVE-2024-50131
  * CVE-2024-50134
  * CVE-2024-50135
  * CVE-2024-50138
  * CVE-2024-50141
  * CVE-2024-50146
  * CVE-2024-50147
  * CVE-2024-50148
  * CVE-2024-50150
  * CVE-2024-50153
  * CVE-2024-50154
  * CVE-2024-50155
  * CVE-2024-50156
  * CVE-2024-50160
  * CVE-2024-50167
  * CVE-2024-50171
  * CVE-2024-50179
  * CVE-2024-50180
  * CVE-2024-50182
  * CVE-2024-50183
  * CVE-2024-50184
  * CVE-2024-50186
  * CVE-2024-50187
  * CVE-2024-50188
  * CVE-2024-50189
  * CVE-2024-50192
  * CVE-2024-50194
  * CVE-2024-50195
  * CVE-2024-50196
  * CVE-2024-50198
  * CVE-2024-50201
  * CVE-2024-50205
  * CVE-2024-50208
  * CVE-2024-50209
  * CVE-2024-50215
  * CVE-2024-50218
  * CVE-2024-50229
  * CVE-2024-50230
  * CVE-2024-50232
  * CVE-2024-50233
  * CVE-2024-50234
  * CVE-2024-50236
  * CVE-2024-50237
  * CVE-2024-50249
  * CVE-2024-50255
  * CVE-2024-50259
  * CVE-2024-50261
  * CVE-2024-50264
  * CVE-2024-50265
  * CVE-2024-50267
  * CVE-2024-50268
  * CVE-2024-50269
  * CVE-2024-50271
  * CVE-2024-50273
  * CVE-2024-50274
  * CVE-2024-50279
  * CVE-2024-50282
  * CVE-2024-50287
  * CVE-2024-50289
  * CVE-2024-50290
  * CVE-2024-50292
  * CVE-2024-50295
  * CVE-2024-50298
  * CVE-2024-50301
  * CVE-2024-50302
  * CVE-2024-53052
  * CVE-2024-53058
  * CVE-2024-53059
  * CVE-2024-53060
  * CVE-2024-53061
  * CVE-2024-53063
  * CVE-2024-53066
  * CVE-2024-53068
  * CVE-2024-53079
  * CVE-2024-53085
  * CVE-2024-53088
  * CVE-2024-53104
  * CVE-2024-53110

  
CVSS scores:

  * CVE-2021-47416 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47534 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47534 ( NVD ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47594 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47594 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-3435 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-3435 ( NVD ):  4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2022-45934 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-45934 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48674 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48674 ( NVD ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48674 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48879 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48879 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48946 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48946 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48946 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48947 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48947 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48948 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48948 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48948 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48949 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48949 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48949 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48951 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48951 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48951 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48953 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48953 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48954 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48954 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48954 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48955 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48955 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48956 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48956 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48957 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48957 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48957 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48958 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48959 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48959 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48959 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48960 ( SUSE ):  9.2
    CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48960 ( SUSE ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48960 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48961 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48961 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48961 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48962 ( SUSE ):  7.2
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48962 ( SUSE ):  8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2022-48962 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48966 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48966 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48966 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-48967 ( SUSE ):  7.0
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48967 ( SUSE ):  7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2022-48967 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2022-48968 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48968 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48968 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48969 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48969 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48970 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48971 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48971 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48971 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48972 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48972 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48972 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48973 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48973 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-48973 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48975 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48975 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48977 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48977 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48978 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48978 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-48978 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48979 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48979 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48980 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48980 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-48980 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48981 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48981 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-48981 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48982 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48982 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48983 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48983 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48985 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48987 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48987 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48987 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48988 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48988 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48988 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48989 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48989 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48989 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48990 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48990 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48990 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48991 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48991 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48991 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48992 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48992 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48992 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48994 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-48994 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2022-48994 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48995 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48995 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48995 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48997 ( SUSE ):  1.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48997 ( SUSE ):  2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
  * CVE-2022-48997 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48999 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48999 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-49000 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49000 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49000 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49002 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49002 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49002 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49003 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49003 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49003 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49005 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-49005 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  * CVE-2022-49005 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49006 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49006 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49006 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49007 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49007 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49010 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49010 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49011 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49011 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49012 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49012 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49014 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49014 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49015 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49015 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49017 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49019 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49020 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49020 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49020 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49021 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49021 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49022 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49022 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49023 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49023 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49024 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49024 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49025 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49025 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49026 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49026 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49027 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49027 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-49028 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49028 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49029 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49029 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49031 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49031 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-49032 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49032 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-2166 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-2166 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-28327 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-28327 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52800 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52881 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52915 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52917 ( SUSE ):  4.6
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-52917 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52917 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52918 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52918 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52919 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52921 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52921 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52921 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52922 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52922 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52922 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6270 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6270 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26782 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26906 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27043 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35888 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35888 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35937 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-36244 ( SUSE ):  3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
  * CVE-2024-36484 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36883 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36886 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36886 ( NVD ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36905 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36953 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36953 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36954 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36957 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38577 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38577 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38589 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38615 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39476 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39476 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40965 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40965 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40997 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40997 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-41023 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-41023 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-41049 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41049 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-42131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42131 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42145 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42145 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42145 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42226 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42226 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42253 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42253 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-42253 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43817 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43897 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43897 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44931 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-44931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44931 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44932 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44932 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44947 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
  * CVE-2024-44947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44947 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44958 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44964 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
  * CVE-2024-44964 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44964 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44995 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44995 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45016 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-45016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45025 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45025 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46678 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
  * CVE-2024-46678 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46678 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46681 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
  * CVE-2024-46681 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-46681 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46716 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-46719 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46719 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46754 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46754 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46770 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46770 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46775 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46775 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46777 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46777 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46800 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46800 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46800 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46802 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46802 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46802 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46804 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46804 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-46804 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46805 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46805 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46805 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46807 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46807 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46807 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46809 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46809 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46810 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46810 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46811 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46811 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46812 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46812 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46812 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46813 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46813 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46813 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46814 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46814 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46814 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46815 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46815 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46815 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46816 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46816 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46816 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46817 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46817 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46817 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46818 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46818 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46818 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46819 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46819 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46821 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46826 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46834 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46834 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46835 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46835 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46840 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46840 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46841 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46842 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46848 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46848 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46849 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46849 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46853 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46854 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-46854 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46855 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46857 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46859 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46864 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46871 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46871 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-46871 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47660 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47660 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47660 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47661 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47661 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-47661 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47663 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47663 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47664 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47664 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47664 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47665 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47665 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47665 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47667 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47667 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2024-47667 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47668 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47668 ( SUSE ):  4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-47668 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47669 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47669 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-47669 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47670 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47670 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47670 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47671 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-47671 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-47672 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47672 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47673 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47673 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47674 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47674 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47674 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47679 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47679 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47679 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47682 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47682 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47682 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47684 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47684 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47684 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47685 ( SUSE ):  6.3
    CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47685 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  * CVE-2024-47685 ( NVD ):  9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47692 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47692 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47692 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47693 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47693 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-47693 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47695 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47695 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47695 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47696 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47696 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47696 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47697 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47697 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47697 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47698 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47698 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47698 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47699 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47699 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47701 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47701 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47701 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47704 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47704 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47704 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47705 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47705 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47705 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47706 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47706 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47706 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47707 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47707 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47707 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47709 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47709 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47709 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47710 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47710 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47710 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47712 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47712 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47713 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47713 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47718 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47718 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47720 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47720 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47720 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47723 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47723 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47723 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47727 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47727 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47727 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47728 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47730 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47730 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47735 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47737 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47737 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47737 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47738 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47738 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47739 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47739 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47742 ( SUSE ):  8.3
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47742 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2024-47742 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47745 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47745 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47745 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47747 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47747 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47747 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47748 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47748 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47748 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47749 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47749 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47749 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47756 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47756 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47756 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47757 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47757 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47757 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49850 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49850 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49851 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49851 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49852 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49852 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49855 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49855 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49855 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49858 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49858 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-49858 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49860 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49860 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49860 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49861 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-49861 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-49861 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-49863 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49863 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49866 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49866 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49866 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49867 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49867 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49867 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49868 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49868 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49868 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49870 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-49870 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-49870 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49871 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49871 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49875 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49875 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49875 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-49877 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49877 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49879 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49879 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49881 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49882 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49883 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49883 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49886 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49890 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49890 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49890 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49891 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49891 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49891 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49892 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49892 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49892 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49894 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49894 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49894 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49895 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49895 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-49895 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49896 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49896 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49897 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49897 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49897 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49899 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49899 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49899 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49900 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49900 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49900 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49901 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49901 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49902 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49902 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49902 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49903 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49903 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49903 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49905 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49905 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49906 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49906 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49906 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49907 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49907 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49907 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49908 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49908 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49909 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49909 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49909 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49911 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49911 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49911 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49912 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49912 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49913 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49913 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49914 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49914 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49917 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49917 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49918 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49918 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49919 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49919 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49920 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49920 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49920 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49921 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49921 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49921 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49922 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49922 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49922 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49923 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49923 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49923 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49924 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49924 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49924 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49925 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49925 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49925 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49929 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49929 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49929 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49930 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49930 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49930 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49933 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49933 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49933 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49934 ( SUSE ):  4.1
    CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49934 ( SUSE ):  4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49934 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49935 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49935 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49935 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49936 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49936 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49936 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49938 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49938 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49939 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49939 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49939 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49945 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49945 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49946 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49946 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49947 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49949 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49949 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49954 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49954 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49955 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49955 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49957 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49958 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49959 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49959 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49960 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49960 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49960 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49962 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49962 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49962 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49963 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49963 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49965 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49965 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49966 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49966 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49967 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49968 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49968 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-49968 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49969 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49969 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49969 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49973 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49973 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49974 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49974 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49974 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49975 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49975 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49981 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49981 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49982 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49983 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49983 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49985 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49989 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49989 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49989 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49991 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49991 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49991 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49993 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49993 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49993 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49995 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49995 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49995 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49996 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49996 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50000 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50001 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50001 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50002 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50002 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50003 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50003 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50003 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50006 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50006 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50006 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50007 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50007 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50007 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50008 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50008 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-50008 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50009 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50009 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50009 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50013 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50013 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50014 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50014 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50017 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50019 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50024 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50024 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50025 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50025 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50026 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50026 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50028 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50028 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50031 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50031 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50033 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50033 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50035 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50035 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50035 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50041 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50041 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50044 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50044 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50045 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50045 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50046 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50046 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50047 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50047 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50048 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50048 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50049 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50049 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50055 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50055 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50058 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50058 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50059 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50059 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50059 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50061 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50061 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50062 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50062 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50063 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50063 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50063 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50067 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50067 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50067 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50073 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50074 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50074 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50077 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50077 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50078 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50078 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50081 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50081 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50082 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50089 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50089 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2024-50089 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50093 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50095 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50096 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50096 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50098 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50099 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50099 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50103 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50103 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50108 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50108 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50110 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50110 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50115 ( SUSE ):  4.5
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
  * CVE-2024-50115 ( SUSE ):  7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
  * CVE-2024-50115 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50116 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50116 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50116 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50117 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50117 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50117 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50124 ( SUSE ):  7.5
    CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50124 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50124 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50124 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( SUSE ):  7.5
    CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50125 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50127 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50128 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50128 ( SUSE ):  6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50128 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50131 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50134 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50134 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-50134 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50135 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50135 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50135 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50138 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50138 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50138 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50141 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50141 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50146 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50146 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50146 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50147 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50147 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50147 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50148 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50148 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50148 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50150 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50150 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50150 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50153 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50153 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50153 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50154 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50154 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50155 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50155 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50156 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50156 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50160 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50160 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50160 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50167 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50167 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50171 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50171 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-50171 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50179 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50179 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50180 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50180 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-50180 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50182 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50182 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50182 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50183 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50183 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50183 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50184 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50184 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50184 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50186 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50186 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50187 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50187 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50188 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50189 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50189 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50192 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50192 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50194 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50194 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50195 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50196 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50196 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50198 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50198 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50201 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50205 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50205 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50205 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50208 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50208 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50208 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50209 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50209 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50209 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50215 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50215 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50218 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50229 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50229 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50229 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50230 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50230 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50230 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50232 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50232 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-50232 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50233 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50233 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-50233 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50234 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50234 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50234 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50236 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50236 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50236 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50237 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50237 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50237 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50249 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50249 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50255 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50255 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50255 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50259 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50259 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50259 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50261 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50261 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50261 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50261 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50265 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50265 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50267 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50267 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50267 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50268 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50268 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50269 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50269 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50271 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50271 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50273 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50273 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50274 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50274 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50279 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50279 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50282 ( SUSE ):  7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2024-50282 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50287 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50290 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50292 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50295 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50298 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50298 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50301 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50301 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50302 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50302 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53052 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53052 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53058 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53058 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53059 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53060 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53061 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53061 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53063 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53066 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53066 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53068 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53068 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53079 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-53079 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53085 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53085 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53088 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53088 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53104 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53104 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53110 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53110 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53110 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * Basesystem Module 15-SP5
  * Development Tools Module 15-SP5
  * Legacy Module 15-SP5
  * SUSE Linux Enterprise Desktop 15 SP5
  * SUSE Linux Enterprise High Availability Extension 15 SP5
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Live Patching 15-SP5
  * SUSE Linux Enterprise Micro 5.5
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5

  
  
