SUSE-SU-2024:4387-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Thu Dec 19 16:36:55 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4387-1  
Release Date: 2024-12-19T15:39:03Z  
Rating: important  
References:

  * bsc#1012628
  * bsc#1065729
  * bsc#1082555
  * bsc#1194869
  * bsc#1215199
  * bsc#1217845
  * bsc#1218562
  * bsc#1218644
  * bsc#1219596
  * bsc#1219803
  * bsc#1220382
  * bsc#1221309
  * bsc#1222423
  * bsc#1222587
  * bsc#1222590
  * bsc#1223112
  * bsc#1223384
  * bsc#1223656
  * bsc#1223700
  * bsc#1223733
  * bsc#1223824
  * bsc#1223848
  * bsc#1224088
  * bsc#1224429
  * bsc#1224518
  * bsc#1224548
  * bsc#1224574
  * bsc#1224948
  * bsc#1225611
  * bsc#1225713
  * bsc#1225725
  * bsc#1225730
  * bsc#1225742
  * bsc#1225764
  * bsc#1225768
  * bsc#1225813
  * bsc#1225903
  * bsc#1226003
  * bsc#1226130
  * bsc#1226498
  * bsc#1226623
  * bsc#1226631
  * bsc#1226748
  * bsc#1226797
  * bsc#1226848
  * bsc#1226872
  * bsc#1227726
  * bsc#1227842
  * bsc#1228119
  * bsc#1228244
  * bsc#1228269
  * bsc#1228410
  * bsc#1228430
  * bsc#1228454
  * bsc#1228537
  * bsc#1228620
  * bsc#1228743
  * bsc#1228747
  * bsc#1228850
  * bsc#1228857
  * bsc#1229019
  * bsc#1229165
  * bsc#1229429
  * bsc#1229450
  * bsc#1229585
  * bsc#1229677
  * bsc#1229769
  * bsc#1229808
  * bsc#1229891
  * bsc#1230055
  * bsc#1230132
  * bsc#1230179
  * bsc#1230220
  * bsc#1230231
  * bsc#1230289
  * bsc#1230295
  * bsc#1230339
  * bsc#1230341
  * bsc#1230375
  * bsc#1230414
  * bsc#1230429
  * bsc#1230456
  * bsc#1230501
  * bsc#1230527
  * bsc#1230550
  * bsc#1230558
  * bsc#1230600
  * bsc#1230620
  * bsc#1230710
  * bsc#1230733
  * bsc#1230762
  * bsc#1230763
  * bsc#1230773
  * bsc#1230774
  * bsc#1230801
  * bsc#1230817
  * bsc#1230831
  * bsc#1230914
  * bsc#1230918
  * bsc#1230971
  * bsc#1231016
  * bsc#1231035
  * bsc#1231072
  * bsc#1231073
  * bsc#1231075
  * bsc#1231076
  * bsc#1231081
  * bsc#1231082
  * bsc#1231083
  * bsc#1231084
  * bsc#1231085
  * bsc#1231087
  * bsc#1231089
  * bsc#1231092
  * bsc#1231093
  * bsc#1231094
  * bsc#1231096
  * bsc#1231098
  * bsc#1231100
  * bsc#1231101
  * bsc#1231102
  * bsc#1231105
  * bsc#1231108
  * bsc#1231111
  * bsc#1231114
  * bsc#1231115
  * bsc#1231116
  * bsc#1231117
  * bsc#1231131
  * bsc#1231132
  * bsc#1231135
  * bsc#1231136
  * bsc#1231138
  * bsc#1231148
  * bsc#1231169
  * bsc#1231170
  * bsc#1231171
  * bsc#1231178
  * bsc#1231179
  * bsc#1231182
  * bsc#1231183
  * bsc#1231187
  * bsc#1231191
  * bsc#1231193
  * bsc#1231195
  * bsc#1231197
  * bsc#1231200
  * bsc#1231202
  * bsc#1231203
  * bsc#1231276
  * bsc#1231293
  * bsc#1231384
  * bsc#1231434
  * bsc#1231435
  * bsc#1231436
  * bsc#1231439
  * bsc#1231440
  * bsc#1231441
  * bsc#1231442
  * bsc#1231452
  * bsc#1231453
  * bsc#1231465
  * bsc#1231474
  * bsc#1231481
  * bsc#1231496
  * bsc#1231502
  * bsc#1231537
  * bsc#1231539
  * bsc#1231540
  * bsc#1231541
  * bsc#1231617
  * bsc#1231630
  * bsc#1231634
  * bsc#1231635
  * bsc#1231636
  * bsc#1231637
  * bsc#1231638
  * bsc#1231639
  * bsc#1231640
  * bsc#1231673
  * bsc#1231828
  * bsc#1231849
  * bsc#1231855
  * bsc#1231856
  * bsc#1231857
  * bsc#1231858
  * bsc#1231859
  * bsc#1231860
  * bsc#1231861
  * bsc#1231864
  * bsc#1231865
  * bsc#1231868
  * bsc#1231869
  * bsc#1231871
  * bsc#1231872
  * bsc#1231901
  * bsc#1231902
  * bsc#1231903
  * bsc#1231904
  * bsc#1231906
  * bsc#1231907
  * bsc#1231908
  * bsc#1231914
  * bsc#1231916
  * bsc#1231920
  * bsc#1231924
  * bsc#1231926
  * bsc#1231930
  * bsc#1231931
  * bsc#1231935
  * bsc#1231942
  * bsc#1231944
  * bsc#1231946
  * bsc#1231947
  * bsc#1231950
  * bsc#1231951
  * bsc#1231952
  * bsc#1231953
  * bsc#1231954
  * bsc#1231955
  * bsc#1231956
  * bsc#1231957
  * bsc#1231965
  * bsc#1231967
  * bsc#1231968
  * bsc#1231987
  * bsc#1231988
  * bsc#1231989
  * bsc#1231990
  * bsc#1231998
  * bsc#1232000
  * bsc#1232003
  * bsc#1232009
  * bsc#1232013
  * bsc#1232015
  * bsc#1232016
  * bsc#1232017
  * bsc#1232018
  * bsc#1232033
  * bsc#1232034
  * bsc#1232036
  * bsc#1232043
  * bsc#1232047
  * bsc#1232048
  * bsc#1232049
  * bsc#1232050
  * bsc#1232056
  * bsc#1232075
  * bsc#1232076
  * bsc#1232079
  * bsc#1232080
  * bsc#1232083
  * bsc#1232084
  * bsc#1232085
  * bsc#1232089
  * bsc#1232090
  * bsc#1232093
  * bsc#1232094
  * bsc#1232096
  * bsc#1232097
  * bsc#1232098
  * bsc#1232103
  * bsc#1232104
  * bsc#1232105
  * bsc#1232109
  * bsc#1232111
  * bsc#1232114
  * bsc#1232116
  * bsc#1232117
  * bsc#1232124
  * bsc#1232126
  * bsc#1232127
  * bsc#1232129
  * bsc#1232130
  * bsc#1232131
  * bsc#1232132
  * bsc#1232134
  * bsc#1232135
  * bsc#1232140
  * bsc#1232141
  * bsc#1232142
  * bsc#1232145
  * bsc#1232147
  * bsc#1232148
  * bsc#1232149
  * bsc#1232151
  * bsc#1232152
  * bsc#1232154
  * bsc#1232155
  * bsc#1232156
  * bsc#1232159
  * bsc#1232160
  * bsc#1232162
  * bsc#1232164
  * bsc#1232165
  * bsc#1232174
  * bsc#1232180
  * bsc#1232182
  * bsc#1232183
  * bsc#1232185
  * bsc#1232187
  * bsc#1232189
  * bsc#1232192
  * bsc#1232195
  * bsc#1232196
  * bsc#1232198
  * bsc#1232199
  * bsc#1232200
  * bsc#1232201
  * bsc#1232207
  * bsc#1232208
  * bsc#1232217
  * bsc#1232218
  * bsc#1232220
  * bsc#1232221
  * bsc#1232222
  * bsc#1232224
  * bsc#1232232
  * bsc#1232250
  * bsc#1232251
  * bsc#1232253
  * bsc#1232254
  * bsc#1232255
  * bsc#1232256
  * bsc#1232258
  * bsc#1232259
  * bsc#1232260
  * bsc#1232262
  * bsc#1232263
  * bsc#1232264
  * bsc#1232272
  * bsc#1232275
  * bsc#1232279
  * bsc#1232282
  * bsc#1232285
  * bsc#1232287
  * bsc#1232295
  * bsc#1232305
  * bsc#1232307
  * bsc#1232309
  * bsc#1232310
  * bsc#1232312
  * bsc#1232313
  * bsc#1232314
  * bsc#1232315
  * bsc#1232316
  * bsc#1232317
  * bsc#1232318
  * bsc#1232329
  * bsc#1232332
  * bsc#1232333
  * bsc#1232334
  * bsc#1232335
  * bsc#1232337
  * bsc#1232339
  * bsc#1232340
  * bsc#1232342
  * bsc#1232345
  * bsc#1232349
  * bsc#1232352
  * bsc#1232354
  * bsc#1232355
  * bsc#1232357
  * bsc#1232358
  * bsc#1232359
  * bsc#1232361
  * bsc#1232362
  * bsc#1232366
  * bsc#1232367
  * bsc#1232368
  * bsc#1232369
  * bsc#1232370
  * bsc#1232371
  * bsc#1232374
  * bsc#1232378
  * bsc#1232381
  * bsc#1232383
  * bsc#1232385
  * bsc#1232386
  * bsc#1232387
  * bsc#1232392
  * bsc#1232394
  * bsc#1232395
  * bsc#1232396
  * bsc#1232413
  * bsc#1232416
  * bsc#1232417
  * bsc#1232418
  * bsc#1232424
  * bsc#1232427
  * bsc#1232432
  * bsc#1232435
  * bsc#1232436
  * bsc#1232442
  * bsc#1232446
  * bsc#1232483
  * bsc#1232494
  * bsc#1232498
  * bsc#1232499
  * bsc#1232500
  * bsc#1232501
  * bsc#1232502
  * bsc#1232503
  * bsc#1232504
  * bsc#1232505
  * bsc#1232506
  * bsc#1232507
  * bsc#1232511
  * bsc#1232519
  * bsc#1232520
  * bsc#1232529
  * bsc#1232552
  * bsc#1232623
  * bsc#1232626
  * bsc#1232627
  * bsc#1232628
  * bsc#1232629
  * bsc#1232704
  * bsc#1232757
  * bsc#1232768
  * bsc#1232819
  * bsc#1232823
  * bsc#1232860
  * bsc#1232869
  * bsc#1232870
  * bsc#1232873
  * bsc#1232876
  * bsc#1232877
  * bsc#1232878
  * bsc#1232880
  * bsc#1232881
  * bsc#1232884
  * bsc#1232885
  * bsc#1232887
  * bsc#1232888
  * bsc#1232890
  * bsc#1232892
  * bsc#1232894
  * bsc#1232896
  * bsc#1232897
  * bsc#1232905
  * bsc#1232907
  * bsc#1232914
  * bsc#1232919
  * bsc#1232925
  * bsc#1232926
  * bsc#1232928
  * bsc#1232935
  * bsc#1233029
  * bsc#1233032
  * bsc#1233035
  * bsc#1233036
  * bsc#1233041
  * bsc#1233044
  * bsc#1233049
  * bsc#1233050
  * bsc#1233051
  * bsc#1233056
  * bsc#1233057
  * bsc#1233061
  * bsc#1233062
  * bsc#1233063
  * bsc#1233065
  * bsc#1233067
  * bsc#1233070
  * bsc#1233073
  * bsc#1233074
  * bsc#1233088
  * bsc#1233091
  * bsc#1233092
  * bsc#1233097
  * bsc#1233100
  * bsc#1233103
  * bsc#1233104
  * bsc#1233105
  * bsc#1233106
  * bsc#1233107
  * bsc#1233108
  * bsc#1233110
  * bsc#1233111
  * bsc#1233113
  * bsc#1233114
  * bsc#1233115
  * bsc#1233117
  * bsc#1233119
  * bsc#1233123
  * bsc#1233125
  * bsc#1233127
  * bsc#1233129
  * bsc#1233130
  * bsc#1233132
  * bsc#1233135
  * bsc#1233176
  * bsc#1233179
  * bsc#1233185
  * bsc#1233188
  * bsc#1233189
  * bsc#1233191
  * bsc#1233193
  * bsc#1233197
  * bsc#1233203
  * bsc#1233205
  * bsc#1233206
  * bsc#1233207
  * bsc#1233208
  * bsc#1233209
  * bsc#1233210
  * bsc#1233211
  * bsc#1233212
  * bsc#1233216
  * bsc#1233217
  * bsc#1233219
  * bsc#1233226
  * bsc#1233238
  * bsc#1233241
  * bsc#1233244
  * bsc#1233253
  * bsc#1233255
  * bsc#1233293
  * bsc#1233298
  * bsc#1233305
  * bsc#1233320
  * bsc#1233350
  * bsc#1233443
  * bsc#1233452
  * bsc#1233453
  * bsc#1233454
  * bsc#1233456
  * bsc#1233457
  * bsc#1233458
  * bsc#1233460
  * bsc#1233462
  * bsc#1233463
  * bsc#1233464
  * bsc#1233465
  * bsc#1233468
  * bsc#1233471
  * bsc#1233476
  * bsc#1233478
  * bsc#1233479
  * bsc#1233481
  * bsc#1233484
  * bsc#1233487
  * bsc#1233490
  * bsc#1233491
  * bsc#1233524
  * bsc#1233540
  * bsc#1233548
  * bsc#1233552
  * bsc#1233553
  * bsc#1233554
  * bsc#1233555
  * bsc#1233557
  * bsc#1233560
  * bsc#1233561
  * bsc#1233564
  * bsc#1233566
  * bsc#1233567
  * bsc#1233570
  * bsc#1233572
  * bsc#1233573
  * bsc#1233577
  * bsc#1233580
  * bsc#1233640
  * bsc#1233641
  * bsc#1233721
  * bsc#1233754
  * bsc#1233756
  * bsc#1233769
  * bsc#1233771
  * bsc#1233977
  * bsc#1234009
  * bsc#1234011
  * bsc#1234012
  * bsc#1234025
  * bsc#1234034
  * bsc#1234039
  * bsc#1234040
  * bsc#1234041
  * bsc#1234042
  * bsc#1234043
  * bsc#1234044
  * bsc#1234045
  * bsc#1234046
  * bsc#1234072
  * bsc#1234081
  * bsc#1234083
  * bsc#1234087
  * bsc#1234093
  * bsc#1234098
  * bsc#1234108
  * bsc#1234121
  * jsc#PED-10559
  * jsc#PED-10978
  * jsc#PED-11316
  * jsc#PED-11442
  * jsc#PED-11580
  * jsc#PED-5865
  * jsc#PED-6143
  * jsc#PED-9899
  * jsc#PED-9901
  * jsc#PED-9943

  
Cross-References:

  * CVE-2023-52766
  * CVE-2023-52778
  * CVE-2023-52800
  * CVE-2023-52881
  * CVE-2023-52917
  * CVE-2023-52918
  * CVE-2023-52919
  * CVE-2023-52920
  * CVE-2023-52921
  * CVE-2023-52922
  * CVE-2023-6270
  * CVE-2024-26703
  * CVE-2024-26741
  * CVE-2024-26758
  * CVE-2024-26761
  * CVE-2024-26767
  * CVE-2024-26782
  * CVE-2024-26864
  * CVE-2024-26943
  * CVE-2024-26953
  * CVE-2024-27017
  * CVE-2024-27026
  * CVE-2024-27043
  * CVE-2024-27407
  * CVE-2024-35888
  * CVE-2024-35980
  * CVE-2024-36000
  * CVE-2024-36031
  * CVE-2024-36244
  * CVE-2024-36484
  * CVE-2024-36883
  * CVE-2024-36886
  * CVE-2024-36905
  * CVE-2024-36920
  * CVE-2024-36927
  * CVE-2024-36954
  * CVE-2024-36968
  * CVE-2024-38576
  * CVE-2024-38577
  * CVE-2024-38589
  * CVE-2024-38599
  * CVE-2024-40914
  * CVE-2024-41016
  * CVE-2024-41023
  * CVE-2024-41031
  * CVE-2024-41047
  * CVE-2024-41082
  * CVE-2024-42102
  * CVE-2024-42145
  * CVE-2024-44932
  * CVE-2024-44958
  * CVE-2024-44964
  * CVE-2024-44995
  * CVE-2024-45016
  * CVE-2024-45025
  * CVE-2024-46678
  * CVE-2024-46681
  * CVE-2024-46721
  * CVE-2024-46754
  * CVE-2024-46766
  * CVE-2024-46770
  * CVE-2024-46775
  * CVE-2024-46777
  * CVE-2024-46788
  * CVE-2024-46797
  * CVE-2024-46802
  * CVE-2024-46803
  * CVE-2024-46804
  * CVE-2024-46805
  * CVE-2024-46806
  * CVE-2024-46807
  * CVE-2024-46809
  * CVE-2024-46810
  * CVE-2024-46811
  * CVE-2024-46812
  * CVE-2024-46813
  * CVE-2024-46814
  * CVE-2024-46815
  * CVE-2024-46816
  * CVE-2024-46817
  * CVE-2024-46818
  * CVE-2024-46819
  * CVE-2024-46821
  * CVE-2024-46825
  * CVE-2024-46826
  * CVE-2024-46827
  * CVE-2024-46828
  * CVE-2024-46830
  * CVE-2024-46831
  * CVE-2024-46834
  * CVE-2024-46835
  * CVE-2024-46836
  * CVE-2024-46840
  * CVE-2024-46841
  * CVE-2024-46842
  * CVE-2024-46843
  * CVE-2024-46845
  * CVE-2024-46846
  * CVE-2024-46848
  * CVE-2024-46849
  * CVE-2024-46851
  * CVE-2024-46852
  * CVE-2024-46853
  * CVE-2024-46854
  * CVE-2024-46855
  * CVE-2024-46857
  * CVE-2024-46859
  * CVE-2024-46860
  * CVE-2024-46861
  * CVE-2024-46864
  * CVE-2024-46870
  * CVE-2024-46871
  * CVE-2024-47658
  * CVE-2024-47660
  * CVE-2024-47661
  * CVE-2024-47662
  * CVE-2024-47663
  * CVE-2024-47664
  * CVE-2024-47665
  * CVE-2024-47666
  * CVE-2024-47667
  * CVE-2024-47668
  * CVE-2024-47669
  * CVE-2024-47670
  * CVE-2024-47671
  * CVE-2024-47672
  * CVE-2024-47673
  * CVE-2024-47674
  * CVE-2024-47675
  * CVE-2024-47679
  * CVE-2024-47681
  * CVE-2024-47682
  * CVE-2024-47684
  * CVE-2024-47685
  * CVE-2024-47686
  * CVE-2024-47687
  * CVE-2024-47688
  * CVE-2024-47692
  * CVE-2024-47693
  * CVE-2024-47695
  * CVE-2024-47696
  * CVE-2024-47697
  * CVE-2024-47698
  * CVE-2024-47699
  * CVE-2024-47701
  * CVE-2024-47702
  * CVE-2024-47703
  * CVE-2024-47704
  * CVE-2024-47705
  * CVE-2024-47706
  * CVE-2024-47707
  * CVE-2024-47709
  * CVE-2024-47710
  * CVE-2024-47712
  * CVE-2024-47713
  * CVE-2024-47714
  * CVE-2024-47715
  * CVE-2024-47718
  * CVE-2024-47719
  * CVE-2024-47720
  * CVE-2024-47723
  * CVE-2024-47727
  * CVE-2024-47728
  * CVE-2024-47730
  * CVE-2024-47731
  * CVE-2024-47732
  * CVE-2024-47735
  * CVE-2024-47737
  * CVE-2024-47738
  * CVE-2024-47739
  * CVE-2024-47741
  * CVE-2024-47742
  * CVE-2024-47743
  * CVE-2024-47744
  * CVE-2024-47745
  * CVE-2024-47747
  * CVE-2024-47748
  * CVE-2024-47749
  * CVE-2024-47750
  * CVE-2024-47751
  * CVE-2024-47752
  * CVE-2024-47753
  * CVE-2024-47754
  * CVE-2024-47756
  * CVE-2024-47757
  * CVE-2024-49850
  * CVE-2024-49851
  * CVE-2024-49852
  * CVE-2024-49853
  * CVE-2024-49855
  * CVE-2024-49858
  * CVE-2024-49860
  * CVE-2024-49861
  * CVE-2024-49862
  * CVE-2024-49863
  * CVE-2024-49864
  * CVE-2024-49866
  * CVE-2024-49867
  * CVE-2024-49868
  * CVE-2024-49870
  * CVE-2024-49871
  * CVE-2024-49874
  * CVE-2024-49875
  * CVE-2024-49877
  * CVE-2024-49878
  * CVE-2024-49879
  * CVE-2024-49881
  * CVE-2024-49882
  * CVE-2024-49883
  * CVE-2024-49884
  * CVE-2024-49886
  * CVE-2024-49888
  * CVE-2024-49890
  * CVE-2024-49891
  * CVE-2024-49892
  * CVE-2024-49894
  * CVE-2024-49895
  * CVE-2024-49896
  * CVE-2024-49897
  * CVE-2024-49898
  * CVE-2024-49899
  * CVE-2024-49900
  * CVE-2024-49901
  * CVE-2024-49902
  * CVE-2024-49903
  * CVE-2024-49905
  * CVE-2024-49906
  * CVE-2024-49907
  * CVE-2024-49908
  * CVE-2024-49909
  * CVE-2024-49911
  * CVE-2024-49912
  * CVE-2024-49913
  * CVE-2024-49914
  * CVE-2024-49917
  * CVE-2024-49918
  * CVE-2024-49919
  * CVE-2024-49920
  * CVE-2024-49921
  * CVE-2024-49922
  * CVE-2024-49923
  * CVE-2024-49925
  * CVE-2024-49928
  * CVE-2024-49929
  * CVE-2024-49930
  * CVE-2024-49931
  * CVE-2024-49933
  * CVE-2024-49934
  * CVE-2024-49935
  * CVE-2024-49936
  * CVE-2024-49937
  * CVE-2024-49938
  * CVE-2024-49939
  * CVE-2024-49945
  * CVE-2024-49946
  * CVE-2024-49947
  * CVE-2024-49949
  * CVE-2024-49950
  * CVE-2024-49953
  * CVE-2024-49954
  * CVE-2024-49955
  * CVE-2024-49957
  * CVE-2024-49958
  * CVE-2024-49959
  * CVE-2024-49960
  * CVE-2024-49961
  * CVE-2024-49962
  * CVE-2024-49963
  * CVE-2024-49965
  * CVE-2024-49966
  * CVE-2024-49967
  * CVE-2024-49968
  * CVE-2024-49969
  * CVE-2024-49972
  * CVE-2024-49973
  * CVE-2024-49974
  * CVE-2024-49975
  * CVE-2024-49976
  * CVE-2024-49981
  * CVE-2024-49982
  * CVE-2024-49983
  * CVE-2024-49985
  * CVE-2024-49986
  * CVE-2024-49987
  * CVE-2024-49989
  * CVE-2024-49991
  * CVE-2024-49993
  * CVE-2024-49995
  * CVE-2024-49996
  * CVE-2024-50000
  * CVE-2024-50001
  * CVE-2024-50002
  * CVE-2024-50003
  * CVE-2024-50004
  * CVE-2024-50006
  * CVE-2024-50007
  * CVE-2024-50008
  * CVE-2024-50009
  * CVE-2024-50012
  * CVE-2024-50013
  * CVE-2024-50014
  * CVE-2024-50015
  * CVE-2024-50017
  * CVE-2024-50019
  * CVE-2024-50020
  * CVE-2024-50021
  * CVE-2024-50022
  * CVE-2024-50023
  * CVE-2024-50024
  * CVE-2024-50025
  * CVE-2024-50026
  * CVE-2024-50027
  * CVE-2024-50028
  * CVE-2024-50031
  * CVE-2024-50033
  * CVE-2024-50035
  * CVE-2024-50040
  * CVE-2024-50041
  * CVE-2024-50042
  * CVE-2024-50044
  * CVE-2024-50045
  * CVE-2024-50046
  * CVE-2024-50047
  * CVE-2024-50048
  * CVE-2024-50049
  * CVE-2024-50055
  * CVE-2024-50058
  * CVE-2024-50059
  * CVE-2024-50060
  * CVE-2024-50061
  * CVE-2024-50062
  * CVE-2024-50063
  * CVE-2024-50064
  * CVE-2024-50067
  * CVE-2024-50069
  * CVE-2024-50073
  * CVE-2024-50074
  * CVE-2024-50075
  * CVE-2024-50076
  * CVE-2024-50077
  * CVE-2024-50078
  * CVE-2024-50080
  * CVE-2024-50081
  * CVE-2024-50082
  * CVE-2024-50084
  * CVE-2024-50087
  * CVE-2024-50088
  * CVE-2024-50089
  * CVE-2024-50093
  * CVE-2024-50095
  * CVE-2024-50096
  * CVE-2024-50098
  * CVE-2024-50099
  * CVE-2024-50100
  * CVE-2024-50101
  * CVE-2024-50102
  * CVE-2024-50103
  * CVE-2024-50108
  * CVE-2024-50110
  * CVE-2024-50115
  * CVE-2024-50116
  * CVE-2024-50117
  * CVE-2024-50121
  * CVE-2024-50124
  * CVE-2024-50125
  * CVE-2024-50127
  * CVE-2024-50128
  * CVE-2024-50130
  * CVE-2024-50131
  * CVE-2024-50134
  * CVE-2024-50135
  * CVE-2024-50136
  * CVE-2024-50138
  * CVE-2024-50139
  * CVE-2024-50141
  * CVE-2024-50145
  * CVE-2024-50146
  * CVE-2024-50147
  * CVE-2024-50148
  * CVE-2024-50150
  * CVE-2024-50153
  * CVE-2024-50154
  * CVE-2024-50155
  * CVE-2024-50156
  * CVE-2024-50157
  * CVE-2024-50158
  * CVE-2024-50159
  * CVE-2024-50160
  * CVE-2024-50166
  * CVE-2024-50167
  * CVE-2024-50169
  * CVE-2024-50171
  * CVE-2024-50172
  * CVE-2024-50175
  * CVE-2024-50176
  * CVE-2024-50177
  * CVE-2024-50179
  * CVE-2024-50180
  * CVE-2024-50181
  * CVE-2024-50182
  * CVE-2024-50183
  * CVE-2024-50184
  * CVE-2024-50186
  * CVE-2024-50187
  * CVE-2024-50188
  * CVE-2024-50189
  * CVE-2024-50192
  * CVE-2024-50194
  * CVE-2024-50195
  * CVE-2024-50196
  * CVE-2024-50198
  * CVE-2024-50200
  * CVE-2024-50201