An update that solves 439 vulnerabilities, contains nine features and has 68
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
    (bsc#1226560).
  * CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
  * CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
  * CVE-2022-48957: dpaa2-switch: Fix memory leak in
    dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()
    (bsc#1231973).
  * CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in
    greth_init_rings() (bsc#1231889).
  * CVE-2022-48959: net: dsa: sja1105: fix memory leak in
    sja1105_setup_devlink_regions() (bsc#1231976).
  * CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx()
    (bsc#1231979).
  * CVE-2022-48962: net: hisilicon: Fix potential use-after-free in
    hisi_femac_rx() (bsc#1232286).
  * CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
  * CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in
    sja1105_init_l2_policing() (bsc#1232233).
  * CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
    (bsc#1231959).
  * CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow
    anon_vma (bsc#1232070).
  * CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
  * CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
  * CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open
    (bsc#1232175).
  * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
  * CVE-2024-26906: Fixed invalid vsyscall page read for
    copy_from_kernel_nofault() (bsc#1223202).
  * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
    (bsc#1223656).
  * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
    (bsc#1224518).
  * CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
    (bsc#1224526).
  * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
    entire cycle too (bsc#1226797).
  * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
  * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
  * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
    (bsc#1225742).
  * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
    (bsc#1225764).
  * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
    (bsc#1225762).
  * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
    (bsc#1226748).
  * CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
  * CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to
    clear MD_SB_CHANGE_PENDING (bsc#1227437).
  * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
    (bsc#1227885).
  * CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
    (bsc#1227853).
  * CVE-2024-41023: sched/deadline: Fix task_struct reference leak
    (bsc#1228430).
  * CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer
    events without TRB (bsc#1228709).
  * CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
    (bsc#1229005).
  * CVE-2024-44931: gpio: prevent potential speculation leaks in
    gpio_device_get_desc() (bsc#1229837).
  * CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
  * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
    (bsc#1230179).
  * CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
    reset (bsc#1230220).
  * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
    resetting (bsc#1230231).
  * CVE-2024-45016: netem: fix return value if duplicate enqueue fails
    (bsc#1230429).
  * CVE-2024-45025: fix bitmap corruption on close_range() with
    CLOSE_RANGE_UNSHARE (bsc#1230456).
  * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex
    (bsc#1230550).
  * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
  * CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in
    msgdma_free_descriptor (bsc#1230715).
  * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
    (bsc#1230801).
  * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
    (bsc#1230763).
  * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
  * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
  * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
    (bsc#1230827).
  * CVE-2024-46809: drm/amd/display: Check BIOS images before it is used
    (bsc#1231148).
  * CVE-2024-46811: drm/amd/display: Fix index may exceed array range within
    fpu_update_bw_bounding_box (bsc#1231179).
  * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
    (bsc#1231191).
  * CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation
    (bsc#1231193).
  * CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing
    reader_wm_sets (bsc#1231195).
  * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
    greater than max_links (bsc#1231197).
  * CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums
    greater than 6 (bsc#1231200).
  * CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index
    (bsc#1231203).
  * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
    (bsc#1231115).
  * CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma
    (bsc#1231114).
  * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
    indirection tables (bsc#1231096).
  * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
    (bsc#1231105).
  * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
    btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
  * CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
  * CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
  * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
  * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
  * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs
    (bsc#1231087).
  * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
  * CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t
    (bsc#1231496).
  * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
    provided by the firmware (bsc#1231442).
  * CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in
    __genradix_ptr_alloc() (bsc#1231502).
  * CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is
    dead (bsc#1231540).
  * CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
    (bsc#1231539).
  * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
    (bsc#1231673).
  * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
    (bsc#1231930).
  * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
    (bsc#1231987).
  * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
    (bsc#1231998).
  * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
  * CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an
    error (bsc#1231920).
  * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
    using it (bsc#1231944).
  * CVE-2024-47705: block: fix potential invalid pointer dereference in
    blk_add_partition (bsc#1231872).
  * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
    (bsc#1231942).
  * CVE-2024-47707: ipv6: avoid possible NULL deref in
    rt6_uncached_list_flush_dev() (bsc#1231935).
  * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
    (bsc#1232049).
  * CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in
    dcn30_set_output_transfer_func (bsc#1232043).
  * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
  * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
    (bsc#1232075).
  * CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX
    either (bsc#1232114).
  * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
    seq_nr overflow (bsc#1232124).
  * CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
    LSMs in between (bsc#1232135).
  * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
    Due to Race Condition (bsc#1232145).
  * CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly
    (bsc#1232174).
  * CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete()
    (bsc#1232187).
  * CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid
    corruption (bsc#1232251).
  * CVE-2024-49860: ACPI: sysfs: validate return type of _STR method
    (bsc#1231861).
  * CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing
    (bsc#1232259).
  * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
    new trasacntion (bsc#1232272).
  * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
  * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
    (bsc#1232200).
  * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
    (bsc#1232199).
  * CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds
    bug (bsc#1232196).
  * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
    (bsc#1232217).
  * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
    to 1 (bsc#1232220).
  * CVE-2024-49896: drm/amd/display: Check stream before comparing them
    (bsc#1232221).
  * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
    (bsc#1232355).
  * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
    (bsc#1232358).
  * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
    nullptrs (bsc#1232305).
  * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
    (bsc#1232332).
  * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
    dcn32_set_output_transfer_func (bsc#1232337).
  * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
    dcn20_set_output_transfer_func (bsc#1232366).
  * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
    (bsc#1232369).
  * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
    clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
  * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
    dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
  * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
    dcn201_acquire_free_pipe_for_layer (bsc#1231968).
  * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
    (bsc#1232313).
  * CVE-2024-49921: drm/amd/display: Check null pointers before used
    (bsc#1232371).
  * CVE-2024-49922: drm/amd/display: Check null pointers before using them
    (bsc#1232374).
  * CVE-2024-49923: drm/amd/display: Pass non-null to
    dcn20_validate_apply_pipe_split_flags (bsc#1232361).
  * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
    (bsc#1232224)
  * CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference
    (bsc#1232253).
  * CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats
    (bsc#1232260).
  * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
  * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
    dentry.d_name.name (bsc#1232387).
  * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
    (bsc#1232424).
  * CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER
    (bsc#1232381).
  * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
    associated structure (bsc#1232165).
  * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
    (bsc#1232164).
  * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
    UFO (bsc#1232160).
  * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
  * CVE-2024-49954: static_call: Replace pointless WARN_ON() in
    static_call_module_notify() (bsc#1232155).
  * CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a
    battery hook (bsc#1232154).
  * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
    reflink tree (bsc#1232151).
  * CVE-2024-49959: jbd2: stop waiting for space when
    jbd2_cleanup_journal_tail() returns error (bsc#1232149).
  * CVE-2024-49960: ext4: fix timer use-after-free on failed mount
    (bsc#1232395).
  * CVE-2024-49967: ext4: no need to continue when the number of entries is 1
    (bsc#1232140).
  * CVE-2024-49968: ext4: fix error message when rejecting the default hash
    (bsc#1232264).
  * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
    transformation (bsc#1232519).
  * CVE-2024-49973: r8169: add tally counter fields added with RTL8125
    (bsc#1232105).
  * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
    (bsc#1232383).
  * CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma
    (bsc#1232104).
  * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
    double-free (bsc#1232096).
  * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
    unload (bsc#1232483).
  * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
    (bsc#1232282).
  * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
    with 0 count (bsc#1232316).
  * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
  * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
    (bsc#1232089).
  * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
    (bsc#1232085).
  * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
    (bsc#1232084).
  * CVE-2024-50002: static_call: Handle module init failure correctly in
    static_call_del_module() (bsc#1232083).
  * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
    (bsc#1232442).
  * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
    value (bsc#1232318).
  * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
    (bsc#1232446).
  * CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
  * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
  * CVE-2024-50028: thermal: core: Reference count the zone in
    thermal_zone_get_by_id() (bsc#1231950).
  * CVE-2024-50033: slip: make slhc_remember() more robust against malicious
    packets (bsc#1231914).
  * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
  * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
    mac_filter_hash (bsc#1231907).
  * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
    (bsc#1231903).
  * CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in
    nfs42_complete_copies() (bsc#1231902).
  * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
  * CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs
    (bsc#1232310).
  * CVE-2024-50055: driver core: bus: Fix double free in driver API
    bus_register() (bsc#1232329).
  * CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too
    (bsc#1232285).
  * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
    switchtec_ntb_remove due to race condition (bsc#1232345).
  * CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in
    cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
  * CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
  * CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
    (bsc#1232520).
  * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
    (bsc#1232501).
  * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
    rq_qos_wake_function race (bsc#1232500).
  * CVE-2024-50089: unicode: Do not special case ignorable code points
    (bsc#1232860).
  * CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during
    module unload (bsc#1232877).
  * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
    (bsc#1232881).
  * CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too
    (bsc#1232884).
  * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
    (bsc#1232885).
  * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
    (bsc#1232919).
  * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
  * CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
    (bsc#1232907).
  * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
  * CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
    vbva_mouse_pointer_shape (bsc#1232890).
  * CVE-2024-50135: nvme-pci: fix race condition between reset and
    nvme_dev_disable() (bsc#1232888).
  * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
  * CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure
    (bsc#1233056).
  * CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
  * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
    target_alloc_device() (bsc#1233061).
  * CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler()
    (bsc#1233070).
  * CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
    (bsc#1233049).
  * CVE-2024-50171: net: systemport: fix potential memory leak in
    bcm_sysport_xmit() (bsc#1233057).
  * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
    map (bsc#1233129).
  * CVE-2024-50184: virtio_pmem: Check device status before requesting flush
    (bsc#1233135).
  * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
    (bsc#1233110).
  * CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber
    (bsc#1233107).
  * CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-
    mapped VPEs (bsc#1233106).
  * CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in
    pc_clock_settime() (bsc#1233103).
  * CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts
    (bsc#1233113).
  * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
    apply_constraint_to_size() (bsc#1233293).
  * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
    (bsc#1233117).
  * CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks
    (bsc#1233205).
  * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
    flag (bsc#1233206).
  * CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
    nsim_nexthop_bucket_activity_write() (bsc#1233214).
  * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
    packet (bsc#1233253).
  * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
    occurring in vsk->trans (bsc#1233453).
  * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk
    (bsc#1233456).
  * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
  * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
    the list (bsc#1233462).
  * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
    (bsc#1233463).
  * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
    resizing (bsc#1233468).
  * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
  * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
    (bsc#1233484).
  * CVE-2024-50298: net: enetc: allocate vf_state during PF probes
    (bsc#1233487).
  * CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start
    write (bsc#1233548).
  * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
    SKB data (bsc#1233552).
  * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
  * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
    (bsc#1233557).
  * CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
    scmi_bus_notifier() (bsc#1233561).
  * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
    (bsc#1233570).
  * CVE-2024-53088: i40e: fix race condition by adding filter's intermediate
    sync state (bsc#1233580).
  * CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
    UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
  * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
    (bsc#1234085).

The following non-security bugs were fixed:

  * acpi: battery: Call power_supply_changed() when adding hooks (bsc#1232154)
  * acpi: battery: Simplify battery hook locking (bsc#1232154)
  * acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
    detection issue (stable-fixes).
  * acpi: CPPC: Fix _CPC register setting issue (git-fixes).
  * acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
  * acpi: EC: Do not release locks during operation region accesses (stable-
    fixes).
  * acpi: PAD: fix crash in exit_round_robin() (stable-fixes).
  * acpi: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
  * acpi: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-
    fixes).
  * acpi: resource: Add another DMI match for the TongFang GMxXGxx (stable-
    fixes).
  * acpi: resource: Add Asus ExpertBook B2502CVA to
    irq1_level_low_skip_override[] (stable-fixes).
  * acpi: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[]
    (stable-fixes).
  * acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
    fixes).
  * acpica: check null return of ACPI_ALLOCATE_ZEROED() in
    acpi_db_convert_to_package() (stable-fixes).
  * acpica: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
  * acpica: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
  * acpica: iasl: handle empty connection_node (stable-fixes).
  * ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
  * adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed
    with "suse_" to make it more obvious its a downstream thing.
  * add bug reference for a mana change (bsc#1229769).
  * add bug references to existing mana changes (bsc#1232033, bsc#1232034,
    bsc#1232036).
  * add bugreference to a hv_netvsc patch (bsc#1232413).
  * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).
  * alsa: 6fire: Release resources at card release (git-fixes).
  * alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
  * alsa: asihpi: Fix potential OOB array access (stable-fixes).
  * alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * alsa: core: add isascii() check to card ID generator (stable-fixes).
  * alsa: firewire-lib: Avoid division by zero in apply_constraint_to_size()
    (git-fixes).
  * alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
    fixes).
  * alsa: hda: cs35l41: fix module autoloading (git-fixes).
  * alsa: hda: Fix kctl->id initialization (git-fixes).
  * alsa: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-
    fixes).
  * alsa: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
    1000 G2 (git-fixes).
  * alsa: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
  * alsa: hda/cs8409: Fix possible NULL dereference (git-fixes).
  * alsa: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).
  * alsa: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
  * alsa: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
  * alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
  * alsa: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
  * alsa: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
  * alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
    fixes).
  * alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
  * alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
    fixes).
  * alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
    fixes).
  * alsa: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
  * alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
  * alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
  * alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
  * alsa: hda/realtek: Update default depop procedure (git-fixes).
  * alsa: hdsp: Break infinite MIDI input flush loop (stable-fixes).
  * alsa: line6: add hw monitor volume control to POD HD500X (stable-fixes).
  * alsa: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
  * alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * alsa: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
  * alsa: usb-audio: Add input value sanity checks for standard types (stable-
    fixes).
  * alsa: usb-audio: Add logitech Audio profile quirk (stable-fixes).
  * alsa: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
  * alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
  * alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
  * alsa: usb-audio: Define macros for quirk table entries (stable-fixes).
  * alsa: usb-audio: Replace complex quirk lines with macros (stable-fixes).
  * alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * amd-pstate: Set min_perf to nominal_perf for active mode performance gov
    (git-fixes).
  * arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
  * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
  * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399
    Puma (git-fixes).
  * arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
  * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
  * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
  * arm64: Force position-independent veneers (git-fixes).
  * arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
  * arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
  * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
  * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
    fixes)
  * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
  * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
    fixes)
  * arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
  * arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
  * asoc: allow module autoloading for table db1200_pids (stable-fixes).
  * asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
  * asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
    (git-fixes).
  * asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
    default regs values (stable-fixes).
  * asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
  * asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
  * asoc: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-
    fixes).
  * asoc: intel: fix module autoloading (stable-fixes).
  * asoc: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
    (git-fixes).
  * asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
    fixes).
  * asoc: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-
    fixes).
  * asoc: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
  * asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
    fixes).
  * asoc: tda7419: fix module autoloading (stable-fixes).
  * blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
  * block: Avoid leaking hctx->nr_active counter on batched completion
    (bsc#1231923).
  * block: print symbolic error name instead of error code (bsc#1231872).
  * bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
  * bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-
    fixes).
  * bluetooth: Call iso_exit() on module unload (git-fixes).
  * bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
  * bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
  * bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
  * bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
    fixes).
  * bluetooth: Remove debugfs directory on module init failure (git-fixes).
  * bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-
    fixes).
  * bnxt_en: Fix the PCI-AER routines (git-fixes).
  * bnxt_en: refactor reset close code (git-fixes).
  * bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
  * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
    (git-fixes).
  * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
  * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
  * bnxt_en: Wait for FLR to complete during probe (git-fixes).
  * bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
  * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
  * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
  * bpf, x64: Remove tail call detection (git-fixes).
  * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
  * bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to
    pahole flags for v1.25 (bsc#1230414 bsc#1229450).
  * bpf: Allow helpers to accept pointers with a fixed size (git-fixes).
  * bpf: Check for helper calls in check_subprogs() (git-fixes).
  * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
  * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
  * bpf: Fix helper writes to read-only maps (git-fixes).
  * bpf: Fix pointer-leak due to insufficient speculative store bypass
    mitigation (bsc#1231375).
  * bpf: Fix tailcall cases in test_bpf (git-fixes).
  * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
  * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-
    fixes).
  * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
  * btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).
  * bus: integrator-lm: fix OF node leak in probe() (git-fixes).
  * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
    fails (git-fixes).
  * can: c_can: fix {rx,tx}_errors statistics (git-fixes).
  * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
  * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
    (git-fixes).
  * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
  * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
    fixes).
  * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
    (git-fixes).
  * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
  * ceph: fix cap ref leak via netfs init_request (bsc#1231383).
  * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
  * char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-
    fixes).
  * chtls: fix tp->rcv_tstamp initialization (git-fixes).
  * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
  * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
    (bsc#1227885).
  * comedi: Flush partial mappings in error case (git-fixes).
  * comedi: ni_routing: tools: Check when the file could not be opened (stable-
    fixes).
  * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems
    (git-fixes).
  * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
  * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
  * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
  * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
    fixes).
  * crypto: cavium - Fix the if condition to exit loop after timeout (git-
    fixes).
  * crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call
    (bsc#1232075)
  * crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF
    (bsc#1232075)
  * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
    (git-fixes).
  * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
  * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
  * cxgb4: Properly lock TX queue for the selftest (git-fixes).
  * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
    fixes).
  * debugfs: fix automount d_fsdata usage (git-fixes).
  * dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown
    (bsc#1216813).
  * drbd: Add NULL check for net_conf to prevent dereference in state validation
    (git-fixes).
  * drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
  * driver core: bus: Return -EIO instead of 0 when show/store invalid bus
    attribute (stable-fixes).
  * drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-
    fixes).
  * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
  * drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
  * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
  * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
  * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
  * drm/amd/display: Add null check for 'afb' in
    amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).
  * drm/amd/display: Add null check for top_pipe_to_program in
    commit_planes_for_stream (stable-fixes).
  * drm/amd/display: Allow backlight to go below
    `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
  * drm/amd/display: Check link_res->hpo_dp_link_enc before using it
    (bsc#1231944)
  * drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
  * drm/amd/display: Check null pointers before using dc->clk_mgr (stable-
    fixes).
  * drm/amd/display: Check stream before comparing them (stable-fixes).
  * drm/amd/display: Fix index out of bounds in DCN30 color transformation
    (stable-fixes).
  * drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format
    translation (stable-fixes).
  * drm/amd/display: Fix index out of bounds in degamma hardware format
    translation (stable-fixes).
  * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-
    fixes).
  * drm/amd/display: Fix system hang while resume with TBT monitor (stable-
    fixes).
  * drm/amd/display: Handle null 'stream_status' in
    'planes_changed_for_existing_stream' (stable-fixes).
  * drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-
    fixes).
  * drm/amd/display: Round calculated vtotal (stable-fixes).
  * drm/amd/display: Validate backlight caps are sane (stable-fixes).
  * drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).
  * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
    fixes).
  * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
  * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
    fixes).
  * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-
    fixes).
  * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
  * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-
    fixes).
  * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
  * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
    fixes).
  * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
  * drm/amdgpu: Replace one-element array with flexible-array member (stable-
    fixes).
  * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
  * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
  * drm/bridge: tc358767: Fix link properties discovery (git-fixes).
  * drm/bridge: tc358768: Fix DSI command tx (git-fixes).
  * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
    fixes).
  * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
    fixes).
  * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
  * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
  * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
    (git-fixes).
  * drm/msm/dpu: do not always program merge_3d block (git-fixes).
  * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
  * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
    (git-fixes).
  * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
  * drm/omap: Fix possible NULL dereference (git-fixes).
  * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
  * drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
  * drm/radeon: Fix encoder->possible_clones (git-fixes).
  * drm/radeon: properly handle vbios fake edid sizing (git-fixes).
  * drm/radeon: Replace one-element array with flexible-array member (stable-
    fixes).
  * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-
    fixes).
  * drm/rockchip: define gamma registers for RK3399 (stable-fixes).
  * drm/rockchip: support gamma control on RK3399 (stable-fixes).
  * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
  * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
  * drm/sti: avoid potential dereference of error pointers (git-fixes).
  * drm/sti: avoid potential dereference of error pointers in
    sti_gdp_atomic_check (git-fixes).
  * drm/sti: avoid potential dereference of error pointers in
    sti_hqvdp_atomic_check (git-fixes).
  * drm/v3d: Address race-condition in MMU flush (git-fixes).
  * drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
  * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
    VLA (stable-fixes).
  * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
  * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
    fixes).
  * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
    fixes).
  * drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
  * drm/vmwgfx: Handle surface check failure correctly (git-fixes).
  * drm/vmwgfx: Limit display layout ioctl array size to
    VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
  * drop HD-audio conexant patch that caused a regression on Thinkpad
    (bsc#1228269)
  * Drop OCFS2 patch causing a regression (bsc#1233255)
  * drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342)
  * e1000e: Fix S0ix residency on corporate systems (git-fixes).
  * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
  * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
    (stable-fixes).
  * erofs: avoid consecutive detection for Highmem memory (git-fixes).
  * erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF
    (git-fixes).
  * erofs: fix pcluster use-after-free on UP platforms (git-fixes).
  * erofs: fix potential overflow calculating xattr_isize (git-fixes).
  * erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-
    fixes).
  * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
    fixes).
  * exportfs: use pr_debug for unreachable debug statements (git-fixes).
  * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
  * fat: fix uninitialized variable (git-fixes).
  * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
  * fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
  * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
  * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
  * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-
    fixes).
  * filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
  * firmware: google: Unregister driver_info on failure (git-fixes).
  * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
  * Fix regression on AMDGPU driver (bsc#1233134)
  * fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).
  * fs/namespace: fnic: Switch to use %ptTd (git-fixes).
  * fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
  * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
  * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
  * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
  * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
  * gpio: davinci: fix lazy disable (git-fixes).
  * gve: Fix an edge case for TSO skb validity check (git-fixes).
  * gve: Fix skb truesize underestimation (git-fixes).
  * gve: Fix XDP TX completion handling when counters overflow (git-fixes).
  * gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
    fixes).
  * hid: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
  * hid: core: zero-initialize the report buffer (git-fixes).
  * hid: intel-ish-hid: Fix uninitialized variable 'rv' in
    ish_fw_xfer_direct_dma (git-fixes).
  * hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
    fixes).
  * hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
    fixes).
  * hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
    (stable-fixes).
  * hid: multitouch: Add support for B2402FVA track point (stable-fixes).
  * hid: multitouch: Add support for GT7868Q (stable-fixes).
  * hid: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-
    fixes).
  * hid: plantronics: Workaround for an unexcepted opposite volume key (stable-
    fixes).
  * hid: wacom: Defer calculation of resolution until resolution_code is known
    (git-fixes).
  * hid: wacom: fix when get product name maybe null pointer (git-fixes).
  * hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
    fixes).
  * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
    (git-fixes).
  * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
    fixes).
  * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
  * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
  * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
  * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
  * i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work
    (bsc#1227885).
  * i2c: imx-lpi2c: use bulk clk API (bsc#1227885).
  * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
    (git-fixes).
  * i2c: xiic: Fix broken locking on tx_msg (stable-fixes).
  * i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
    fixes).
  * i2c: xiic: Fix RX IRQ busy check (stable-fixes).
  * i2c: xiic: improve error message when transfer fails to start (stable-
    fixes).
  * i2c: xiic: Switch from waitqueue to completion (stable-fixes).
  * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
  * i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).
  * i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).
  * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
    fixes).
  * i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
  * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
    fixes).
  * i40e: Fix filter input checks to prevent config with invalid values (git-
    fixes).
  * i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
  * i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
  * i40e: Fix XDP program unloading while removing the driver (git-fixes).
  * i40e: Report MFS in decimal base instead of hex (git-fixes).
  * i40e: Restore VF MSI-X state during PCI reset (git-fixes).
  * i40e: take into account XDP Tx queues when stopping rings (git-fixes).
  * iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-
    fixes).
  * iavf: fix FDIR rule fields masks validation (git-fixes).
  * iavf: Fix promiscuous mode configuration flow messages (git-fixes).
  * iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
  * iavf: in iavf_down, disable queues when removing the driver (git-fixes).
  * iavf: initialize waitqueues before starting watchdog_task (git-fixes).
  * iavf: Introduce new state machines for flow director (git-fixes).
  * iavf: send VLAN offloading caps once after VFR (git-fixes).
  * iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-
    fixes).
  * ibmvnic: Do partial reset on login failure (bsc#1233150).
  * ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
  * ibmvnic: Ensure login failure recovery is safe from other resets
    (bsc#1233150).
  * ibmvnic: Handle DMA unmapping of login buffs in release functions
    (bsc#1233150).
  * ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
  * ice: avoid executing commands on other ports when driving sync (git-fixes).
  * ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
  * ice: change q_index variable type to s16 to store -1 value (git-fixes).
  * ice: fix accounting for filters shared by multiple VSIs (git-fixes).
  * ice: fix accounting if a VLAN already exists (git-fixes).
  * ice: fix ICE_LAST_OFFSET formula (git-fixes).
  * ice: Fix link_down_on_close message (git-fixes).
  * ice: Fix netif_is_ice() in Safe Mode (git-fixes).
  * ice: Fix NULL pointer deref during VF reset (git-fixes).
  * ice: fix over-shifted variable (git-fixes).
  * ice: fix receive buffer size miscalculation (git-fixes).
  * ice: fix VLAN replay after reset (git-fixes).
  * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
  * ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-
    fixes).
  * ice: Interpret .set_channels() input differently (git-fixes).
  * ice: reset first in crash dump kernels (git-fixes).
  * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
  * ice: Shut down VSI with "link-down-on-close" enabled (git-fixes).
  * ice: tc: allow zero flags in parsing tc flower (git-fixes).
  * ice: Unbind the workqueue (bsc#1231344).
  * ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
    fixes).
  * idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-
    fixes).
  * idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
  * idpf: disable local BH when scheduling napi for marker packets (git-fixes).
  * idpf: distinguish vports by the dev_port attribute (git-fixes).
  * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
    fixes).
  * idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
  * idpf: fix memleak in vport interrupt configuration (git-fixes).
  * idpf: fix memory leaks and crashes while performing a soft reset (git-
    fixes).
  * idpf: fix UAFs when destroying the queues (git-fixes).
  * idpf: Interpret .set_channels() input differently (git-fixes).
  * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
  * igb: extend PTP timestamp adjustments to i211 (git-fixes).
  * igb: Fix missing time sync events (git-fixes).
  * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
  * igc: Check VLAN EtherType mask (git-fixes).
  * igc: Check VLAN TCI mask (git-fixes).
  * igc: Fix hicredit calculation (git-fixes).
  * igc: Fix missing time sync events (git-fixes).
  * igc: Remove temporary workaround (git-fixes).
  * igc: Report VLAN EtherType matching back to user (git-fixes).
  * igc: Unlock on error in igc_io_resume() (git-fixes).
  * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
    fixes).
  * iio: adc: ad7606: Fix typo in the driver name (git-fixes).
  * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
  * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
  * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
  * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-
    fixes).
  * iio: hid-sensors: Fix an error handling path in
    _hid_sensor_set_report_latency() (git-fixes).
  * iio: light: al3010: Fix an error handling path in al3010_probe() (git-
    fixes).
  * iio: light: opt3001: add missing full-scale range value (git-fixes).
  * iio: light: veml6030: fix ALS sensor resolution (git-fixes).
  * iio: light: veml6030: fix IIO device retrieval from embedded device (git-
    fixes).
  * iio: light: veml6030: fix microlux value calculation (git-fixes).
  * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    (git-fixes).
  * initramfs: avoid filename buffer overrun (bsc#1232436).
  * input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
  * input: adp5589-keys - fix NULL pointer dereference (git-fixes).
  * input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
  * input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).
  * input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
    (git-fixes).
  * input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
  * input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
  * input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
    (git-fixes).
  * input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-
    fixes).
  * input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
  * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
  * ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
  * ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
  * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
  * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
    fixes).
  * itco_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
  * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
  * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
  * ixgbe: fix crash with empty VF macvlan list (git-fixes).
  * ixgbe: fix timestamp configuration code (git-fixes).
  * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
  * jfs: Fix sanity check in dbMount (git-fixes).
  * jfs: Fix uaf in dbFreeBits (git-fixes).
  * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
  * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
  * kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-
    fixes).
  * kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step
    is enabled (git-fixes).
  * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
  * kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).
  * kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
  * kabi: fix after KVM: arm64: mixed-width check should be skipped for
    uninitialized vCPUs (git-fixes).
  * kabi: Restore exported __arm_smccc_sve_check (git-fixes)
  * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414
    bsc#1229450).
  * kbuild,bpf: Add module-specific pahole flags for distilled base BTF
    (bsc#1230414 bsc#1229450).
  * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later
    (bsc#1230414 bsc#1229450).
  * kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).
  * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414
    bsc#1229450).
  * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
  * kernel-binary: Enable livepatch package only when livepatch is enabled
    Otherwise the filelist may be empty failing the build (bsc#1218644).
  * kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
  * kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
  * kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
  * kvm: Add support for arch compat vm ioctls (git-fixes).
  * kvm: arm64: Add missing memory barriers when switching to pKVM's hyp pgd
    (git-fixes).
  * kvm: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-
    fixes).
  * kvm: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
  * kvm: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
  * kvm: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
    (git-fixes).
  * kvm: arm64: mixed-width check should be skipped for uninitialized vCPUs
    (git-fixes).
  * kvm: arm64: Preserve PSTATE.SS for the guest while single-step is enabled
    (git-fixes).
  * kvm: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
    (git-fixes).
  * kvm: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table()
    (git-fixes).
  * kvm: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
  * kvm: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-
    fixes).
  * kvm: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
  * kvm: arm64: vgic-v4: Restore pending state on host userspace write (git-
    fixes).
  * kvm: eventfd: Fix false positive RCU usage warning (git-fixes).
  * kvm: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-
    fixes).
  * kvm: Fix lockdep false negative during host resume (git-fixes).
  * kvm: fix memoryleak in kvm_init() (git-fixes).
  * kvm: Grab a reference to KVM for VM and vCPU stats file descriptors (git-
    fixes).
  * kvm: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).
  * kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
  * kvm: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-
    fixes).
  * kvm: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
  * kvm: s390: Change virtual to physical address access in diag 0x258 handler
    (git-fixes bsc#1232631).
  * kvm: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query
    (git-fixes bsc#1231277).
  * kvm: s390: gaccess: Check if guest address is in memslot (git-fixes
    bsc#1232630).
  * kvm: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
    (git-fixes).
  * kvm: SVM: Do not advertise Bus Lock Detect to guest if SVM support is
    missing (git-fixes).
  * kvm: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE
    (git-fixes).
  * kvm: Unconditionally get a ref to /dev/kvm module when creating a VM (git-
    fixes).
  * kvm: Write the per-page "segment" when clearing (part of) a guest page (git-
    fixes).
  * kvm: x86: Use a stable condition around all VT-d PI paths (git-fixes).
  * kvm: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).
  * kvm: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).
  * kvm/arm64: rework guest entry logic (git-fixes).
  * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
  * Makefile.compiler: replace cc-ifversion with compiler-specific macros
    (bsc#1230414 bsc#1229450).
  * media: adv7604: prevent underflow condition when reporting colorspace (git-
    fixes).
  * media: cx24116: prevent overflows on SNR calculus (git-fixes).
  * media: dvb_frontend: do not play tricks with underflow values (git-fixes).
  * media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
  * media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer
    (stable-fixes).
  * media: dvbdev: prevent the risk of out of memory access (git-fixes).
  * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
  * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
  * media: stb0899_algo: initialize cfr before using it (git-fixes).
  * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
  * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
  * media: videobuf2-core: clear memory related fields in
    __vb2_plane_dmabuf_put() (stable-fixes).
  * mei: use kvmalloc for read buffer (git-fixes).
  * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
  * mm/hugetlb: fix nodes huge page allocation when there are surplus pages
    (bsc#1234012).
  * mm/memory: add non-anonymous page check in the copy_present_page()
    (bsc#1231646).
  * modpost: remove incorrect code in do_eisa_entry() (git-fixes).
  * module: abort module loading when sysfs setup suffer errors (git-fixes).
  * nbd: fix race between timeout and normal completion (bsc#1230918).
  * net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
  * net: ena: Fix potential sign extension issue (git-fixes).
  * net: ena: Remove ena_select_queue (git-fixes).
  * net: ena: Wrong missing IO completions check order (git-fixes).
  * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
  * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
  * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
  * net: relax socket state check at accept time (git-fixes).
  * net: socket: suppress unused warning (git-fixes).
  * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-
    fixes).
  * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
    (git-fixes).
  * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
    configuration (git-fixes).
  * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
  * net: usb: usbnet: fix name regression (git-fixes).
  * net: usb: usbnet: fix race in probe failure (git-fixes).
  * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
    fixes).
  * net/mlx5: Added cond_resched() to crdump collection (git-fixes).
  * net/mlx5: Allow 0 for total host VFs (git-fixes).
  * net/mlx5: Correctly compare pkt reformat ids (git-fixes).
  * net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
  * net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
  * net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
  * net/mlx5: Drain health before unregistering devlink (git-fixes).
  * net/mlx5: E-switch, register event handler before arming the event (git-
    fixes).
  * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
  * net/mlx5: Fix fw tracer first block check (git-fixes).
  * net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
  * net/mlx5: fs, lock FTE when checking if active (git-fixes).
  * net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
  * net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
  * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
  * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
  * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
    (git-fixes).
  * net/mlx5: Skip clock update work when device is in error state (git-fixes).
  * net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
  * net/mlx5: Update the list of the PCI supported devices (git-fixes).
  * net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO
    (git-fixes).
  * net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
  * net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
  * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
    (git-fixes).
  * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
  * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
    fixes).
  * net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
  * net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
  * net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
    fixes).
  * net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-
    fixes).
  * net/mlx5e: Check return value of snprintf writing to fw_version buffer for
    representors (git-fixes).
  * net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-
    fixes).
  * net/mlx5e: Correct snprintf truncation handling for fw_version buffer used
    by representors (git-fixes).
  * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
  * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
  * net/mlx5e: Do not offload internal port if filter device is out device (git-
    fixes).
  * net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
  * net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set
    (git-fixes).
  * net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-
    fixes).
  * net/mlx5e: fix double free of encap_header (git-fixes).
  * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
    packets (git-fixes).
  * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
  * net/mlx5e: Fix pedit endianness (git-fixes).
  * net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
  * net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-
    fixes).
  * net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-
    fixes).
  * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
  * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
  * net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
  * net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
  * net/mlx5e: Reduce the size of icosq_str (git-fixes).
  * net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
  * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
    exhaustion (git-fixes).
  * net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX
    (bsc#1226797)
  * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
  * nfs: Avoid unnecessary rescanning of the per-server delegation list (git-
    fixes).
  * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
  * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
  * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
  * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
    (git-fixes).
  * nfsd: Fix NFSv4's PUTPUBFH operation (git-fixes).
  * nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
  * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
  * nfsd: Mark filecache "down" if init fails (git-fixes).
  * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-
    fixes).
  * nfsd: return -EINVAL when namelen is 0 (git-fixes).
  * nfsv3: only use NFS timeout for MOUNT when protocols are compatible
    (bsc#1231016).
  * nfsv4: Fix clearing of layout segments in layoutreturn (git-fixes).
  * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-
    fixes).
  * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-
    fixes).
  * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-
    fixes).
  * ntb: ntb_hw_switchtec: Fix use after free vulnerability in
    switchtec_ntb_remove due to race condition (stable-fixes).
  * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
  * nvme-multipath: system fails to create generic nvme device (git-fixes).
  * nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
  * nvme-pci: qdepth 1 quirk (git-fixes).
  * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
  * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
  * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
  * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
  * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
  * ocfs2: remove entry once instead of null-ptr-dereference in
    ocfs2_xa_remove() (git-fixes).
  * parport: Proper fix for array out-of-bounds access (git-fixes).
  * pci: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
  * pci: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
  * pci: Add T_PVPERL macro (git-fixes).
  * pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
    (git-fixes).
  * pci: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
  * pci: Fix reset_method_store() memory leak (git-fixes).
  * pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
    (git-fixes).
  * pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
  * pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
    (git-fixes).
  * pci: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
  * pci: rockchip-ep: Fix address translation unit programming (git-fixes).
  * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
  * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
    fixes).
  * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3
    (stable-fixes).
  * platform/surface: aggregator: Fix warning when controller is destroyed in
    probe (git-fixes).
  * platform/x86: dell-sysman: add support for alienware products (stable-
    fixes).
  * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
  * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
  * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
  * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-
    fixes).
  * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
  * power: supply: core: Remove might_sleep() from power_supply_put() (git-
    fixes).
  * powerpc: Allow clearing and restoring registers independent of saved
    breakpoint state (bsc#1194869).
  * powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
  * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
  * powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
  * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
  * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
  * powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
  * powerpc/code-patching: Add generic memory patching (bsc#1194869).
  * powerpc/code-patching: Consolidate and cache per-cpu patching context
    (bsc#1194869).
  * powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without
    CONFIG_MODULES (bsc#1194869).
  * powerpc/code-patching: Fix error handling in do_patch_instruction()
    (bsc#1194869).
  * powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).
  * powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).
  * powerpc/code-patching: introduce patch_instructions() (bsc#1194869).
  * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of
    failure (bsc#1194869).
  * powerpc/code-patching: Pre-map patch area (bsc#1194869).
  * powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).
  * powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check()
    (bsc#1194869).
  * powerpc/code-patching: Reorganise do_patch_instruction() to ease error
    handling (bsc#1194869).
  * powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).
  * powerpc/code-patching: Use jump_label to check if poking_init() is done
    (bsc#1194869).
  * powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).
  * powerpc/code-patching: Use WARN_ON and fix check in poking_init
    (bsc#1194869).
  * powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).
  * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-
    fixes).
  * powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-
    fixes).
  * powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).
  * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
  * powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).
  * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
  * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
    (bsc#1194869).
  * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
  * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
  * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
  * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
    (bsc#1194869).
  * powerpc/tlb: Add local flush for page given mm_struct and psize
    (bsc#1194869).
  * powerpc/vdso: augment VDSO32 functions to support 64 bits build
    (bsc#1194869).
  * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace
    (bsc#1194869).
  * powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).
  * powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files
    (bsc#1194869).
  * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu
    (bsc#1194869).
  * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
  * qed: avoid truncating work queue length (git-fixes).
  * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
    (bsc#1226631).
  * rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)
  * rdma/bnxt_re: Add a check for memory allocation (git-fixes)
  * rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
  * rdma/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
  * rdma/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
  * rdma/bnxt_re: Fix the GID table length (git-fixes)
  * rdma/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
  * rdma/bnxt_re: Fix the usage of control path spin locks (git-fixes)
  * rdma/bnxt_re: Return more meaningful error (git-fixes)
  * rdma/bnxt_re: synchronize the qp-handle table array (git-fixes)
  * rdma/cxgb4: Dump vendor specific QP details (git-fixes)
  * rdma/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
  * rdma/hns: Add clear_hem return value to log (git-fixes)
  * rdma/hns: Add mutex_destroy() (git-fixes)
  * rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
    (git-fixes)
  * rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
  * rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
  * rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
  * rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
  * rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
  * rdma/hns: Remove unnecessary QP type checks (git-fixes)
  * rdma/hns: Remove unused abnormal interrupt of type RAS (git-fixes)
  * rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
  * rdma/hns: Use macro instead of magic number (git-fixes)
  * rdma/irdma: Fix misspelling of "accept*" (git-fixes)
  * rdma/mad: Improve handling of timed out WRs of mad agent (git-fixes)
  * rdma/mana_ib: use the correct page size for mapping user-mode doorbell page
    (git-fixes).
  * rdma/mana_ib: use the correct page table index based on hardware page size
    (git-fixes).
  * rdma/mlx5: Move events notifier registration to be after device registration
    (git-fixes)
  * rdma/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-
    fixes)
  * rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
    fixes).
  * rdma/rtrs-srv: Avoid null pointer deref during path establishment (git-
    fixes)
  * rdma/rxe: Fix the qp flush warnings in req (git-fixes)
  * rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
  * rdma/srpt: Make slab cache names unique (git-fixes)
  * Removed the duplicated check of static_assert(sizeof(struct work_struct) >=
    sizeof(struct rcu_head)).
  * Removed unnecessary white-space change in kernel/bpf/syscall.c
  * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
    (bsc#1234108).
  * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI"
    (git-fixes).
  * Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes).
  * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
    fixes).
  * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
    fixes).
  * Revert "usb: yurex: Replace snprintf() with the safer scnprintf() variant"
    (stable-fixes).
  * Revert PM changes that caused a regression on S4 resume (bsc#1231578).
  * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to
    IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.
  * rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY
    gcc version dependent, at least on ppc
  * rpm/release-projects: Add SLFO projects (bsc#1231293).
  * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
    by the new klp-convert implementation. (bsc#1218644)
  * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
    (git-fixes).
  * rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
  * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
    fixes).
  * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
  * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes
    bsc#1232632).
  * sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)
  * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
  * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
  * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
  * scsi: core: Handle devices which return an unusually large VPD page count
    (git-fixes).
  * scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
    (git-fixes).
  * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
  * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
  * scsi: libsas: Fix exp-attached device scan after probe failure scanned in
    again after probe failed (git-fixes).
  * scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
    fixes).
  * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
  * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in
    lpfc_els_flush_cmd() (bsc#1232757).
  * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
    (bsc#1233241).
  * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
    (bsc#1233241).
  * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
    (bsc#1233241).
  * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
    FDMI (bsc#1233241).
  * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
  * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV
    instance (bsc#1232757).
  * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler
    (bsc#1232757).
  * scsi: lpfc: Modify CGN warning signal calculation based on EDC response
    (bsc#1233241).
  * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
    (bsc#1233241).
  * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
    (bsc#1233241).
  * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
  * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).
  * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to
    KERN_WARNING (bsc#1232757).
  * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
  * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
  * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
  * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
    flag (bsc#1233241).
  * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE
    (bsc#1232757).
  * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
  * scsi: mac_scsi: Refactor polling loop (git-fixes).
  * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
  * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
  * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
  * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
  * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
  * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
  * scsi: scsi_transport_fc: Allow setting rport state to current state (git-
    fixes).
  * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
  * scsi: smartpqi: correct stream detection (git-fixes).
  * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
    fixes).
  * scsi: spi: Fix sshdr use (git-fixes).
  * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
  * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
  * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
  * selftests/bpf: Add a test case to write strtol result into .rodata (git-
    fixes).
  * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
  * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
  * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-
    fixes).
  * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
  * sfc: Check firmware supports Ethernet PTP filter (git-fixes).
  * sfc: do not unregister flow_indr if it was never registered (git-fixes).
  * sfc: fix a double-free bug in efx_probe_filters (git-fixes).
  * signal: Replace BUG_ON()s (bsc#1234093).
  * spi: atmel-quadspi: Fix register name in verbose logging function (git-
    fixes).
  * spi: bcm63xx: Enable module autoloading (stable-fixes).
  * spi: bcm63xx: Fix module autoloading (git-fixes).
  * spi: Fix acpi deferred irq probe (git-fixes).
  * spi: lpspi: release requested DMA channels (stable-fixes).
  * spi: lpspi: Silence error message upon deferred probe (stable-fixes).
  * spi: lpspi: Simplify some error message (git-fixes).
  * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
  * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
  * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
  * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
  * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
    fixes).
  * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
  * staging: iio: frequency: ad9832: fix division by zero in
    ad9832_calc_freqreg() (git-fixes).
  * static_call: Do not make __static_call_return0 static (git-fixes).
  * sunrpc: clnt.c: Remove misleading comment (git-fixes).
  * sunrpc: Fix integer overflow in decode_rc_list() (git-fixes).
  * sunrpc: Fixup gss_status tracepoint error output (git-fixes).
  * thermal: core: Initialize thermal zones before registering them (git-fixes).
  * thermal: intel: int340x: processor: Fix warning during module unload (git-
    fixes).
  * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
  * tracing: Consider the NULL character when validating the event length (git-
    fixes).
  * tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
  * tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).
  * tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
  * tun: prevent negative ifindex (git-fixes).
  * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
  * Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n
  * Update config files. Enabled IDPF for ARM64 (bsc#1221309)
  * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
  * uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
  * usb: appledisplay: close race between probe and completion handler (stable-
    fixes).
  * usb: chaoskey: fail open after removal (git-fixes).
  * usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
  * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
  * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the
    Crashkernel Scenario (stable-fixes).
  * usb: dwc3: core: Stop processing of pending events if controller is halted
    (git-fixes).
  * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
    logic (git-fixes).
  * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
  * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
  * usb: ehci-spear: fix call balance of sehci clk handling routines (git-
    fixes).
  * usb: gadget: core: force synchronous registration (git-fixes).
  * usb: misc: cypress_cy7c63: check for short transfer (stable-fixes).
  * usb: misc: yurex: fix race between read and write (stable-fixes).
  * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
  * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
  * usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
    fixes).
  * usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
  * usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
  * usb: serial: option: add Quectel RG650V (stable-fixes).
  * usb: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
  * usb: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
  * usb: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
  * usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
    fixes).
  * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip
    (stable-fixes).
  * usb: typec: altmode should keep reference to parent (git-fixes).
  * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
    (git-fixes).
  * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
    (git-fixes).
  * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
    (git-fixes).
  * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
  * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
  * usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).
  * usb: yurex: make waiting on yurex_write interruptible (git-fixes).
  * usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-
    fixes).
  * usbip: tools: Fix detach_port() invalid port error path (git-fixes).
  * usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).
  * Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
  * vdpa/mlx5: preserve CVQ vringh index (git-fixes).
  * vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
  * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
  * virtio_console: fix misc probe bugs (git-fixes).
  * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
  * virtio-net: synchronize probe with ndo_set_features (git-fixes).
  * vmxnet3: add command to allow disabling of offloads (bsc#1226498).
  * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
  * vmxnet3: prepare for version 9 changes (bsc#1226498).
  * vmxnet3: update to version 9 (bsc#1226498).
  * vsock/virtio: fix packet delivery to tap device (git-fixes).
  * watchdog: mediatek: Make sure system reset gets asserted in
    mtk_wdt_restart() (git-fixes).
  * watchdog: rti: of: honor timeout-sec property (git-fixes).
  * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
    (git-fixes).
  * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
    (git-fixes).
  * wifi: ath10k: Fix memory leak in management tx (git-fixes).
  * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
  * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
  * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
    (stable-fixes).
  * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
    (git-fixes).
  * wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).
  * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-
    fixes).
  * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
  * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
  * wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
    fixes).
  * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).
  * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
  * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-
    fixes).
  * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
  * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
    (git-fixes).
  * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
    (git-fixes).
  * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
  * wifi: mwifiex: Fix memcpy() field-spanning write warning in
    mwifiex_cmd_802_11_scan_ext() (stable-fixes).
  * wifi: mwifiex: Fix memcpy() field-spanning write warning in
    mwifiex_config_scan() (git-fixes).
  * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
  * workqueue: Avoid using isolated cpus' timers on (bsc#1231327)
  * workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)
  * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
  * x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
  * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
  * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
  * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
  * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency
    (git-fixes).
  * x86/kaslr: Expose and use the end of the physical memory address space
    (bsc#1230405).
  * x86/kvm: fix is_stale_page_fault() (bsc#1221333).
  * xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown
    (bsc#1216813).
  * xhci: Fix incorrect stream context type macro (git-fixes).
  * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
  * xhci: Mitigate failed set dequeue pointer commands (git-fixes).
  * xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
  * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Micro 5.5  
    zypper in -t patch SUSE-SLE-Micro-5.5-2024-4364=1