  * CVE-2024-50205
  * CVE-2024-50208
  * CVE-2024-50209
  * CVE-2024-50210
  * CVE-2024-50215
  * CVE-2024-50216
  * CVE-2024-50218
  * CVE-2024-50221
  * CVE-2024-50224
  * CVE-2024-50225
  * CVE-2024-50229
  * CVE-2024-50230
  * CVE-2024-50231
  * CVE-2024-50232
  * CVE-2024-50233
  * CVE-2024-50234
  * CVE-2024-50235
  * CVE-2024-50236
  * CVE-2024-50237
  * CVE-2024-50240
  * CVE-2024-50245
  * CVE-2024-50246
  * CVE-2024-50248
  * CVE-2024-50249
  * CVE-2024-50250
  * CVE-2024-50255
  * CVE-2024-50257
  * CVE-2024-50261
  * CVE-2024-50264
  * CVE-2024-50265
  * CVE-2024-50267
  * CVE-2024-50268
  * CVE-2024-50269
  * CVE-2024-50271
  * CVE-2024-50273
  * CVE-2024-50274
  * CVE-2024-50275
  * CVE-2024-50276
  * CVE-2024-50279
  * CVE-2024-50282
  * CVE-2024-50287
  * CVE-2024-50289
  * CVE-2024-50290
  * CVE-2024-50292
  * CVE-2024-50295
  * CVE-2024-50298
  * CVE-2024-50301
  * CVE-2024-50302
  * CVE-2024-53042
  * CVE-2024-53045
  * CVE-2024-53048
  * CVE-2024-53052
  * CVE-2024-53058
  * CVE-2024-53059
  * CVE-2024-53060
  * CVE-2024-53061
  * CVE-2024-53063
  * CVE-2024-53066
  * CVE-2024-53068
  * CVE-2024-53072
  * CVE-2024-53074
  * CVE-2024-53076
  * CVE-2024-53079
  * CVE-2024-53081
  * CVE-2024-53082
  * CVE-2024-53085
  * CVE-2024-53088
  * CVE-2024-53093
  * CVE-2024-53094
  * CVE-2024-53096
  * CVE-2024-53100
  * CVE-2024-53101
  * CVE-2024-53104
  * CVE-2024-53106
  * CVE-2024-53108
  * CVE-2024-53112
  * CVE-2024-53114

  
CVSS scores:

  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52778 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-52800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52800 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52881 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52917 ( SUSE ):  4.6
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-52917 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52917 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52918 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52918 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52919 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52920 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52920 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52920 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52921 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52921 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52921 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52922 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52922 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52922 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6270 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6270 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26703 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26741 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26758 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26758 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26761 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26767 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
  * CVE-2024-26767 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26782 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26864 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26943 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27017 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-27026 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27043 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27407 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27407 ( NVD ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35888 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35888 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36031 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-36244 ( SUSE ):  3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
  * CVE-2024-36484 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36883 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36886 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36886 ( NVD ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36905 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36920 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-36927 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36954 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36968 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36968 ( NVD ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2024-38576 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38576 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-38577 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38577 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38589 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38599 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-40914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-41023 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-41023 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-41031 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-41047 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-41082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42102 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42102 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-42102 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42145 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42145 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42145 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44932 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44932 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44958 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44964 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
  * CVE-2024-44964 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44964 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44995 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44995 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45016 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-45016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45025 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45025 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46678 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
  * CVE-2024-46678 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46678 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46681 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
  * CVE-2024-46681 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-46681 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46721 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46721 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46754 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46754 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46766 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46770 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46770 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46775 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46775 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46777 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46777 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46788 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46788 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46788 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46797 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46797 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46797 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46802 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46802 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46802 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46803 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46803 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46803 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46804 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46804 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-46804 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46805 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46805 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46805 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46806 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46806 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46807 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46807 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46807 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46809 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46809 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46810 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46810 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46811 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46811 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46812 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46812 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46812 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46813 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46813 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46813 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46814 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46814 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46814 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46815 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46815 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46815 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46816 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46816 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46816 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46817 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46817 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46817 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46818 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46818 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46818 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46819 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46819 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46821 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46825 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-46825 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46826 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46827 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46827 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46831 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46831 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46834 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46834 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46835 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46835 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46836 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46836 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46840 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46840 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46841 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46842 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46843 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46843 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46845 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46846 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46846 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46848 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46848 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46849 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46849 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46851 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46852 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46853 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46854 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-46854 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46855 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46857 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46859 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46860 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46860 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46861 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46861 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46864 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46870 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46870 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46870 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46871 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46871 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-46871 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47658 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47658 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47658 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47660 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47660 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47660 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47661 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47661 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-47661 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47662 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47662 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-47662 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47663 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47663 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47664 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47664 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47664 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47665 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47665 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47665 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47666 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47666 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47666 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47667 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47667 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2024-47667 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47668 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47668 ( SUSE ):  4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-47668 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47669 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47669 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-47669 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47670 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47670 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47670 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47671 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-47671 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-47672 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47672 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47673 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47673 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47674 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47674 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47674 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47675 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47675 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47675 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47679 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47679 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47679 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47681 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47681 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47681 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47682 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47682 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47682 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47684 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47684 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47684 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47685 ( SUSE ):  6.3
    CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47685 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  * CVE-2024-47685 ( NVD ):  9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47686 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47686 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-47686 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47687 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47687 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47687 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47688 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47688 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47688 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47692 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47692 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47692 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47693 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47693 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-47693 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47695 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47695 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47695 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47696 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47696 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47696 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47697 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47697 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47697 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47698 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47698 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-47698 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47699 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47699 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47701 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47701 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47701 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47702 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47702 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47702 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47703 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47703 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47703 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47704 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47704 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47704 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47705 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47705 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47705 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47706 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47706 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47706 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47707 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47707 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47707 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47709 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47709 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47709 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47710 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47710 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47710 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47712 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47712 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47713 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47713 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47714 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47714 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47715 ( SUSE ):  7.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47715 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47715 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47718 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47718 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47719 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47719 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-47719 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47720 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47720 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47720 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47723 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47723 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47723 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47727 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47727 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47727 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47728 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47730 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47730 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47731 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47731 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47731 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47732 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47732 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47735 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47737 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47737 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47737 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47738 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47738 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47739 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47739 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47741 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47741 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47741 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47742 ( SUSE ):  8.3
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47742 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2024-47742 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47743 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47743 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47743 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47744 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47744 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47744 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47745 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47745 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47745 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47747 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47747 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47747 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47748 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47748 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47748 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47749 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47749 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47749 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47750 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47750 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47750 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47751 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47751 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47751 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47752 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47752 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47752 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47753 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47753 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47754 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47754 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47756 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47756 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47756 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47757 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47757 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47757 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49850 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49850 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49851 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49851 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49852 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49852 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49853 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49853 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49853 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49855 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49855 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49855 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49858 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49858 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-49858 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49860 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49860 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49860 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49861 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-49861 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-49861 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-49862 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49862 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49862 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49863 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49863 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49864 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49864 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49864 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49866 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49866 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49866 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49867 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49867 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49867 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49868 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49868 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49868 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49870 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-49870 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-49870 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49871 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49871 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49871 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49874 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49874 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49874 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49875 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49875 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49875 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-49877 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49877 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49878 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-49878 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-49878 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49879 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49879 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49881 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49882 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49883 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49883 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49886 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49888 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49888 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49888 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49890 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49890 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49890 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49891 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49891 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49891 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49892 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49892 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49892 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49894 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49894 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49894 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49895 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49895 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-49895 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49896 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49896 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49897 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49897 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49897 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49898 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49898 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49898 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49899 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49899 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49899 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49900 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49900 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49900 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49901 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49901 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49902 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49902 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49902 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49903 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49903 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49903 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49905 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49905 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49906 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49906 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49906 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49907 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49907 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49907 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49908 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49908 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49909 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49909 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49909 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49911 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49911 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49911 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49912 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49912 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49913 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49913 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49914 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49914 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49917 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49917 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49918 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49918 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49919 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49919 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49920 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49920 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49920 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49921 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49921 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49921 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49922 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49922 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49922 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49923 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49923 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49923 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49925 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49925 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49925 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49928 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49928 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49928 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49929 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49929 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49929 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49930 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49930 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49930 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49931 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49931 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49931 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49933 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49933 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49933 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49934 ( SUSE ):  4.1
    CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49934 ( SUSE ):  4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49934 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49935 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49935 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49935 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49936 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49936 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49936 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49937 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49937 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49937 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49938 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49938 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49939 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49939 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49939 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49945 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49945 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49946 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49946 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49947 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49949 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49949 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49953 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49954 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49954 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49955 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49955 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49957 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49958 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49959 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49959 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49960 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49960 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49960 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49961 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49961 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49962 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49962 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49962 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49963 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49963 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49965 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49965 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49966 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49966 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49967 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49968 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49968 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-49968 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49969 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49969 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49969 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49972 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49972 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49972 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49973 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49973 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49974 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49974 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49974 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49975 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49975 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49976 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49981 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49981 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49982 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49983 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49983 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49985 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49986 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49986 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49987 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49987 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49987 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49989 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49989 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49989 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49991 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49991 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49991 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49993 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49993 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49993 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49995 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49995 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49995 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49996 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49996 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50000 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50001 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50001 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50002 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50002 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50003 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50003 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50003 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50004 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50004 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50004 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50006 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50006 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50006 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50007 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50007 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50007 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50008 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50008 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-50008 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50009 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50009 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50009 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50012 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50012 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50013 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50013 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50014 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50014 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50015 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50015 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50017 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50019 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50020 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50020 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50021 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50021 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50022 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50022 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50023 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50023 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50024 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50024 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50025 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50025 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50026 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50026 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50027 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50027 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50028 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50028 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50031 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50031 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50033 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50033 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50035 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50035 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50035 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50040 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50040 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50041 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50041 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50042 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50042 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50044 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50044 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50045 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50045 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50046 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50046 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50047 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50047 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50048 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50048 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50049 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50049 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50055 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50055 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50058 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50058 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50059 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50059 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50059 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50060 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50060 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50061 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50061 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50062 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50062 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50063 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50063 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50063 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50064 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50067 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50067 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50067 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50069 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50069 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50073 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50073 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50074 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50074 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50075 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50075 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50076 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50076 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50077 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50077 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50078 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50078 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50080 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50080 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50081 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50081 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50082 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50084 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50084 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50084 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50087 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50087 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50088 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50088 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50089 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50089 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2024-50089 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50093 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50095 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50096 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50096 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50098 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50099 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50099 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50100 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50100 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50101 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50101 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50102 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50102 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50103 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50103 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50108 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50108 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50110 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50110 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50115 ( SUSE ):  4.5
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
  * CVE-2024-50115 ( SUSE ):  7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
  * CVE-2024-50115 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50116 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50116 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50116 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50117 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50117 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50117 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50121 ( SUSE ):  6.0
    CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50121 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50121 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50121 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50124 ( SUSE ):  7.5
    CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50124 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50124 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50124 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( SUSE ):  7.5
    CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50125 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50127 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50127 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50128 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50128 ( SUSE ):  6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50128 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50130 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50130 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50131 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50134 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50134 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-50134 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50135 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50135 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50135 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50136 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50136 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-50136 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50138 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50138 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50138 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50139 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50139 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-50139 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50141 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50141 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50145 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50145 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50145 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50146 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50146 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50146 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50147 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50147 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50147 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50148 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50148 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50148 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50150 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50150 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50150 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50153 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50153 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50153 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50154 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50154 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50155 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50155 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50156 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50156 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50157 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50157 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50158 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50158 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50159 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50159 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50160 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50160 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50160 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50166 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50166 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50167 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50167 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50169 ( SUSE ):  0.