  * Basesystem Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4364=1

  * Development Tools Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4364=1

  * Legacy Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4364=1

  * SUSE Linux Enterprise Live Patching 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4364=1  
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

  * SUSE Linux Enterprise High Availability Extension 15 SP5  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-4364=1

## Package List:

  * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc ppc64le s390x)
    * kernel-default-5.14.21-150500.55.88.1
  * SUSE Linux Enterprise Micro 5.5 (aarch64)
    * kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4
  * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x)
    * kernel-default-debuginfo-5.14.21-150500.55.88.1
    * kernel-default-debugsource-5.14.21-150500.55.88.1
  * Basesystem Module 15-SP5 (aarch64 nosrc)
    * kernel-64kb-5.14.21-150500.55.88.1
  * Basesystem Module 15-SP5 (aarch64)
    * kernel-64kb-devel-debuginfo-5.14.21-150500.55.88.1
    * kernel-64kb-debuginfo-5.14.21-150500.55.88.1
    * kernel-64kb-devel-5.14.21-150500.55.88.1
    * kernel-64kb-debugsource-5.14.21-150500.55.88.1
  * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-5.14.21-150500.55.88.1
  * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
    * kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4
  * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
    * kernel-default-debuginfo-5.14.21-150500.55.88.1
    * kernel-default-devel-5.14.21-150500.55.88.1
    * kernel-default-devel-debuginfo-5.14.21-150500.55.88.1
    * kernel-default-debugsource-5.14.21-150500.55.88.1
  * Basesystem Module 15-SP5 (noarch)
    * kernel-macros-5.14.21-150500.55.88.1
    * kernel-devel-5.14.21-150500.55.88.1
  * Basesystem Module 15-SP5 (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150500.55.88.1
  * Basesystem Module 15-SP5 (s390x)
    * kernel-zfcpdump-debugsource-5.14.21-150500.55.88.1
    * kernel-zfcpdump-debuginfo-5.14.21-150500.55.88.1
  * Development Tools Module 15-SP5 (noarch nosrc)
    * kernel-docs-5.14.21-150500.55.88.1
  * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
    * kernel-syms-5.14.21-150500.55.88.1
    * kernel-obs-build-5.14.21-150500.55.88.1
    * kernel-obs-build-debugsource-5.14.21-150500.55.88.1
  * Development Tools Module 15-SP5 (noarch)
    * kernel-source-5.14.21-150500.55.88.1
  * Legacy Module 15-SP5 (nosrc)
    * kernel-default-5.14.21-150500.55.88.1
  * Legacy Module 15-SP5 (aarch64)
    * kernel-default-debuginfo-5.14.21-150500.55.88.1
    * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.88.1
    * kernel-default-debugsource-5.14.21-150500.55.88.1
    * reiserfs-kmp-default-5.14.21-150500.55.88.1
  * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
    * kernel-default-5.14.21-150500.55.88.1
  * SUSE Linux Enterprise Live Patching 15-SP5 (s390x x86_64)
    * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-1-150500.11.5.1
    * kernel-default-livepatch-5.14.21-150500.55.88.1
    * kernel-default-debugsource-5.14.21-150500.55.88.1
    * kernel-livepatch-5_14_21-150500_55_88-default-1-150500.11.5.1
    * kernel-default-livepatch-devel-5.14.21-150500.55.88.1
    * kernel-default-debuginfo-5.14.21-150500.55.88.1
    * kernel-livepatch-SLE15-SP5_Update_21-debugsource-1-150500.11.5.1
  * SUSE Linux Enterprise High Availability Extension 15 SP5 (ppc64le x86_64)
    * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.88.1
    * ocfs2-kmp-default-5.14.21-150500.55.88.1
    * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.88.1
    * dlm-kmp-default-5.14.21-150500.55.88.1
    * cluster-md-kmp-default-5.14.21-150500.55.88.1
    * gfs2-kmp-default-5.14.21-150500.55.88.1
    * dlm-kmp-default-debuginfo-5.14.21-150500.55.88.1
    * gfs2-kmp-default-debuginfo-5.14.21-150500.55.88.1
    * kernel-default-debugsource-5.14.21-150500.55.88.1
    * kernel-default-debuginfo-5.14.21-150500.55.88.1
  * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
    * kernel-default-5.14.21-150500.55.88.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-47416.html
  * https://www.suse.com/security/cve/CVE-2021-47534.html
  * https://www.suse.com/security/cve/CVE-2021-47594.html
  * https://www.suse.com/security/cve/CVE-2022-3435.html
  * https://www.suse.com/security/cve/CVE-2022-45934.html
  * https://www.suse.com/security/cve/CVE-2022-48664.html
  * https://www.suse.com/security/cve/CVE-2022-48674.html
  * https://www.suse.com/security/cve/CVE-2022-48879.html
  * https://www.suse.com/security/cve/CVE-2022-48946.html
  * https://www.suse.com/security/cve/CVE-2022-48947.html
  * https://www.suse.com/security/cve/CVE-2022-48948.html
  * https://www.suse.com/security/cve/CVE-2022-48949.html
  * https://www.suse.com/security/cve/CVE-2022-48951.html
  * https://www.suse.com/security/cve/CVE-2022-48953.html
  * https://www.suse.com/security/cve/CVE-2022-48954.html
  * https://www.suse.com/security/cve/CVE-2022-48955.html
  * https://www.suse.com/security/cve/CVE-2022-48956.html
  * https://www.suse.com/security/cve/CVE-2022-48957.html
  * https://www.suse.com/security/cve/CVE-2022-48958.html
  * https://www.suse.com/security/cve/CVE-2022-48959.html
  * https://www.suse.com/security/cve/CVE-2022-48960.html
  * https://www.suse.com/security/cve/CVE-2022-48961.html
  * https://www.suse.com/security/cve/CVE-2022-48962.html
  * https://www.suse.com/security/cve/CVE-2022-48966.html
  * https://www.suse.com/security/cve/CVE-2022-48967.html
  * https://www.suse.com/security/cve/CVE-2022-48968.html
  * https://www.suse.com/security/cve/CVE-2022-48969.html
  * https://www.suse.com/security/cve/CVE-2022-48970.html
  * https://www.suse.com/security/cve/CVE-2022-48971.html
  * https://www.suse.com/security/cve/CVE-2022-48972.html
  * https://www.suse.com/security/cve/CVE-2022-48973.html
  * https://www.suse.com/security/cve/CVE-2022-48975.html
  * https://www.suse.com/security/cve/CVE-2022-48977.html
  * https://www.suse.com/security/cve/CVE-2022-48978.html
  * https://www.suse.com/security/cve/CVE-2022-48979.html
  * https://www.suse.com/security/cve/CVE-2022-48980.html
  * https://www.suse.com/security/cve/CVE-2022-48981.html
  * https://www.suse.com/security/cve/CVE-2022-48982.html
  * https://www.suse.com/security/cve/CVE-2022-48983.html
  * https://www.suse.com/security/cve/CVE-2022-48985.html
  * https://www.suse.com/security/cve/CVE-2022-48987.html
  * https://www.suse.com/security/cve/CVE-2022-48988.html
  * https://www.suse.com/security/cve/CVE-2022-48989.html
  * https://www.suse.com/security/cve/CVE-2022-48990.html
  * https://www.suse.com/security/cve/CVE-2022-48991.html
  * https://www.suse.com/security/cve/CVE-2022-48992.html
  * https://www.suse.com/security/cve/CVE-2022-48994.html
  * https://www.suse.com/security/cve/CVE-2022-48995.html
  * https://www.suse.com/security/cve/CVE-2022-48997.html
  * https://www.suse.com/security/cve/CVE-2022-48999.html
  * https://www.suse.com/security/cve/CVE-2022-49000.html
  * https://www.suse.com/security/cve/CVE-2022-49002.html
  * https://www.suse.com/security/cve/CVE-2022-49003.html
  * https://www.suse.com/security/cve/CVE-2022-49005.html
  * https://www.suse.com/security/cve/CVE-2022-49006.html
  * https://www.suse.com/security/cve/CVE-2022-49007.html
  * https://www.suse.com/security/cve/CVE-2022-49010.html
  * https://www.suse.com/security/cve/CVE-2022-49011.html
  * https://www.suse.com/security/cve/CVE-2022-49012.html
  * https://www.suse.com/security/cve/CVE-2022-49014.html
  * https://www.suse.com/security/cve/CVE-2022-49015.html
  * https://www.suse.com/security/cve/CVE-2022-49016.html
  * https://www.suse.com/security/cve/CVE-2022-49017.html
  * https://www.suse.com/security/cve/CVE-2022-49019.html
  * https://www.suse.com/security/cve/CVE-2022-49020.html
  * https://www.suse.com/security/cve/CVE-2022-49021.html
  * https://www.suse.com/security/cve/CVE-2022-49022.html
  * https://www.suse.com/security/cve/CVE-2022-49023.html
  * https://www.suse.com/security/cve/CVE-2022-49024.html
  * https://www.suse.com/security/cve/CVE-2022-49025.html
  * https://www.suse.com/security/cve/CVE-2022-49026.html
  * https://www.suse.com/security/cve/CVE-2022-49027.html
  * https://www.suse.com/security/cve/CVE-2022-49028.html
  * https://www.suse.com/security/cve/CVE-2022-49029.html
  * https://www.suse.com/security/cve/CVE-2022-49031.html
  * https://www.suse.com/security/cve/CVE-2022-49032.html
  * https://www.suse.com/security/cve/CVE-2023-2166.html
  * https://www.suse.com/security/cve/CVE-2023-28327.html
  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52800.html
  * https://www.suse.com/security/cve/CVE-2023-52881.html
  * https://www.suse.com/security/cve/CVE-2023-52915.html
  * https://www.suse.com/security/cve/CVE-2023-52917.html
  * https://www.suse.com/security/cve/CVE-2023-52918.html
  * https://www.suse.com/security/cve/CVE-2023-52919.html
  * https://www.suse.com/security/cve/CVE-2023-52921.html
  * https://www.suse.com/security/cve/CVE-2023-52922.html
  * https://www.suse.com/security/cve/CVE-2023-6270.html
  * https://www.suse.com/security/cve/CVE-2024-26782.html
  * https://www.suse.com/security/cve/CVE-2024-26906.html
  * https://www.suse.com/security/cve/CVE-2024-26953.html
  * https://www.suse.com/security/cve/CVE-2024-27043.html
  * https://www.suse.com/security/cve/CVE-2024-35888.html
  * https://www.suse.com/security/cve/CVE-2024-35937.html
  * https://www.suse.com/security/cve/CVE-2024-35980.html
  * https://www.suse.com/security/cve/CVE-2024-36244.html
  * https://www.suse.com/security/cve/CVE-2024-36484.html
  * https://www.suse.com/security/cve/CVE-2024-36883.html
  * https://www.suse.com/security/cve/CVE-2024-36886.html
  * https://www.suse.com/security/cve/CVE-2024-36905.html
  * https://www.suse.com/security/cve/CVE-2024-36953.html
  * https://www.suse.com/security/cve/CVE-2024-36954.html
  * https://www.suse.com/security/cve/CVE-2024-36957.html
  * https://www.suse.com/security/cve/CVE-2024-38577.html
  * https://www.suse.com/security/cve/CVE-2024-38589.html
  * https://www.suse.com/security/cve/CVE-2024-38615.html
  * https://www.suse.com/security/cve/CVE-2024-39476.html
  * https://www.suse.com/security/cve/CVE-2024-40965.html
  * https://www.suse.com/security/cve/CVE-2024-40997.html
  * https://www.suse.com/security/cve/CVE-2024-41016.html
  * https://www.suse.com/security/cve/CVE-2024-41023.html
  * https://www.suse.com/security/cve/CVE-2024-41049.html
  * https://www.suse.com/security/cve/CVE-2024-42131.html
  * https://www.suse.com/security/cve/CVE-2024-42145.html
  * https://www.suse.com/security/cve/CVE-2024-42226.html
  * https://www.suse.com/security/cve/CVE-2024-42253.html
  * https://www.suse.com/security/cve/CVE-2024-43817.html
  * https://www.suse.com/security/cve/CVE-2024-43897.html
  * https://www.suse.com/security/cve/CVE-2024-44931.html
  * https://www.suse.com/security/cve/CVE-2024-44932.html
  * https://www.suse.com/security/cve/CVE-2024-44947.html
  * https://www.suse.com/security/cve/CVE-2024-44958.html
  * https://www.suse.com/security/cve/CVE-2024-44964.html
  * https://www.suse.com/security/cve/CVE-2024-44995.html
  * https://www.suse.com/security/cve/CVE-2024-45016.html
  * https://www.suse.com/security/cve/CVE-2024-45025.html
  * https://www.suse.com/security/cve/CVE-2024-46678.html
  * https://www.suse.com/security/cve/CVE-2024-46681.html
  * https://www.suse.com/security/cve/CVE-2024-46716.html
  * https://www.suse.com/security/cve/CVE-2024-46719.html
  * https://www.suse.com/security/cve/CVE-2024-46754.html
  * https://www.suse.com/security/cve/CVE-2024-46770.html
  * https://www.suse.com/security/cve/CVE-2024-46775.html
  * https://www.suse.com/security/cve/CVE-2024-46777.html
  * https://www.suse.com/security/cve/CVE-2024-46800.html
  * https://www.suse.com/security/cve/CVE-2024-46802.html
  * https://www.suse.com/security/cve/CVE-2024-46804.html
  * https://www.suse.com/security/cve/CVE-2024-46805.html
  * https://www.suse.com/security/cve/CVE-2024-46807.html
  * https://www.suse.com/security/cve/CVE-2024-46809.html
  * https://www.suse.com/security/cve/CVE-2024-46810.html
  * https://www.suse.com/security/cve/CVE-2024-46811.html
  * https://www.suse.com/security/cve/CVE-2024-46812.html
  * https://www.suse.com/security/cve/CVE-2024-46813.html
  * https://www.suse.com/security/cve/CVE-2024-46814.html
  * https://www.suse.com/security/cve/CVE-2024-46815.html
  * https://www.suse.com/security/cve/CVE-2024-46816.html
  * https://www.suse.com/security/cve/CVE-2024-46817.html
  * https://www.suse.com/security/cve/CVE-2024-46818.html
  * https://www.suse.com/security/cve/CVE-2024-46819.html
  * https://www.suse.com/security/cve/CVE-2024-46821.html
  * https://www.suse.com/security/cve/CVE-2024-46826.html
  * https://www.suse.com/security/cve/CVE-2024-46828.html
  * https://www.suse.com/security/cve/CVE-2024-46834.html
  * https://www.suse.com/security/cve/CVE-2024-46835.html
  * https://www.suse.com/security/cve/CVE-2024-46840.html
  * https://www.suse.com/security/cve/CVE-2024-46841.html
  * https://www.suse.com/security/cve/CVE-2024-46842.html
  * https://www.suse.com/security/cve/CVE-2024-46848.html
  * https://www.suse.com/security/cve/CVE-2024-46849.html
  * https://www.suse.com/security/cve/CVE-2024-46853.html
  * https://www.suse.com/security/cve/CVE-2024-46854.html
  * https://www.suse.com/security/cve/CVE-2024-46855.html
  * https://www.suse.com/security/cve/CVE-2024-46857.html
  * https://www.suse.com/security/cve/CVE-2024-46859.html
  * https://www.suse.com/security/cve/CVE-2024-46864.html
  * https://www.suse.com/security/cve/CVE-2024-46871.html
  * https://www.suse.com/security/cve/CVE-2024-47660.html
  * https://www.suse.com/security/cve/CVE-2024-47661.html
  * https://www.suse.com/security/cve/CVE-2024-47663.html
  * https://www.suse.com/security/cve/CVE-2024-47664.html
  * https://www.suse.com/security/cve/CVE-2024-47665.html
  * https://www.suse.com/security/cve/CVE-2024-47667.html
  * https://www.suse.com/security/cve/CVE-2024-47668.html
  * https://www.suse.com/security/cve/CVE-2024-47669.html
  * https://www.suse.com/security/cve/CVE-2024-47670.html
  * https://www.suse.com/security/cve/CVE-2024-47671.html
  * https://www.suse.com/security/cve/CVE-2024-47672.html
  * https://www.suse.com/security/cve/CVE-2024-47673.html
  * https://www.suse.com/security/cve/CVE-2024-47674.html
  * https://www.suse.com/security/cve/CVE-2024-47679.html
  * https://www.suse.com/security/cve/CVE-2024-47682.html
  * https://www.suse.com/security/cve/CVE-2024-47684.html
  * https://www.suse.com/security/cve/CVE-2024-47685.html
  * https://www.suse.com/security/cve/CVE-2024-47692.html
  * https://www.suse.com/security/cve/CVE-2024-47693.html
  * https://www.suse.com/security/cve/CVE-2024-47695.html
  * https://www.suse.com/security/cve/CVE-2024-47696.html
  * https://www.suse.com/security/cve/CVE-2024-47697.html
  * https://www.suse.com/security/cve/CVE-2024-47698.html
  * https://www.suse.com/security/cve/CVE-2024-47699.html
  * https://www.suse.com/security/cve/CVE-2024-47701.html
  * https://www.suse.com/security/cve/CVE-2024-47704.html
  * https://www.suse.com/security/cve/CVE-2024-47705.html
  * https://www.suse.com/security/cve/CVE-2024-47706.html
  * https://www.suse.com/security/cve/CVE-2024-47707.html
  * https://www.suse.com/security/cve/CVE-2024-47709.html
  * https://www.suse.com/security/cve/CVE-2024-47710.html
  * https://www.suse.com/security/cve/CVE-2024-47712.html
  * https://www.suse.com/security/cve/CVE-2024-47713.html
  * https://www.suse.com/security/cve/CVE-2024-47718.html
  * https://www.suse.com/security/cve/CVE-2024-47720.html
  * https://www.suse.com/security/cve/CVE-2024-47723.html
  * https://www.suse.com/security/cve/CVE-2024-47727.html
  * https://www.suse.com/security/cve/CVE-2024-47728.html
  * https://www.suse.com/security/cve/CVE-2024-47730.html
  * https://www.suse.com/security/cve/CVE-2024-47735.html
  * https://www.suse.com/security/cve/CVE-2024-47737.html
  * https://www.suse.com/security/cve/CVE-2024-47738.html
  * https://www.suse.com/security/cve/CVE-2024-47739.html
  * https://www.suse.com/security/cve/CVE-2024-47742.html
  * https://www.suse.com/security/cve/CVE-2024-47745.html
  * https://www.suse.com/security/cve/CVE-2024-47747.html
  * https://www.suse.com/security/cve/CVE-2024-47748.html
  * https://www.suse.com/security/cve/CVE-2024-47749.html
  * https://www.suse.com/security/cve/CVE-2024-47756.html
  * https://www.suse.com/security/cve/CVE-2024-47757.html
  * https://www.suse.com/security/cve/CVE-2024-49850.html
  * https://www.suse.com/security/cve/CVE-2024-49851.html
  * https://www.suse.com/security/cve/CVE-2024-49852.html
  * https://www.suse.com/security/cve/CVE-2024-49855.html
  * https://www.suse.com/security/cve/CVE-2024-49858.html
  * https://www.suse.com/security/cve/CVE-2024-49860.html
  * https://www.suse.com/security/cve/CVE-2024-49861.html
  * https://www.suse.com/security/cve/CVE-2024-49863.html
  * https://www.suse.com/security/cve/CVE-2024-49866.html
  * https://www.suse.com/security/cve/CVE-2024-49867.html
  * https://www.suse.com/security/cve/CVE-2024-49868.html
  * https://www.suse.com/security/cve/CVE-2024-49870.html
  * https://www.suse.com/security/cve/CVE-2024-49871.html
  * https://www.suse.com/security/cve/CVE-2024-49875.html
  * https://www.suse.com/security/cve/CVE-2024-49877.html
  * https://www.suse.com/security/cve/CVE-2024-49879.html
  * https://www.suse.com/security/cve/CVE-2024-49881.html
  * https://www.suse.com/security/cve/CVE-2024-49882.html
  * https://www.suse.com/security/cve/CVE-2024-49883.html
  * https://www.suse.com/security/cve/CVE-2024-49884.html
  * https://www.suse.com/security/cve/CVE-2024-49886.html
  * https://www.suse.com/security/cve/CVE-2024-49890.html
  * https://www.suse.com/security/cve/CVE-2024-49891.html
  * https://www.suse.com/security/cve/CVE-2024-49892.html
  * https://www.suse.com/security/cve/CVE-2024-49894.html
  * https://www.suse.com/security/cve/CVE-2024-49895.html
  * https://www.suse.com/security/cve/CVE-2024-49896.html
  * https://www.suse.com/security/cve/CVE-2024-49897.html
  * https://www.suse.com/security/cve/CVE-2024-49899.html
  * https://www.suse.com/security/cve/CVE-2024-49900.html
  * https://www.suse.com/security/cve/CVE-2024-49901.html
  * https://www.suse.com/security/cve/CVE-2024-49902.html
  * https://www.suse.com/security/cve/CVE-2024-49903.html
  * https://www.suse.com/security/cve/CVE-2024-49905.html
  * https://www.suse.com/security/cve/CVE-2024-49906.html
  * https://www.suse.com/security/cve/CVE-2024-49907.html
  * https://www.suse.com/security/cve/CVE-2024-49908.html
  * https://www.suse.com/security/cve/CVE-2024-49909.html
  * https://www.suse.com/security/cve/CVE-2024-49911.html
  * https://www.suse.com/security/cve/CVE-2024-49912.html
  * https://www.suse.com/security/cve/CVE-2024-49913.html
  * https://www.suse.com/security/cve/CVE-2024-49914.html
  * https://www.suse.com/security/cve/CVE-2024-49917.html
  * https://www.suse.com/security/cve/CVE-2024-49918.html
  * https://www.suse.com/security/cve/CVE-2024-49919.html
  * https://www.suse.com/security/cve/CVE-2024-49920.html
  * https://www.suse.com/security/cve/CVE-2024-49921.html
  * https://www.suse.com/security/cve/CVE-2024-49922.html
  * https://www.suse.com/security/cve/CVE-2024-49923.html
  * https://www.suse.com/security/cve/CVE-2024-49924.html
  * https://www.suse.com/security/cve/CVE-2024-49925.html
  * https://www.suse.com/security/cve/CVE-2024-49929.html
  * https://www.suse.com/security/cve/CVE-2024-49930.html
  * https://www.suse.com/security/cve/CVE-2024-49933.html
  * https://www.suse.com/security/cve/CVE-2024-49934.html
  * https://www.suse.com/security/cve/CVE-2024-49935.html
  * https://www.suse.com/security/cve/CVE-2024-49936.html
  * https://www.suse.com/security/cve/CVE-2024-49938.html
  * https://www.suse.com/security/cve/CVE-2024-49939.html
  * https://www.suse.com/security/cve/CVE-2024-49945.html
  * https://www.suse.com/security/cve/CVE-2024-49946.html
  * https://www.suse.com/security/cve/CVE-2024-49947.html
  * https://www.suse.com/security/cve/CVE-2024-49949.html
  * https://www.suse.com/security/cve/CVE-2024-49950.html
  * https://www.suse.com/security/cve/CVE-2024-49954.html
  * https://www.suse.com/security/cve/CVE-2024-49955.html
  * https://www.suse.com/security/cve/CVE-2024-49957.html
  * https://www.suse.com/security/cve/CVE-2024-49958.html
  * https://www.suse.com/security/cve/CVE-2024-49959.html
  * https://www.suse.com/security/cve/CVE-2024-49960.html
  * https://www.suse.com/security/cve/CVE-2024-49962.html
  * https://www.suse.com/security/cve/CVE-2024-49963.html
  * https://www.suse.com/security/cve/CVE-2024-49965.html
  * https://www.suse.com/security/cve/CVE-2024-49966.html
  * https://www.suse.com/security/cve/CVE-2024-49967.html
  * https://www.suse.com/security/cve/CVE-2024-49968.html
  * https://www.suse.com/security/cve/CVE-2024-49969.html
  * https://www.suse.com/security/cve/CVE-2024-49973.html
  * https://www.suse.com/security/cve/CVE-2024-49974.html
  * https://www.suse.com/security/cve/CVE-2024-49975.html
  * https://www.suse.com/security/cve/CVE-2024-49981.html
  * https://www.suse.com/security/cve/CVE-2024-49982.html
  * https://www.suse.com/security/cve/CVE-2024-49983.html
  * https://www.suse.com/security/cve/CVE-2024-49985.html
  * https://www.suse.com/security/cve/CVE-2024-49989.html
  * https://www.suse.com/security/cve/CVE-2024-49991.html
  * https://www.suse.com/security/cve/CVE-2024-49993.html
  * https://www.suse.com/security/cve/CVE-2024-49995.html
  * https://www.suse.com/security/cve/CVE-2024-49996.html
  * https://www.suse.com/security/cve/CVE-2024-50000.html
  * https://www.suse.com/security/cve/CVE-2024-50001.html
  * https://www.suse.com/security/cve/CVE-2024-50002.html
  * https://www.suse.com/security/cve/CVE-2024-50003.html
  * https://www.suse.com/security/cve/CVE-2024-50006.html
  * https://www.suse.com/security/cve/CVE-2024-50007.html
  * https://www.suse.com/security/cve/CVE-2024-50008.html
  * https://www.suse.com/security/cve/CVE-2024-50009.html
  * https://www.suse.com/security/cve/CVE-2024-50013.html
  * https://www.suse.com/security/cve/CVE-2024-50014.html
  * https://www.suse.com/security/cve/CVE-2024-50017.html
  * https://www.suse.com/security/cve/CVE-2024-50019.html
  * https://www.suse.com/security/cve/CVE-2024-50024.html
  * https://www.suse.com/security/cve/CVE-2024-50025.html
  * https://www.suse.com/security/cve/CVE-2024-50026.html
  * https://www.suse.com/security/cve/CVE-2024-50028.html
  * https://www.suse.com/security/cve/CVE-2024-50031.html
  * https://www.suse.com/security/cve/CVE-2024-50033.html
  * https://www.suse.com/security/cve/CVE-2024-50035.html
  * https://www.suse.com/security/cve/CVE-2024-50041.html
  * https://www.suse.com/security/cve/CVE-2024-50044.html
  * https://www.suse.com/security/cve/CVE-2024-50045.html
  * https://www.suse.com/security/cve/CVE-2024-50046.html
  * https://www.suse.com/security/cve/CVE-2024-50047.html
  * https://www.suse.com/security/cve/CVE-2024-50048.html
  * https://www.suse.com/security/cve/CVE-2024-50049.html
  * https://www.suse.com/security/cve/CVE-2024-50055.html
  * https://www.suse.com/security/cve/CVE-2024-50058.html
  * https://www.suse.com/security/cve/CVE-2024-50059.html
  * https://www.suse.com/security/cve/CVE-2024-50061.html
  * https://www.suse.com/security/cve/CVE-2024-50062.html
  * https://www.suse.com/security/cve/CVE-2024-50063.html
  * https://www.suse.com/security/cve/CVE-2024-50067.html
  * https://www.suse.com/security/cve/CVE-2024-50073.html
  * https://www.suse.com/security/cve/CVE-2024-50074.html
  * https://www.suse.com/security/cve/CVE-2024-50077.html
  * https://www.suse.com/security/cve/CVE-2024-50078.html
  * https://www.suse.com/security/cve/CVE-2024-50081.html
  * https://www.suse.com/security/cve/CVE-2024-50082.html
  * https://www.suse.com/security/cve/CVE-2024-50089.html
  * https://www.suse.com/security/cve/CVE-2024-50093.html
  * https://www.suse.com/security/cve/CVE-2024-50095.html
  * https://www.suse.com/security/cve/CVE-2024-50096.html
  * https://www.suse.com/security/cve/CVE-2024-50098.html
  * https://www.suse.com/security/cve/CVE-2024-50099.html
  * https://www.suse.com/security/cve/CVE-2024-50103.html
  * https://www.suse.com/security/cve/CVE-2024-50108.html
  * https://www.suse.com/security/cve/CVE-2024-50110.html
  * https://www.suse.com/security/cve/CVE-2024-50115.html
  * https://www.suse.com/security/cve/CVE-2024-50116.html
  * https://www.suse.com/security/cve/CVE-2024-50117.html
  * https://www.suse.com/security/cve/CVE-2024-50124.html
  * https://www.suse.com/security/cve/CVE-2024-50125.html
  * https://www.suse.com/security/cve/CVE-2024-50127.html
  * https://www.suse.com/security/cve/CVE-2024-50128.html
  * https://www.suse.com/security/cve/CVE-2024-50131.html
  * https://www.suse.com/security/cve/CVE-2024-50134.html
  * https://www.suse.com/security/cve/CVE-2024-50135.html
  * https://www.suse.com/security/cve/CVE-2024-50138.html
  * https://www.suse.com/security/cve/CVE-2024-50141.html
  * https://www.suse.com/security/cve/CVE-2024-50146.html
  * https://www.suse.com/security/cve/CVE-2024-50147.html
  * https://www.suse.com/security/cve/CVE-2024-50148.html
  * https://www.suse.com/security/cve/CVE-2024-50150.html
  * https://www.suse.com/security/cve/CVE-2024-50153.html
  * https://www.suse.com/security/cve/CVE-2024-50154.html
  * https://www.suse.com/security/cve/CVE-2024-50155.html
  * https://www.suse.com/security/cve/CVE-2024-50156.html
  * https://www.suse.com/security/cve/CVE-2024-50160.html
  * https://www.suse.com/security/cve/CVE-2024-50167.html
  * https://www.suse.com/security/cve/CVE-2024-50171.html
  * https://www.suse.com/security/cve/CVE-2024-50179.html
  * https://www.suse.com/security/cve/CVE-2024-50180.html
  * https://www.suse.com/security/cve/CVE-2024-50182.html
  * https://www.suse.com/security/cve/CVE-2024-50183.html
  * https://www.suse.com/security/cve/CVE-2024-50184.html
  * https://www.suse.com/security/cve/CVE-2024-50186.html
  * https://www.suse.com/security/cve/CVE-2024-50187.html
  * https://www.suse.com/security/cve/CVE-2024-50188.html
  * https://www.suse.com/security/cve/CVE-2024-50189.html
  * https://www.suse.com/security/cve/CVE-2024-50192.html
  * https://www.suse.com/security/cve/CVE-2024-50194.html
  * https://www.suse.com/security/cve/CVE-2024-50195.html
  * https://www.suse.com/security/cve/CVE-2024-50196.html
  * https://www.suse.com/security/cve/CVE-2024-50198.html
  * https://www.suse.com/security/cve/CVE-2024-50201.html
  * https://www.suse.com/security/cve/CVE-2024-50205.html
  * https://www.suse.com/security/cve/CVE-2024-50208.html
  * https://www.suse.com/security/cve/CVE-2024-50209.html
  * https://www.suse.com/security/cve/CVE-2024-50215.html
  * https://www.suse.com/security/cve/CVE-2024-50218.html
  * https://www.suse.com/security/cve/CVE-2024-50229.html
  * https://www.suse.com/security/cve/CVE-2024-50230.html
  * https://www.suse.com/security/cve/CVE-2024-50232.html
  * https://www.suse.com/security/cve/CVE-2024-50233.html
  * https://www.suse.com/security/cve/CVE-2024-50234.html
  * https://www.suse.com/security/cve/CVE-2024-50236.html
  * https://www.suse.com/security/cve/CVE-2024-50237.html
  * https://www.suse.com/security/cve/CVE-2024-50249.html
  * https://www.suse.com/security/cve/CVE-2024-50255.html
  * https://www.suse.com/security/cve/CVE-2024-50259.html
  * https://www.suse.com/security/cve/CVE-2024-50261.html
  * https://www.suse.com/security/cve/CVE-2024-50264.html
  * https://www.suse.com/security/cve/CVE-2024-50265.html
  * https://www.suse.com/security/cve/CVE-2024-50267.html
  * https://www.suse.com/security/cve/CVE-2024-50268.html
  * https://www.suse.com/security/cve/CVE-2024-50269.html
  * https://www.suse.com/security/cve/CVE-2024-50271.html
  * https://www.suse.com/security/cve/CVE-2024-50273.html
  * https://www.suse.com/security/cve/CVE-2024-50274.html
  * https://www.suse.com/security/cve/CVE-2024-50279.html
  * https://www.suse.com/security/cve/CVE-2024-50282.html
  * https://www.suse.com/security/cve/CVE-2024-50287.html
  * https://www.suse.com/security/cve/CVE-2024-50289.html
  * https://www.suse.com/security/cve/CVE-2024-50290.html
  * https://www.suse.com/security/cve/CVE-2024-50292.html
  * https://www.suse.com/security/cve/CVE-2024-50295.html
  * https://www.suse.com/security/cve/CVE-2024-50298.html
  * https://www.suse.com/security/cve/CVE-2024-50301.html
  * https://www.suse.com/security/cve/CVE-2024-50302.html
  * https://www.suse.com/security/cve/CVE-2024-53052.html
  * https://www.suse.com/security/cve/CVE-2024-53058.html
  * https://www.suse.com/security/cve/CVE-2024-53059.html
  * https://www.suse.com/security/cve/CVE-2024-53060.html
  * https://www.suse.com/security/cve/CVE-2024-53061.html
  * https://www.suse.com/security/cve/CVE-2024-53063.html
  * https://www.suse.com/security/cve/CVE-2024-53066.html
  * https://www.suse.com/security/cve/CVE-2024-53068.html
  * https://www.suse.com/security/cve/CVE-2024-53079.html
  * https://www.suse.com/security/cve/CVE-2024-53085.html
  * https://www.suse.com/security/cve/CVE-2024-53088.html
  * https://www.suse.com/security/cve/CVE-2024-53104.html
  * https://www.suse.com/security/cve/CVE-2024-53110.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1054914
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1082555
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1204171
  * https://bugzilla.suse.com/show_bug.cgi?id=1205796
  * https://bugzilla.suse.com/show_bug.cgi?id=1206188
  * https://bugzilla.suse.com/show_bug.cgi?id=1206344
  * https://bugzilla.suse.com/show_bug.cgi?id=1209290
  * https://bugzilla.suse.com/show_bug.cgi?id=1210449
  * https://bugzilla.suse.com/show_bug.cgi?id=1210627
  * https://bugzilla.suse.com/show_bug.cgi?id=1213034
  * https://bugzilla.suse.com/show_bug.cgi?id=1216813
  * https://bugzilla.suse.com/show_bug.cgi?id=1218562
  * https://bugzilla.suse.com/show_bug.cgi?id=1218644
  * https://bugzilla.suse.com/show_bug.cgi?id=1220382
  * https://bugzilla.suse.com/show_bug.cgi?id=1221309
  * https://bugzilla.suse.com/show_bug.cgi?id=1221333
  * https://bugzilla.suse.com/show_bug.cgi?id=1222364
  * https://bugzilla.suse.com/show_bug.cgi?id=1222590
  * https://bugzilla.suse.com/show_bug.cgi?id=1223202
  * https://bugzilla.suse.com/show_bug.cgi?id=1223384
  * https://bugzilla.suse.com/show_bug.cgi?id=1223524
  * https://bugzilla.suse.com/show_bug.cgi?id=1223656
  * https://bugzilla.suse.com/show_bug.cgi?id=1223824
  * https://bugzilla.suse.com/show_bug.cgi?id=1223848
  * https://bugzilla.suse.com/show_bug.cgi?id=1223919
  * https://bugzilla.suse.com/show_bug.cgi?id=1223942
  * https://bugzilla.suse.com/show_bug.cgi?id=1224518
  * https://bugzilla.suse.com/show_bug.cgi?id=1224526
  * https://bugzilla.suse.com/show_bug.cgi?id=1224574
  * https://bugzilla.suse.com/show_bug.cgi?id=1225189
  * https://bugzilla.suse.com/show_bug.cgi?id=1225336
  * https://bugzilla.suse.com/show_bug.cgi?id=1225611
  * https://bugzilla.suse.com/show_bug.cgi?id=1225725
  * https://bugzilla.suse.com/show_bug.cgi?id=1225730
  * https://bugzilla.suse.com/show_bug.cgi?id=1225742
  * https://bugzilla.suse.com/show_bug.cgi?id=1225762
  * https://bugzilla.suse.com/show_bug.cgi?id=1225764
  * https://bugzilla.suse.com/show_bug.cgi?id=1225812
  * https://bugzilla.suse.com/show_bug.cgi?id=1226498
  * https://bugzilla.suse.com/show_bug.cgi?id=1226560
  * https://bugzilla.suse.com/show_bug.cgi?id=1226592
  * https://bugzilla.suse.com/show_bug.cgi?id=1226631
  * https://bugzilla.suse.com/show_bug.cgi?id=1226748
  * https://bugzilla.suse.com/show_bug.cgi?id=1226797
  * https://bugzilla.suse.com/show_bug.cgi?id=1226872
  * https://bugzilla.suse.com/show_bug.cgi?id=1227437
  * https://bugzilla.suse.com/show_bug.cgi?id=1227853
  * https://bugzilla.suse.com/show_bug.cgi?id=1227885
  * https://bugzilla.suse.com/show_bug.cgi?id=1228119
  * https://bugzilla.suse.com/show_bug.cgi?id=1228269
  * https://bugzilla.suse.com/show_bug.cgi?id=1228410
  * https://bugzilla.suse.com/show_bug.cgi?id=1228430
  * https://bugzilla.suse.com/show_bug.cgi?id=1228486
  * https://bugzilla.suse.com/show_bug.cgi?id=1228650
  * https://bugzilla.suse.com/show_bug.cgi?id=1228709
  * https://bugzilla.suse.com/show_bug.cgi?id=1228743
  * https://bugzilla.suse.com/show_bug.cgi?id=1228747
  * https://bugzilla.suse.com/show_bug.cgi?id=1228857
  * https://bugzilla.suse.com/show_bug.cgi?id=1229005
  * https://bugzilla.suse.com/show_bug.cgi?id=1229019
  * https://bugzilla.suse.com/show_bug.cgi?id=1229312
  * https://bugzilla.suse.com/show_bug.cgi?id=1229429
  * https://bugzilla.suse.com/show_bug.cgi?id=1229450
  * https://bugzilla.suse.com/show_bug.cgi?id=1229454
  * https://bugzilla.suse.com/show_bug.cgi?id=1229456
  * https://bugzilla.suse.com/show_bug.cgi?id=1229556
  * https://bugzilla.suse.com/show_bug.cgi?id=1229585
  * https://bugzilla.suse.com/show_bug.cgi?id=1229752
  * https://bugzilla.suse.com/show_bug.cgi?id=1229769
  * https://bugzilla.suse.com/show_bug.cgi?id=1229808
  * https://bugzilla.suse.com/show_bug.cgi?id=1229837
  * https://bugzilla.suse.com/show_bug.cgi?id=1229891
  * https://bugzilla.suse.com/show_bug.cgi?id=1230055
  * https://bugzilla.suse.com/show_bug.cgi?id=1230179
  * https://bugzilla.suse.com/show_bug.cgi?id=1230220
  * https://bugzilla.suse.com/show_bug.cgi?id=1230231
  * https://bugzilla.suse.com/show_bug.cgi?id=1230270
  * https://bugzilla.suse.com/show_bug.cgi?id=1230289
  * https://bugzilla.suse.com/show_bug.cgi?id=1230405
  * https://bugzilla.suse.com/show_bug.cgi?id=1230414
  * https://bugzilla.suse.com/show_bug.cgi?id=1230429
  * https://bugzilla.suse.com/show_bug.cgi?id=1230456
  * https://bugzilla.suse.com/show_bug.cgi?id=1230550
  * https://bugzilla.suse.com/show_bug.cgi?id=1230558
  * https://bugzilla.suse.com/show_bug.cgi?id=1230600
  * https://bugzilla.suse.com/show_bug.cgi?id=1230620
  * https://bugzilla.suse.com/show_bug.cgi?id=1230715
  * https://bugzilla.suse.com/show_bug.cgi?id=1230722
  * https://bugzilla.suse.com/show_bug.cgi?id=1230763
  * https://bugzilla.suse.com/show_bug.cgi?id=1230773
  * https://bugzilla.suse.com/show_bug.cgi?id=1230774
  * https://bugzilla.suse.com/show_bug.cgi?id=1230801
  * https://bugzilla.suse.com/show_bug.cgi?id=1230827
  * https://bugzilla.suse.com/show_bug.cgi?id=1230903
  * https://bugzilla.suse.com/show_bug.cgi?id=1230918
  * https://bugzilla.suse.com/show_bug.cgi?id=1231016
  * https://bugzilla.suse.com/show_bug.cgi?id=1231072
  * https://bugzilla.suse.com/show_bug.cgi?id=1231073
  * https://bugzilla.suse.com/show_bug.cgi?id=1231083
  * https://bugzilla.suse.com/show_bug.cgi?id=1231084
  * https://bugzilla.suse.com/show_bug.cgi?id=1231085
  * https://bugzilla.suse.com/show_bug.cgi?id=1231087
  * https://bugzilla.suse.com/show_bug.cgi?id=1231089
  * https://bugzilla.suse.com/show_bug.cgi?id=1231094
  * https://bugzilla.suse.com/show_bug.cgi?id=1231096
  * https://bugzilla.suse.com/show_bug.cgi?id=1231098
  * https://bugzilla.suse.com/show_bug.cgi?id=1231101
  * https://bugzilla.suse.com/show_bug.cgi?id=1231105
  * https://bugzilla.suse.com/show_bug.cgi?id=1231108
  * https://bugzilla.suse.com/show_bug.cgi?id=1231111
  * https://bugzilla.suse.com/show_bug.cgi?id=1231114
  * https://bugzilla.suse.com/show_bug.cgi?id=1231115
  * https://bugzilla.suse.com/show_bug.cgi?id=1231132
  * https://bugzilla.suse.com/show_bug.cgi?id=1231135
  * https://bugzilla.suse.com/show_bug.cgi?id=1231138
  * https://bugzilla.suse.com/show_bug.cgi?id=1231148
  * https://bugzilla.suse.com/show_bug.cgi?id=1231169
  * https://bugzilla.suse.com/show_bug.cgi?id=1231178
  * https://bugzilla.suse.com/show_bug.cgi?id=1231179
  * https://bugzilla.suse.com/show_bug.cgi?id=1231180
  * https://bugzilla.suse.com/show_bug.cgi?id=1231181
  * https://bugzilla.suse.com/show_bug.cgi?id=1231187
  * https://bugzilla.suse.com/show_bug.cgi?id=1231191
  * https://bugzilla.suse.com/show_bug.cgi?id=1231193
  * https://bugzilla.suse.com/show_bug.cgi?id=1231195
  * https://bugzilla.suse.com/show_bug.cgi?id=1231197
  * https://bugzilla.suse.com/show_bug.cgi?id=1231200
  * https://bugzilla.suse.com/show_bug.cgi?id=1231202
  * https://bugzilla.suse.com/show_bug.cgi?id=1231203
  * https://bugzilla.suse.com/show_bug.cgi?id=1231277
  * https://bugzilla.suse.com/show_bug.cgi?id=1231293
  * https://bugzilla.suse.com/show_bug.cgi?id=1231327
  * https://bugzilla.suse.com/show_bug.cgi?id=1231344
  * https://bugzilla.suse.com/show_bug.cgi?id=1231375
  * https://bugzilla.suse.com/show_bug.cgi?id=1231383
  * https://bugzilla.suse.com/show_bug.cgi?id=1231434
  * https://bugzilla.suse.com/show_bug.cgi?id=1231439
  * https://bugzilla.suse.com/show_bug.cgi?id=1231441
  * https://bugzilla.suse.com/show_bug.cgi?id=1231442
  * https://bugzilla.suse.com/show_bug.cgi?id=1231452
  * https://bugzilla.suse.com/show_bug.cgi?id=1231465
  * https://bugzilla.suse.com/show_bug.cgi?id=1231474
  * https://bugzilla.suse.com/show_bug.cgi?id=1231481
  * https://bugzilla.suse.com/show_bug.cgi?id=1231496
  * https://bugzilla.suse.com/show_bug.cgi?id=1231502
  * https://bugzilla.suse.com/show_bug.cgi?id=1231537
  * https://bugzilla.suse.com/show_bug.cgi?id=1231539
  * https://bugzilla.suse.com/show_bug.cgi?id=1231540
  * https://bugzilla.suse.com/show_bug.cgi?id=1231541
  * https://bugzilla.suse.com/show_bug.cgi?id=1231578
  * https://bugzilla.suse.com/show_bug.cgi?id=1231646
  * https://bugzilla.suse.com/show_bug.cgi?id=1231673
  * https://bugzilla.suse.com/show_bug.cgi?id=1231849
  * https://bugzilla.suse.com/show_bug.cgi?id=1231856
  * https://bugzilla.suse.com/show_bug.cgi?id=1231857
  * https://bugzilla.suse.com/show_bug.cgi?id=1231858
  * https://bugzilla.suse.com/show_bug.cgi?id=1231859
  * https://bugzilla.suse.com/show_bug.cgi?id=1231861
  * https://bugzilla.suse.com/show_bug.cgi?id=1231864
  * https://bugzilla.suse.com/show_bug.cgi?id=1231872
  * https://bugzilla.suse.com/show_bug.cgi?id=1231883
  * https://bugzilla.suse.com/show_bug.cgi?id=1231885
  * https://bugzilla.suse.com/show_bug.cgi?id=1231887
  * https://bugzilla.suse.com/show_bug.cgi?id=1231888
  * https://bugzilla.suse.com/show_bug.cgi?id=1231889
  * https://bugzilla.suse.com/show_bug.cgi?id=1231890
  * https://bugzilla.suse.com/show_bug.cgi?id=1231892
  * https://bugzilla.suse.com/show_bug.cgi?id=1231893
  * https://bugzilla.suse.com/show_bug.cgi?id=1231895
  * https://bugzilla.suse.com/show_bug.cgi?id=1231896
  * https://bugzilla.suse.com/show_bug.cgi?id=1231897
  * https://bugzilla.suse.com/show_bug.cgi?id=1231902
  * https://bugzilla.suse.com/show_bug.cgi?id=1231903
  * https://bugzilla.suse.com/show_bug.cgi?id=1231904
  * https://bugzilla.suse.com/show_bug.cgi?id=1231907
  * https://bugzilla.suse.com/show_bug.cgi?id=1231914
  * https://bugzilla.suse.com/show_bug.cgi?id=1231916
  * https://bugzilla.suse.com/show_bug.cgi?id=1231920
  * https://bugzilla.suse.com/show_bug.cgi?id=1231923
  * https://bugzilla.suse.com/show_bug.cgi?id=1231929
  * https://bugzilla.suse.com/show_bug.cgi?id=1231930
  * https://bugzilla.suse.com/show_bug.cgi?id=1231931
  * https://bugzilla.suse.com/show_bug.cgi?id=1231935
  * https://bugzilla.suse.com/show_bug.cgi?id=1231936
  * https://bugzilla.suse.com/show_bug.cgi?id=1231937
  * https://bugzilla.suse.com/show_bug.cgi?id=1231938
  * https://bugzilla.suse.com/show_bug.cgi?id=1231939
  * https://bugzilla.suse.com/show_bug.cgi?id=1231940
  * https://bugzilla.suse.com/show_bug.cgi?id=1231941
  * https://bugzilla.suse.com/show_bug.cgi?id=1231942
  * https://bugzilla.suse.com/show_bug.cgi?id=1231944
  * https://bugzilla.suse.com/show_bug.cgi?id=1231947
  * https://bugzilla.suse.com/show_bug.cgi?id=1231950
  * https://bugzilla.suse.com/show_bug.cgi?id=1231952
  * https://bugzilla.suse.com/show_bug.cgi?id=1231953
  * https://bugzilla.suse.com/show_bug.cgi?id=1231954
  * https://bugzilla.suse.com/show_bug.cgi?id=1231958
  * https://bugzilla.suse.com/show_bug.cgi?id=1231959
  * https://bugzilla.suse.com/show_bug.cgi?id=1231960
  * https://bugzilla.suse.com/show_bug.cgi?id=1231961
  * https://bugzilla.suse.com/show_bug.cgi?id=1231962
  * https://bugzilla.suse.com/show_bug.cgi?id=1231965
  * https://bugzilla.suse.com/show_bug.cgi?id=1231967
  * https://bugzilla.suse.com/show_bug.cgi?id=1231968
  * https://bugzilla.suse.com/show_bug.cgi?id=1231972
  * https://bugzilla.suse.com/show_bug.cgi?id=1231973
  * https://bugzilla.suse.com/show_bug.cgi?id=1231976
  * https://bugzilla.suse.com/show_bug.cgi?id=1231978
  * https://bugzilla.suse.com/show_bug.cgi?id=1231979
  * https://bugzilla.suse.com/show_bug.cgi?id=1231987
  * https://bugzilla.suse.com/show_bug.cgi?id=1231988
  * https://bugzilla.suse.com/show_bug.cgi?id=1231990
  * https://bugzilla.suse.com/show_bug.cgi?id=1231991
  * https://bugzilla.suse.com/show_bug.cgi?id=1231992
  * https://bugzilla.suse.com/show_bug.cgi?id=1231995
  * https://bugzilla.suse.com/show_bug.cgi?id=1231996
  * https://bugzilla.suse.com/show_bug.cgi?id=1231997
  * https://bugzilla.suse.com/show_bug.cgi?id=1231998
  * https://bugzilla.suse.com/show_bug.cgi?id=1232001
  * https://bugzilla.suse.com/show_bug.cgi?id=1232004
  * https://bugzilla.suse.com/show_bug.cgi?id=1232005
  * https://bugzilla.suse.com/show_bug.cgi?id=1232006
  * https://bugzilla.suse.com/show_bug.cgi?id=1232007
  * https://bugzilla.suse.com/show_bug.cgi?id=1232013
  * https://bugzilla.suse.com/show_bug.cgi?id=1232015
  * https://bugzilla.suse.com/show_bug.cgi?id=1232016
  * https://bugzilla.suse.com/show_bug.cgi?id=1232017
  * https://bugzilla.suse.com/show_bug.cgi?id=1232025
  * https://bugzilla.suse.com/show_bug.cgi?id=1232026
  * https://bugzilla.suse.com/show_bug.cgi?id=1232027
  * https://bugzilla.suse.com/show_bug.cgi?id=1232028
  * https://bugzilla.suse.com/show_bug.cgi?id=1232033
  * https://bugzilla.suse.com/show_bug.cgi?id=1232034
  * https://bugzilla.suse.com/show_bug.cgi?id=1232035
  * https://bugzilla.suse.com/show_bug.cgi?id=1232036
  * https://bugzilla.suse.com/show_bug.cgi?id=1232037
  * https://bugzilla.suse.com/show_bug.cgi?id=1232038
  * https://bugzilla.suse.com/show_bug.cgi?id=1232039
  * https://bugzilla.suse.com/show_bug.cgi?id=1232043
  * https://bugzilla.suse.com/show_bug.cgi?id=1232047
  * https://bugzilla.suse.com/show_bug.cgi?id=1232048
  * https://bugzilla.suse.com/show_bug.cgi?id=1232049
  * https://bugzilla.suse.com/show_bug.cgi?id=1232050
  * https://bugzilla.suse.com/show_bug.cgi?id=1232056
  * https://bugzilla.suse.com/show_bug.cgi?id=1232067
  * https://bugzilla.suse.com/show_bug.cgi?id=1232069
  * https://bugzilla.suse.com/show_bug.cgi?id=1232070
  * https://bugzilla.suse.com/show_bug.cgi?id=1232071
  * https://bugzilla.suse.com/show_bug.cgi?id=1232075
  * https://bugzilla.suse.com/show_bug.cgi?id=1232076
  * https://bugzilla.suse.com/show_bug.cgi?id=1232080
  * https://bugzilla.suse.com/show_bug.cgi?id=1232083
  * https://bugzilla.suse.com/show_bug.cgi?id=1232084
  * https://bugzilla.suse.com/show_bug.cgi?id=1232085
  * https://bugzilla.suse.com/show_bug.cgi?id=1232089
  * https://bugzilla.suse.com/show_bug.cgi?id=1232094
  * https://bugzilla.suse.com/show_bug.cgi?id=1232096
  * https://bugzilla.suse.com/show_bug.cgi?id=1232097
  * https://bugzilla.suse.com/show_bug.cgi?id=1232098
  * https://bugzilla.suse.com/show_bug.cgi?id=1232104
  * https://bugzilla.suse.com/show_bug.cgi?id=1232105
  * https://bugzilla.suse.com/show_bug.cgi?id=1232108
  * https://bugzilla.suse.com/show_bug.cgi?id=1232111
  * https://bugzilla.suse.com/show_bug.cgi?id=1232114
  * https://bugzilla.suse.com/show_bug.cgi?id=1232116
  * https://bugzilla.suse.com/show_bug.cgi?id=1232119
  * https://bugzilla.suse.com/show_bug.cgi?id=1232120
  * https://bugzilla.suse.com/show_bug.cgi?id=1232123
  * https://bugzilla.suse.com/show_bug.cgi?id=1232124
  * https://bugzilla.suse.com/show_bug.cgi?id=1232126
  * https://bugzilla.suse.com/show_bug.cgi?id=1232133
  * https://bugzilla.suse.com/show_bug.cgi?id=1232134
  * https://bugzilla.suse.com/show_bug.cgi?id=1232135
  * https://bugzilla.suse.com/show_bug.cgi?id=1232136
  * https://bugzilla.suse.com/show_bug.cgi?id=1232140
  * https://bugzilla.suse.com/show_bug.cgi?id=1232141
  * https://bugzilla.suse.com/show_bug.cgi?id=1232142
  * https://bugzilla.suse.com/show_bug.cgi?id=1232145
  * https://bugzilla.suse.com/show_bug.cgi?id=1232147
  * https://bugzilla.suse.com/show_bug.cgi?id=1232149
  * https://bugzilla.suse.com/show_bug.cgi?id=1232150
  * https://bugzilla.suse.com/show_bug.cgi?id=1232151
  * https://bugzilla.suse.com/show_bug.cgi?id=1232152
  * https://bugzilla.suse.com/show_bug.cgi?id=1232154
  * https://bugzilla.suse.com/show_bug.cgi?id=1232155
  * https://bugzilla.suse.com/show_bug.cgi?id=1232159
  * https://bugzilla.suse.com/show_bug.cgi?id=1232160
  * https://bugzilla.suse.com/show_bug.cgi?id=1232162
  * https://bugzilla.suse.com/show_bug.cgi?id=1232163
  * https://bugzilla.suse.com/show_bug.cgi?id=1232164
  * https://bugzilla.suse.com/show_bug.cgi?id=1232165
  * https://bugzilla.suse.com/show_bug.cgi?id=1232170
  * https://bugzilla.suse.com/show_bug.cgi?id=1232172
  * https://bugzilla.suse.com/show_bug.cgi?id=1232174
  * https://bugzilla.suse.com/show_bug.cgi?id=1232175
  * https://bugzilla.suse.com/show_bug.cgi?id=1232180
  * https://bugzilla.suse.com/show_bug.cgi?id=1232185
  * https://bugzilla.suse.com/show_bug.cgi?id=1232187
  * https://bugzilla.suse.com/show_bug.cgi?id=1232189
  * https://bugzilla.suse.com/show_bug.cgi?id=1232191
  * https://bugzilla.suse.com/show_bug.cgi?id=1232195
  * https://bugzilla.suse.com/show_bug.cgi?id=1232196
  * https://bugzilla.suse.com/show_bug.cgi?id=1232198
  * https://bugzilla.suse.com/show_bug.cgi?id=1232199
  * https://bugzilla.suse.com/show_bug.cgi?id=1232200
  * https://bugzilla.suse.com/show_bug.cgi?id=1232201
  * https://bugzilla.suse.com/show_bug.cgi?id=1232217
  * https://bugzilla.suse.com/show_bug.cgi?id=1232218
  * https://bugzilla.suse.com/show_bug.cgi?id=1232220
  * https://bugzilla.suse.com/show_bug.cgi?id=1232221
  * https://bugzilla.suse.com/show_bug.cgi?id=1232224
  * https://bugzilla.suse.com/show_bug.cgi?id=1232229
  * https://bugzilla.suse.com/show_bug.cgi?id=1232232
  * https://bugzilla.suse.com/show_bug.cgi?id=1232233
  * https://bugzilla.suse.com/show_bug.cgi?id=1232237
  * https://bugzilla.suse.com/show_bug.cgi?id=1232251
  * https://bugzilla.suse.com/show_bug.cgi?id=1232253
  * https://bugzilla.suse.com/show_bug.cgi?id=1232254
  * https://bugzilla.suse.com/show_bug.cgi?id=1232255
  * https://bugzilla.suse.com/show_bug.cgi?id=1232259
  * https://bugzilla.suse.com/show_bug.cgi?id=1232260
  * https://bugzilla.suse.com/show_bug.cgi?id=1232262
  * https://bugzilla.suse.com/show_bug.cgi?id=1232263
  * https://bugzilla.suse.com/show_bug.cgi?id=1232264
  * https://bugzilla.suse.com/show_bug.cgi?id=1232272
  * https://bugzilla.suse.com/show_bug.cgi?id=1232279
  * https://bugzilla.suse.com/show_bug.cgi?id=1232282
  * https://bugzilla.suse.com/show_bug.cgi?id=1232285
  * https://bugzilla.suse.com/show_bug.cgi?id=1232286
  * https://bugzilla.suse.com/show_bug.cgi?id=1232287
  * https://bugzilla.suse.com/show_bug.cgi?id=1232293
  * https://bugzilla.suse.com/show_bug.cgi?id=1232304
  * https://bugzilla.suse.com/show_bug.cgi?id=1232305
  * https://bugzilla.suse.com/show_bug.cgi?id=1232307
  * https://bugzilla.suse.com/show_bug.cgi?id=1232309
  * https://bugzilla.suse.com/show_bug.cgi?id=1232310
  * https://bugzilla.suse.com/show_bug.cgi?id=1232312
  * https://bugzilla.suse.com/show_bug.cgi?id=1232313
  * https://bugzilla.suse.com/show_bug.cgi?id=1232314
  * https://bugzilla.suse.com/show_bug.cgi?id=1232316
  * https://bugzilla.suse.com/show_bug.cgi?id=1232317
  * https://bugzilla.suse.com/show_bug.cgi?id=1232318
  * https://bugzilla.suse.com/show_bug.cgi?id=1232329
  * https://bugzilla.suse.com/show_bug.cgi?id=1232332
  * https://bugzilla.suse.com/show_bug.cgi?id=1232333
  * https://bugzilla.suse.com/show_bug.cgi?id=1232334
  * https://bugzilla.suse.com/show_bug.cgi?id=1232335
  * https://bugzilla.suse.com/show_bug.cgi?id=1232337
  * https://bugzilla.suse.com/show_bug.cgi?id=1232339
  * https://bugzilla.suse.com/show_bug.cgi?id=1232342
  * https://bugzilla.suse.com/show_bug.cgi?id=1232345
  * https://bugzilla.suse.com/show_bug.cgi?id=1232349
  * https://bugzilla.suse.com/show_bug.cgi?id=1232352
  * https://bugzilla.suse.com/show_bug.cgi?id=1232354
  * https://bugzilla.suse.com/show_bug.cgi?id=1232355
  * https://bugzilla.suse.com/show_bug.cgi?id=1232357
  * https://bugzilla.suse.com/show_bug.cgi?id=1232358
  * https://bugzilla.suse.com/show_bug.cgi?id=1232359
  * https://bugzilla.suse.com/show_bug.cgi?id=1232361
  * https://bugzilla.suse.com/show_bug.cgi?id=1232362
  * https://bugzilla.suse.com/show_bug.cgi?id=1232364
  * https://bugzilla.suse.com/show_bug.cgi?id=1232366
  * https://bugzilla.suse.com/show_bug.cgi?id=1232367
  * https://bugzilla.suse.com/show_bug.cgi?id=1232368
  * https://bugzilla.suse.com/show_bug.cgi?id=1232369
  * https://bugzilla.suse.com/show_bug.cgi?id=1232370
  * https://bugzilla.suse.com/show_bug.cgi?id=1232371
  * https://bugzilla.suse.com/show_bug.cgi?id=1232374
  * https://bugzilla.suse.com/show_bug.cgi?id=1232378
  * https://bugzilla.suse.com/show_bug.cgi?id=1232381
  * https://bugzilla.suse.com/show_bug.cgi?id=1232383
  * https://bugzilla.suse.com/show_bug.cgi?id=1232385
  * https://bugzilla.suse.com/show_bug.cgi?id=1232387
  * https://bugzilla.suse.com/show_bug.cgi?id=1232392
  * https://bugzilla.suse.com/show_bug.cgi?id=1232394
  * https://bugzilla.suse.com/show_bug.cgi?id=1232395
  * https://bugzilla.suse.com/show_bug.cgi?id=1232413
  * https://bugzilla.suse.com/show_bug.cgi?id=1232416
  * https://bugzilla.suse.com/show_bug.cgi?id=1232418
  * https://bugzilla.suse.com/show_bug.cgi?id=1232424
  * https://bugzilla.suse.com/show_bug.cgi?id=1232432
  * https://bugzilla.suse.com/show_bug.cgi?id=1232435
  * https://bugzilla.suse.com/show_bug.cgi?id=1232436
  * https://bugzilla.suse.com/show_bug.cgi?id=1232442
  * https://bugzilla.suse.com/show_bug.cgi?id=1232446
  * https://bugzilla.suse.com/show_bug.cgi?id=1232483
  * https://bugzilla.suse.com/show_bug.cgi?id=1232500
  * https://bugzilla.suse.com/show_bug.cgi?id=1232501
  * https://bugzilla.suse.com/show_bug.cgi?id=1232503
  * https://bugzilla.suse.com/show_bug.cgi?id=1232504
  * https://bugzilla.suse.com/show_bug.cgi?id=1232507
  * https://bugzilla.suse.com/show_bug.cgi?id=1232519
  * https://bugzilla.suse.com/show_bug.cgi?id=1232520
  * https://bugzilla.suse.com/show_bug.cgi?id=1232552
  * https://bugzilla.suse.com/show_bug.cgi?id=1232630
  * https://bugzilla.suse.com/show_bug.cgi?id=1232631
  * https://bugzilla.suse.com/show_bug.cgi?id=1232632
  * https://bugzilla.suse.com/show_bug.cgi?id=1232757
  * https://bugzilla.suse.com/show_bug.cgi?id=1232819
  * https://bugzilla.suse.com/show_bug.cgi?id=1232860
  * https://bugzilla.suse.com/show_bug.cgi?id=1232870
  * https://bugzilla.suse.com/show_bug.cgi?id=1232873
  * https://bugzilla.suse.com/show_bug.cgi?id=1232877
  * https://bugzilla.suse.com/show_bug.cgi?id=1232878
  * https://bugzilla.suse.com/show_bug.cgi?id=1232881
  * https://bugzilla.suse.com/show_bug.cgi?id=1232884
  * https://bugzilla.suse.com/show_bug.cgi?id=1232885
  * https://bugzilla.suse.com/show_bug.cgi?id=1232887
  * https://bugzilla.suse.com/show_bug.cgi?id=1232888
  * https://bugzilla.suse.com/show_bug.cgi?id=1232890
  * https://bugzilla.suse.com/show_bug.cgi?id=1232892
  * https://bugzilla.suse.com/show_bug.cgi?id=1232896
  * https://bugzilla.suse.com/show_bug.cgi?id=1232897
  * https://bugzilla.suse.com/show_bug.cgi?id=1232905
  * https://bugzilla.suse.com/show_bug.cgi?id=1232907
  * https://bugzilla.suse.com/show_bug.cgi?id=1232919
  * https://bugzilla.suse.com/show_bug.cgi?id=1232926
  * https://bugzilla.suse.com/show_bug.cgi?id=1232928
  * https://bugzilla.suse.com/show_bug.cgi?id=1232935
  * https://bugzilla.suse.com/show_bug.cgi?id=1233035
  * https://bugzilla.suse.com/show_bug.cgi?id=1233049
  * https://bugzilla.suse.com/show_bug.cgi?id=1233051
  * https://bugzilla.suse.com/show_bug.cgi?id=1233056
  * https://bugzilla.suse.com/show_bug.cgi?id=1233057
  * https://bugzilla.suse.com/show_bug.cgi?id=1233061
  * https://bugzilla.suse.com/show_bug.cgi?id=1233063
  * https://bugzilla.suse.com/show_bug.cgi?id=1233065
  * https://bugzilla.suse.com/show_bug.cgi?id=1233067
  * https://bugzilla.suse.com/show_bug.cgi?id=1233070
  * https://bugzilla.suse.com/show_bug.cgi?id=1233073
  * https://bugzilla.suse.com/show_bug.cgi?id=1233074
  * https://bugzilla.suse.com/show_bug.cgi?id=1233100
  * https://bugzilla.suse.com/show_bug.cgi?id=1233103
  * https://bugzilla.suse.com/show_bug.cgi?id=1233104
  * https://bugzilla.suse.com/show_bug.cgi?id=1233105
  * https://bugzilla.suse.com/show_bug.cgi?id=1233106
  * https://bugzilla.suse.com/show_bug.cgi?id=1233107
  * https://bugzilla.suse.com/show_bug.cgi?id=1233108
  * https://bugzilla.suse.com/show_bug.cgi?id=1233110
  * https://bugzilla.suse.com/show_bug.cgi?id=1233111
  * https://bugzilla.suse.com/show_bug.cgi?id=1233113
  * https://bugzilla.suse.com/show_bug.cgi?id=1233114
  * https://bugzilla.suse.com/show_bug.cgi?id=1233117
  * https://bugzilla.suse.com/show_bug.cgi?id=1233123
  * https://bugzilla.suse.com/show_bug.cgi?id=1233125
  * https://bugzilla.suse.com/show_bug.cgi?id=1233129
  * https://bugzilla.suse.com/show_bug.cgi?id=1233130
  * https://bugzilla.suse.com/show_bug.cgi?id=1233134
  * https://bugzilla.suse.com/show_bug.cgi?id=1233135
  * https://bugzilla.suse.com/show_bug.cgi?id=1233150
  * https://bugzilla.suse.com/show_bug.cgi?id=1233189
  * https://bugzilla.suse.com/show_bug.cgi?id=1233191
  * https://bugzilla.suse.com/show_bug.cgi?id=1233197
  * https://bugzilla.suse.com/show_bug.cgi?id=1233205
  * https://bugzilla.suse.com/show_bug.cgi?id=1233206
  * https://bugzilla.suse.com/show_bug.cgi?id=1233209
  * https://bugzilla.suse.com/show_bug.cgi?id=1233210
  * https://bugzilla.suse.com/show_bug.cgi?id=1233211
  * https://bugzilla.suse.com/show_bug.cgi?id=1233212
  * https://bugzilla.suse.com/show_bug.cgi?id=1233214
  * https://bugzilla.suse.com/show_bug.cgi?id=1233216
  * https://bugzilla.suse.com/show_bug.cgi?id=1233238
  * https://bugzilla.suse.com/show_bug.cgi?id=1233241
  * https://bugzilla.suse.com/show_bug.cgi?id=1233253
  * https://bugzilla.suse.com/show_bug.cgi?id=1233255
  * https://bugzilla.suse.com/show_bug.cgi?id=1233293
  * https://bugzilla.suse.com/show_bug.cgi?id=1233350
  * https://bugzilla.suse.com/show_bug.cgi?id=1233452
  * https://bugzilla.suse.com/show_bug.cgi?id=1233453
  * https://bugzilla.suse.com/show_bug.cgi?id=1233454
  * https://bugzilla.suse.com/show_bug.cgi?id=1233456
  * https://bugzilla.suse.com/show_bug.cgi?id=1233457
  * https://bugzilla.suse.com/show_bug.cgi?id=1233458
  * https://bugzilla.suse.com/show_bug.cgi?id=1233460
  * https://bugzilla.suse.com/show_bug.cgi?id=1233462
  * https://bugzilla.suse.com/show_bug.cgi?id=1233463
  * https://bugzilla.suse.com/show_bug.cgi?id=1233468
  * https://bugzilla.suse.com/show_bug.cgi?id=1233471
  * https://bugzilla.suse.com/show_bug.cgi?id=1233476
  * https://bugzilla.suse.com/show_bug.cgi?id=1233478
  * https://bugzilla.suse.com/show_bug.cgi?id=1233479
  * https://bugzilla.suse.com/show_bug.cgi?id=1233481
  * https://bugzilla.suse.com/show_bug.cgi?id=1233484
  * https://bugzilla.suse.com/show_bug.cgi?id=1233487
  * https://bugzilla.suse.com/show_bug.cgi?id=1233490
  * https://bugzilla.suse.com/show_bug.cgi?id=1233491
  * https://bugzilla.suse.com/show_bug.cgi?id=1233528
  * https://bugzilla.suse.com/show_bug.cgi?id=1233548
  * https://bugzilla.suse.com/show_bug.cgi?id=1233552
  * https://bugzilla.suse.com/show_bug.cgi?id=1233553
  * https://bugzilla.suse.com/show_bug.cgi?id=1233554
  * https://bugzilla.suse.com/show_bug.cgi?id=1233555
  * https://bugzilla.suse.com/show_bug.cgi?id=1233557
  * https://bugzilla.suse.com/show_bug.cgi?id=1233560
  * https://bugzilla.suse.com/show_bug.cgi?id=1233561
  * https://bugzilla.suse.com/show_bug.cgi?id=1233570
  * https://bugzilla.suse.com/show_bug.cgi?id=1233577
  * https://bugzilla.suse.com/show_bug.cgi?id=1233580
  * https://bugzilla.suse.com/show_bug.cgi?id=1233977
  * https://bugzilla.suse.com/show_bug.cgi?id=1234012
  * https://bugzilla.suse.com/show_bug.cgi?id=1234025
  * https://bugzilla.suse.com/show_bug.cgi?id=1234085
  * https://bugzilla.suse.com/show_bug.cgi?id=1234093
  * https://bugzilla.suse.com/show_bug.cgi?id=1234098
  * https://bugzilla.suse.com/show_bug.cgi?id=1234108
  * https://jira.suse.com/browse/PED-1166
  * https://jira.suse.com/browse/PED-1168
  * https://jira.suse.com/browse/PED-1170
  * https://jira.suse.com/browse/PED-1218
  * https://jira.suse.com/browse/PED-1220
  * https://jira.suse.com/browse/PED-1222
  * https://jira.suse.com/browse/PED-1223
  * https://jira.suse.com/browse/PED-1225
  * https://jira.suse.com/browse/PED-2849

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20241217/eb23ef96/attachment.htm>


More information about the sle-security-updates mailing list