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50169 ( SUSE ):  0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-50169 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50171 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50171 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-50171 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50172 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50172 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50175 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50175 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50176 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50176 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50177 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50177 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-50177 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50179 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50179 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50180 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50180 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-50180 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50181 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50181 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50181 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50182 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50182 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50182 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50183 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50183 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50183 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50184 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50184 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50184 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50186 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50186 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50187 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50187 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50188 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50189 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50189 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50192 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50192 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50194 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50194 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50195 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50196 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50196 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50198 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50198 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50201 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50205 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50205 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50205 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50208 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50208 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50208 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50209 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50209 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50209 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50210 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50210 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50210 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50215 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50215 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50216 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50218 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50221 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50221 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50221 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50224 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50224 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50225 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50225 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50229 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50229 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50229 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50230 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50230 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50230 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50231 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50231 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50231 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50232 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50232 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-50232 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50233 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50233 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-50233 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50234 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50234 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50234 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50235 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50235 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50236 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50236 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50236 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50237 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50237 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50237 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50240 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50240 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50240 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50245 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50245 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50245 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50246 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50246 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50246 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50248 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50248 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50248 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50249 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50249 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50250 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50250 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
  * CVE-2024-50250 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
  * CVE-2024-50255 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50255 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50255 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50257 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50257 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50257 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50257 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50261 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50261 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50261 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50261 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50265 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50265 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50267 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50267 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50267 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50268 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50268 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50269 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50269 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50271 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50271 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50273 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50273 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50274 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50274 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50275 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50275 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50276 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50276 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50279 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50279 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50282 ( SUSE ):  7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2024-50282 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50287 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50290 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50292 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50295 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50298 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50298 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50301 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50301 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50302 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50302 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53042 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53042 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53045 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53045 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53048 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53048 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53052 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53052 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53058 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53058 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53059 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53060 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53061 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53061 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53063 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53066 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53066 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53068 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53068 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53072 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53072 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53074 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53074 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53076 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53076 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53079 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-53079 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53081 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53081 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53082 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53082 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53085 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53085 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53088 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53088 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53094 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53096 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53100 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53100 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53101 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53101 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53104 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53104 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53106 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53108 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53108 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53112 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53112 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53112 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53114 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53114 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * Confidential Computing Module 15-SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6

  
  
An update that solves 490 vulnerabilities, contains 10 features and has 102
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to
receive various security bugfixes.

The following security bugs were fixed:

  * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
  * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
    precision tracking (bsc#1232823).
  * CVE-2023-6270: aoe: fix the potential use-after-free problem in more places
    (bsc#1218562).
  * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
    check_estalblished() (bsc#1222587).
  * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
  * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
    (bsc#1223656).
  * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink
    dump (bsc#1223733).
  * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
    (bsc#1224518).
  * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
    (bsc#1224548).
  * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
    entire cycle too (bsc#1226797).
  * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
  * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
  * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
    (bsc#1225742).
  * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
    (bsc#1225813).
  * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
    (bsc#1225764).
  * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
    (bsc#1226130).
  * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
    (bsc#1226748).
  * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
    (bsc#1227842).
  * CVE-2024-41023: sched/deadline: Fix task_struct reference leak
    (bsc#1228430).
  * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed
    (bsc#1228454).
  * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command
    (bsc#1228620).
  * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
    wb_dirty_limits(), again" (bsc#1233132).
  * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
    (bsc#1230179).
  * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
    resetting (bsc#1230231).
  * CVE-2024-45016: netem: fix return value if duplicate enqueue fails
    (bsc#1230429).
  * CVE-2024-45025: fix bitmap corruption on close_range() with
    CLOSE_RANGE_UNSHARE (bsc#1230456).
  * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex
    (bsc#1230550).
  * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
  * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
  * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
    (bsc#1230801).
  * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections
    (bsc#1230762).
  * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
    (bsc#1230763).
  * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
  * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
  * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
    (bsc#1231191).
  * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
    greater than max_links (bsc#1231197).
  * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
    (bsc#1231115).
  * CVE-2024-46828: sched: sch_cake: fix bulk flow accounting logic for host
    fairness (bsc#1231114).
  * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test
    (bsc#1231117).
  * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
    indirection tables (bsc#1231096).
  * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
    (bsc#1231105).
  * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
    btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
  * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added
    (bsc#1231100).
  * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
  * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
  * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs
    (bsc#1231087).
  * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35
    (bsc#1231435).
  * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled
    (bsc#1231436).
  * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
  * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
    provided by the firmware (bsc#1231442).
  * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
    (bsc#1231673).
  * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
    (bsc#1231930).
  * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
    (bsc#1231987).
  * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
    (bsc#1231998).
  * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003).
  * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
  * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
    the filesystem (bsc#1231920).
  * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
  * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
    using it (bsc#1231944).
  * CVE-2024-47705: block: fix potential invalid pointer dereference in
    blk_add_partition (bsc#1231872).
  * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
    (bsc#1231942).
  * CVE-2024-47707: ipv6: avoid possible NULL deref in
    rt6_uncached_list_flush_dev() (bsc#1231935).
  * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
    (bsc#1232049).
  * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
  * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
    (bsc#1232075).
  * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status
    clearing (bsc#1232117).
  * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
    seq_nr overflow (bsc#1232124).
  * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek
    using same fd (bsc#1231869).
  * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in
    remap_file_pages() (bsc#1232135).
  * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
    Due to Race Condition (bsc#1232145).
  * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch
    warning (bsc#1232130).
  * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch
    warning (bsc#1231868).
  * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder
    smatch warning (bsc#1232131).
  * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in
    efc_nport_vport_del() (bsc#1232819).
  * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread
    creation (bsc#1232256).
  * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner
    kthread during umount (bsc#1232262).
  * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
    new trasacntion (bsc#1232272).
  * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
  * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
    (bsc#1232200).
  * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
    (bsc#1232199).
  * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).
  * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
    (bsc#1232217).
  * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
    to 1 (bsc#1232220).
  * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
    format translation (bsc#1232354).
  * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma
    hardware format translation (bsc#1232352).
  * CVE-2024-49896: drm/amd/display: Check stream before comparing them
    (bsc#1232221).
  * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
    (bsc#1232355).
  * CVE-2024-49898: drm/amd/display: Check null-initialized variables
    (bsc#1232222).
  * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
    (bsc#1232358).
  * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
    nullptrs (bsc#1232305).
  * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
    (bsc#1232332).
  * CVE-2024-49907: drm/amd/display: Check null pointers before using
    dc->clk_mgr (bsc#1232334).
  * CVE-2024-49908: drm/amd/display: Add null check for 'afb' in
    amdgpu_dm_update_cursor (bsc#1232335).
  * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
    dcn32_set_output_transfer_func (bsc#1232337).
  * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
    dcn20_set_output_transfer_func (bsc#1232366).
  * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
    'planes_changed_for_existing_stream' (bsc#1232367).
  * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in
    commit_planes_for_stream (bsc#1232307).
  * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
    (bsc#1232369).
  * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
    clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
  * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
    dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
  * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
    dcn201_acquire_free_pipe_for_layer (bsc#1231968).
  * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
    (bsc#1232313).
  * CVE-2024-49921: drm/amd/display: Check null pointers before used
    (bsc#1232371).
  * CVE-2024-49922: drm/amd/display: Check null pointers before using them
    (bsc#1232374).
  * CVE-2024-49923: drm/amd/display: Pass non-null to
    dcn20_validate_apply_pipe_split_flags (bsc#1232361).
  * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
    (bsc#1232224)
  * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
  * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
    dentry.d_name.name (bsc#1232387).
  * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
    (bsc#1232424).
  * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
    associated structure (bsc#1232165).
  * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
    (bsc#1232164).
  * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
    UFO (bsc#1232160).
  * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
  * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete()
    twice (bsc#1232156).
  * CVE-2024-49954: static_call: Replace pointless WARN_ON() in
    static_call_module_notify() (bsc#1232155).
  * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
    reflink tree (bsc#1232151).
  * CVE-2024-49959: jbd2: stop waiting for space when
    jbd2_cleanup_journal_tail() returns error (bsc#1232149).
  * CVE-2024-49960: ext4: fix timer use-after-free on failed mount
    (bsc#1232395).
  * CVE-2024-49967: ext4: no need to continue when the number of entries is 1
    (bsc#1232140).
  * CVE-2024-49968: ext4: fix error message when rejecting the default hash
    (bsc#1232264).
  * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
    transformation (bsc#1232519).
  * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails
    (bsc#1232315).
  * CVE-2024-49973: r8169: add tally counter fields added with RTL8125
    (bsc#1232105).
  * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
    (bsc#1232383).
  * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
    double-free (bsc#1232096).
  * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on
    platform_device_register() errors (bsc#1232093).
  * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
    (bsc#1232258).
  * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
    unload (bsc#1232483).
  * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
    (bsc#1232282).
  * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
    with 0 count (bsc#1232316).
  * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
  * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
    (bsc#1232089).
  * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
    (bsc#1232085).
  * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
    (bsc#1232084).
  * CVE-2024-50002: static_call: Handle module init failure correctly in
    static_call_del_module() (bsc#1232083).
  * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
    monitor (bsc#1232385).
  * CVE-2024-50004: drm/amd/display: update DML2 policy
    EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
  * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
    (bsc#1232442).
  * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
    value (bsc#1232318).
  * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
    (bsc#1232386).
  * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
    (bsc#1232446).
  * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when
    partially writing (bsc#1232079).
  * CVE-2024-50020: ice: Fix improper handling of refcount in
    ice_sriov_set_msix_vec_count() (bsc#1231989).
  * CVE-2024-50021: ice: Fix improper handling of refcount in
    ice_dpll_init_rclk_pins() (bsc#1231957).
  * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping()
    (bsc#1231956).
  * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
  * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone
    (bsc#1231951).
  * CVE-2024-50028: thermal: core: Reference count the zone in
    thermal_zone_get_by_id() (bsc#1231950).
  * CVE-2024-50033: slip: make slhc_remember() more robust against malicious
    packets (bsc#1231914).
  * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
  * CVE-2024-50040: igb: Do not bring the device up after non-fatal error
    (bsc#1231908).
  * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
    mac_filter_hash (bsc#1231907).
  * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906).
  * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
    (bsc#1231903).
  * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in
    nfs42_complete_copies() (bsc#1231902).
  * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
  * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
    switchtec_ntb_remove due to race condition (bsc#1232345).
  * CVE-2024-50060: io_uring: check if we need to reschedule during overflow
    flush (bsc#1232417).
  * CVE-2024-50063: bpf: Prevent tail call between progs attached to different
    hooks (bsc#1232435).
  * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901).
  * CVE-2024-50080: ublk: do not allow user copy for unprivileged device
    (bsc#1232502).
  * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
    (bsc#1232501).
  * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
    rq_qos_wake_function race (bsc#1232500).
  * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
    vcap_api_encode_rule_test() (bsc#1232494).
  * CVE-2024-50087: btrfs: fix uninitialized pointer free on
    read_alloc_one_name() error (bsc#1232499).
  * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
    (bsc#1232498).
  * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
    (bsc#1232881).
  * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
    (bsc#1232885).
  * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
    (bsc#1232919).
  * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
  * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
  * CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
    (bsc#1232907).
  * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
  * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
    (bsc#1232894).
  * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
  * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
  * CVE-2024-50145: octeon_ep: Add SKB allocation failures handling in
    __octep_oq_process_rx() (bsc#1233044).
  * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
    target_alloc_device() (bsc#1233061).
  * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
    (bsc#1233070).
  * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
    (bsc#1233050).
  * CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
    (bsc#1233049).
  * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
  * CVE-2024-50171: net: systemport: fix potential memory leak in
    bcm_sysport_xmit() (bsc#1233057).
  * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
    (bsc#1233115).
  * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
    map (bsc#1233129).
  * CVE-2024-50184: virtio_pmem: Check device status before requesting flush
    (bsc#1233135).
  * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
    (bsc#1233110).
  * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
    (bsc#1233106).
  * CVE-2024-50195: posix-clock: Fix missing timespec64 check in
    pc_clock_settime() (bsc#1233103).
  * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
  * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
    flag (bsc#1233206).
  * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
  * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
  * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
    (bsc#1233226).
  * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
  * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
    packet (bsc#1233253).
  * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
    occurring in vsk->trans (bsc#1233453).
  * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
  * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
    the list (bsc#1233462).
  * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
    (bsc#1233463).
  * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
    (bsc#1233464).
  * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
    (bsc#1233465).
  * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
    resizing (bsc#1233468).
  * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
  * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
    (bsc#1233484).
  * CVE-2024-50298: net: enetc: allocate vf_state during PF probes
    (bsc#1233487).
  * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
    ip_tunnel_init_flow() (bsc#1233540).
  * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
    (bsc#1233721).
  * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
    SKB data (bsc#1233552).
  * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
    (bsc#1233570).
  * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).

The following non-security bugs were fixed:

  * 9p: explicitly deny setlease attempts (git-fixes).
  * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes).
  * ACPI: CPPC: Fix _CPC register setting issue (git-fixes).
  * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
  * ACPI: EC: Do not release locks during operation region accesses (stable-
    fixes).
  * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
  * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
  * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-
    fixes).
  * ACPI: battery: Fix possible crash when unregistering a battery hook (git-
    fixes).
  * ACPI: battery: Simplify battery hook locking (stable-fixes).
  * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
    detection issue (stable-fixes).
  * ACPI: resource: Add Asus ExpertBook B2502CVA to
    irq1_level_low_skip_override[] (stable-fixes).
  * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[]
    (stable-fixes).
  * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
    fixes).
  * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-
    fixes).
  * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable-
    fixes).
  * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
  * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
  * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes).
  * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
    acpi_db_convert_to_package() (stable-fixes).
  * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the
    spec (git-fixes).
  * ACPICA: iasl: handle empty connection_node (stable-fixes).
  * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes).
  * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller()
    (stable-fixes).
  * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable-
    fixes).
  * ALSA: 6fire: Release resources at card release (git-fixes).
  * ALSA: Reorganize kerneldoc parameter names (stable-fixes).
  * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes).
  * ALSA: asihpi: Fix potential OOB array access (stable-fixes).
  * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * ALSA: core: add isascii() check to card ID generator (stable-fixes).
  * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
    (git-fixes).
  * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
    fixes).
  * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-
    fixes).
  * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
    1000 G2 (git-fixes).
  * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
  * ALSA: hda/conexant: fix some typos (stable-fixes).
  * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
  * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs
    (bsc#1219803).
  * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
  * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
    (git-fixes).
  * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
  * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
  * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
    fixes).
  * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable-
    fixes).
  * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
  * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes).
  * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform
    (bsc#1233298).
  * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
    (bsc#1233298).
  * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
  * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
    fixes).
  * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
  * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
  * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable-
    fixes).
  * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
  * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes).
  * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes).
  * ALSA: hda/realtek: Update default depop procedure (git-fixes).
  * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes).
  * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
    fixes).
  * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes).
  * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes).
  * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable-
    fixes).
  * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes).
  * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
  * ALSA: hda: Show the codec quirk info at probing (stable-fixes).
  * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable-
    fixes).
  * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132).
  * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
  * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).
  * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
  * ALSA: line6: update contact information (stable-fixes).
  * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
  * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable-
    fixes).
  * ALSA: silence integer wrapping warning (stable-fixes).
  * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
  * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
  * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
  * ALSA: usb-audio: Add input value sanity checks for standard types (stable-
    fixes).
  * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
  * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
  * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768).
  * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
  * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
  * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
  * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable-
    fixes).
  * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
    devices (git-fixes).
  * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable-
    fixes).
  * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
  * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
    (stable-fixes).
  * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
  * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet
    (stable-fixes).
  * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec
    (stable-fixes).
  * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes).
  * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes).
  * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms
    (bsc#1233305).
  * ASoC: SOF: Add support for configuring PDM interface from topology
    (bsc#1233305).
  * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
  * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
  * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions
    (bsc#1233305).
  * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
    (bsc#1233305).
  * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
  * ASoC: SOF: Wire up buffer flags (bsc#1233305).
  * ASoC: SOF: add alignment for topology header file struct definition
    (bsc#1233305).
  * ASoC: SOF: align topology header file with sof topology header
    (bsc#1233305).
  * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
    (git-fixes).
  * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
  * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
  * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h
    (bsc#1233305).
  * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints
    (bsc#1233305).
  * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control
    (bsc#1233305).
  * ASoC: SOF: ipc4-topology: Add module ID print during module set up
    (bsc#1233305).
  * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id
    (bsc#1233305).
  * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA
    (bsc#1233305).
  * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config
    (bsc#1233305).
  * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
    (bsc#1233305).
  * ASoC: SOF: ipc4-topology: set config_length based on device_count
    (bsc#1233305).
  * ASoC: SOF: ipc4: Add data struct for module notification message from
    firmware (bsc#1233305).
  * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
    (bsc#1233305).
  * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
    fixes).
  * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
  * ASoC: SOF: topology: dynamically allocate and store DAI widget->private
    (bsc#1233305).
  * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
  * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes).
  * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
  * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
  * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
    (stable-fixes).
  * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
  * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is
    uninitialized (git-fixes).
  * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes
    (stable-fixes).
  * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
    (git-fixes).
  * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
    default regs values (stable-fixes).
  * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable-
    fixes).
  * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes).
  * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
  * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes).
  * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes).
  * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes).
  * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
  * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-
    fixes).
  * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes).
  * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
    (git-fixes).
  * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
    fixes).
  * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
  * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-
    fixes).
  * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
    fixes).
  * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
    (stable-fixes).
  * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
    (stable-fixes).
  * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
    (stable-fixes).
  * ASoC: tas2781: Use of_property_read_reg() (stable-fixes).
  * Bluetooth: Call iso_exit() on module unload (git-fixes).
  * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
  * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
    fixes).
  * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-
    fixes).
  * Bluetooth: Remove debugfs directory on module init failure (git-fixes).
  * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
  * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
  * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable-
    fixes).
  * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-
    fixes).
  * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
  * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
  * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
  * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
  * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes).
  * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
  * HID: core: zero-initialize the report buffer (git-fixes).
  * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes).
  * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
    fixes).
  * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
    fixes).
  * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
    (stable-fixes).
  * HID: multitouch: Add support for B2402FVA track point (stable-fixes).
  * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-
    fixes).
  * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes).
  * HID: plantronics: Workaround for an unexcepted opposite volume key (stable-
    fixes).
  * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
    fixes).
  * Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
  * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
  * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes).
  * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
  * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
  * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
    (stable-fixes).
  * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table
    (stable-fixes).
  * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
    (stable-fixes).
  * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
  * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
  * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
    fixes).
  * Input: xpad - add support for MSI Claw A1M (git-fixes).
  * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
  * Input: xpad - fix support for some third-party controllers (git-fixes).
  * Input: xpad - sort xpad_device by vendor and product ID (git-fixes).
  * Input: xpad - spelling fixes for "Xbox" (git-fixes).
  * KVM: Add KVM vcpu ioctl to pre-populate guest memory (jsc#PED-6143).
  * KVM: Add KVM_PRE_FAULT_MEMORY vcpu ioctl to pre-populate guest memory
    (jsc#PED-6143).
  * KVM: Add new members to struct kvm_gfn_range to operate on (jsc#PED-6143).
  * KVM: Document KVM_MEMORY_MAPPING ioctl (jsc#PED-6143).
  * KVM: Document KVM_PRE_FAULT_MEMORY ioctl (jsc#PED-6143).
  * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-
    fixes).
  * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
    doorbells (bsc#1215199).
  * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
    (bsc#1215199).
  * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869).
  * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
    (bsc#1232207).
  * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
  * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
    (git-fixes).
  * KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
    (jsc#PED-6143).
  * KVM: TDX: Add TDX "architectural" error codes (jsc#PED-6143).
  * KVM: TDX: Add helper functions to print TDX SEAMCALL error (jsc#PED-6143).
  * KVM: TDX: Add placeholders for TDX VM/vcpu structure (jsc#PED-6143).
  * KVM: TDX: Define TDX architectural definitions (jsc#PED-6143).
  * KVM: TDX: Make TDX VM type supported (jsc#PED-6143).
  * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git-
    fixes).
  * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git-
    fixes).
  * KVM: VMX: Move out vmx_x86_ops to 'main.c' to dispatch VMX and TDX
    (jsc#PED-6143).
  * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid
    (git-fixes).
  * KVM: Write the per-page "segment" when clearing (part of) a guest page (git-
    fixes).
  * KVM: s390: Change virtual to physical address access in diag 0x258 handler
    (git-fixes bsc#1232626).
  * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query
    (git-fixes bsc#1231276).
  * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes
    bsc#1232623).
  * KVM: x86/mmu: Account pf_{fixed,emulate,spurious} in callers of "do page
    fault" (jsc#PED-6143).
  * KVM: x86/mmu: Assume guest MMIOs are shared (jsc#PED-6143).
  * KVM: x86/mmu: Bump pf_taken stat only in the "real" page fault handler
    (jsc#PED-6143).
  * KVM: x86/mmu: Check that root is valid/loaded when pre-faulting SPTEs (git-
    fixes).
  * KVM: x86/mmu: Make kvm_mmu_do_page_fault() return mapped level
    (jsc#PED-6143).
  * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git-
    fixes).
  * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults
    (git-fixes).
  * KVM: x86/vmx: Refactor KVM VMX module init/exit functions (jsc#PED-6143).
  * KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_init() (jsc#PED-6143).
  * KVM: x86: Add is_vm_type_supported callback (jsc#PED-6143).
  * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes).
  * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes).
  * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip
    (git-fixes).
  * KVM: x86: Implement kvm_arch_vcpu_pre_fault_memory() (jsc#PED-6143).
  * KVM: x86: Implement kvm_arch_{, pre_}vcpu_memory_mapping() (jsc#PED-6143).
  * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git-
    fixes).
  * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git-
    fixes).
  * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes).
  * NFS: Avoid unnecessary rescanning of the per-server delegation list (git-
    fixes).
  * NFS: remove revoked delegation from server's delegation list (git-fixes).
  * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
  * NFSD: Mark filecache "down" if init fails (git-fixes).
  * NFSv3: only use NFS timeout for MOUNT when protocols are compatible
    (bsc#1231016).
  * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
  * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
  * PCI: Add T_PVPERL macro (git-fixes).
  * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
  * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
  * PCI: Fix reset_method_store() memory leak (git-fixes).
  * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
  * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
    (git-fixes).
  * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
    (git-fixes).
  * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
  * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
    (git-fixes).
  * PCI: rockchip-ep: Fix address translation unit programming (git-fixes).
  * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559).
  * RAS/AMD/ATL: Expand helpers for adding and removing base and hole
    (jsc#PED-10559).
  * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559).
  * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559).
  * RAS/AMD/ATL: Validate address map when information is gathered
    (jsc#PED-10559).
  * RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
  * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes)
  * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git-
    fixes)
  * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
  * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
  * RDMA/bnxt_re: Fix a possible memory leak (git-fixes)
  * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
  * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes)
  * RDMA/bnxt_re: Fix out of bound check (git-fixes)
  * RDMA/bnxt_re: Fix the GID table length (git-fixes)
  * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
  * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
  * RDMA/bnxt_re: Return more meaningful error (git-fixes)
  * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
  * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
  * RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
  * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
  * RDMA/hns: Add mutex_destroy() (git-fixes)
  * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
    fixes)
  * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
  * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
    (git-fixes)
  * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes)
  * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
  * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
  * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
  * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
  * RDMA/hns: Use macro instead of magic number (git-fixes)
  * RDMA/irdma: Fix misspelling of "accept*" (git-fixes)
  * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
  * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page
    (git-fixes).
  * RDMA/mana_ib: use the correct page table index based on hardware page size
    (git-fixes).
  * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes)
  * RDMA/mlx5: Move events notifier registration to be after device registration
    (git-fixes)
  * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-
    fixes)
  * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
    fixes).
  * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-
    fixes)
  * RDMA/rxe: Fix the qp flush warnings in req (git-fixes)
  * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
  * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
  * RDMA/srpt: Make slab cache names unique (git-fixes)
  * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
  * SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
  * SUNRPC: Remove BUG_ON call sites (git-fixes).
  * SUNRPC: clnt.c: Remove misleading comment (git-fixes).
  * USB: appledisplay: close race between probe and completion handler (git-
    fixes).
  * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
  * USB: chaoskey: fail open after removal (git-fixes).
  * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
  * USB: misc: cypress_cy7c63: check for short transfer (git-fixes).
  * USB: misc: yurex: fix race between read and write (git-fixes).
  * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
    fixes).
  * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes).
  * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
  * USB: serial: option: add Quectel RG650V (stable-fixes).
  * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
  * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
  * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
    fixes).
  * VM: TDX: Initialize the TDX module when loading the KVM intel kernel module
    (jsc#PED-6143).
  * VM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX (jsc#PED-6143).
  * accel/qaic: Fix the for loop used to walk SG table (git-fixes).
  * accel: Use XArray instead of IDR for minors (jsc#PED-11580).
  * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
    (git-fixes).
  * ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
  * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
  * amd-pstate: Set min_perf to nominal_perf for active mode performance gov
    (git-fixes).
  * apparmor: fix 'Do simple duplicate message elimination' (git-fixes).
  * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
  * apparmor: use kvfree_sensitive to free data->data (git-fixes).
  * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes)
  * arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
  * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes).
  * arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
  * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
  * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes).
  * arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
  * arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
  * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
  * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git-
    fixes).
  * ata: libata: avoid superfluous disk spin down + spin up during hibernation
    (git-fixes).
  * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes).
  * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes).
  * block: print symbolic error name instead of error code (bsc#1231872).
  * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677).
  * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes).
  * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes).
  * bnxt_en: Fix the PCI-AER routines (git-fixes).
  * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
  * bnxt_en: refactor reset close code (git-fixes).
  * bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
  * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
  * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
    fixes).
  * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
  * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
  * bpf, x64: Remove tail call detection (git-fixes).
  * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
  * bpf: Fail verification for sign-extension of packet data/data_end/data_meta
    (git-fixes).
  * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
  * bpf: Fix error message on kfunc arg type mismatch (git-fixes).
  * bpf: Fix helper writes to read-only maps (git-fixes).
  * bpf: Fix tailcall cases in test_bpf (git-fixes).
  * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes).
  * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
  * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-
    fixes).
  * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
  * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
  * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450).
  * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
  * btrfs: send: fix invalid clone operation for file that got its size
    decreased (git-fixes).
  * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183).
  * can: c_can: fix {rx,tx}_errors statistics (git-fixes).
  * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).
  * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
    switching CAN modes (git-fixes).
  * can: netlink: avoid call to do_set_data_bittiming callback with stale
    can_priv::ctrlmode (stable-fixes).
  * ceph: fix cap ref leak via netfs init_request (bsc#1231384).
  * ceph: remove the incorrect Fw reference check when dirtying pages
    (bsc#1231182).
  * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
  * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes).
  * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
  * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
  * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes).
  * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
  * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
  * clk: imx: fracn-gppll: fix pll power up (git-fixes).
  * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
  * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
  * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
  * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
  * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
  * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
  * comedi: Flush partial mappings in error case (git-fixes).
  * comedi: ni_routing: tools: Check when the file could not be opened (stable-
    fixes).
  * config: Disable LAM on x86 (bsc#1217845).
  * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems
    (git-fixes).
  * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
    fixes).
  * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
    fixes).
  * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
  * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
  * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
  * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
    (git-fixes).
  * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
  * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
  * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
  * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
  * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
  * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
    fixes).
  * crypto: cavium - Fix the if condition to exit loop after timeout (git-
    fixes).
  * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075)
  * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
    (git-fixes).
  * crypto: octeontx - Fix authenc setkey (stable-fixes).
  * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes).
  * crypto: octeontx2 - Fix authenc setkey (stable-fixes).
  * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return
    -EBUSY (git-fixes).
  * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable
    CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632).
  * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501
    ltc#208632).
  * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation
    (bsc#1230501 ltc#208632).
  * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501
    ltc#208632).
  * crypto: qat - remove check after debugfs_create_dir() (git-fixes).
  * crypto: qat - remove faulty arbiter config reset (git-fixes).
  * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
  * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
  * cxgb4: Properly lock TX queue for the selftest (git-fixes).
  * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
  * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
    fixes).
  * cxl: downgrade a warning message to debug level in
    cxl_probe_component_regs() (bsc#1229165).
  * dcache: keep dentry_hashtable or d_hash_shift even when not used (git-
    fixes).
  * debugfs: fix automount d_fsdata usage (git-fixes).
  * devlink: Fix command annotation documentation (git-fixes).
  * dmaengine: sh: rz-dmac: handle configs where one address is zero (git-
    fixes).
  * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git-
    fixes).
  * doc: rcu: update printed dynticks counter bits (git-fixes).
  * driver core: bus: Fix double free in driver API bus_register() (stable-
    fixes).
  * driver core: bus: Return -EIO instead of 0 when show/store invalid bus
    attribute (stable-fixes).
  * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
    (git-fixes).
  * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
  * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes).
  * drm/amd/display: Add disable timeout option (bsc#1231435)
  * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
  * drm/amd/display: Check link_res->hpo_dp_link_enc before using it
    (bsc#1231944)
  * drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
  * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes).
  * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes).
  * drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
  * drm/amd/display: Fix null check for pipe_ctx->plane_state in
    dcn20_program_pipe (git-fixes).
  * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp
    (git-fixes).
  * drm/amd/display: Remove a redundant check in authenticated_dp (stable-
    fixes).
  * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes).
  * drm/amd/display: Round calculated vtotal (stable-fixes).
  * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes).
  * drm/amd/display: Validate backlight caps are sane (stable-fixes).
  * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes).
  * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
  * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
  * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
  * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes).
  * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes).
  * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
    fixes).
  * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
  * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
  * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
  * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
    fixes).
  * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
  * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
    fixes).
  * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
  * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
  * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
  * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
  * drm/bridge: tc358767: Fix link properties discovery (git-fixes).
  * drm/bridge: tc358768: Fix DSI command tx (git-fixes).
  * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
    fixes).
  * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
  * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes).
  * drm/i915/hdcp: fix connector refcounting (git-fixes).
  * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
  * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes).
  * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
    fixes).
  * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
    (git-fixes).
  * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes).
  * drm/msm/dpu: do not always program merge_3d block (git-fixes).
  * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
  * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
  * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
  * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check
    (git-fixes).
  * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
  * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
    (git-fixes).
  * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes).
  * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
  * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
  * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
  * drm/msm: Fix some typos in comment (git-fixes).
  * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).
  * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
  * drm/omap: Fix possible NULL dereference (git-fixes).
  * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
  * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
  * drm/radeon: Fix encoder->possible_clones (git-fixes).
  * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
  * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
  * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job
    (git-fixes).
  * drm/sti: avoid potential dereference of error pointers (git-fixes).
  * drm/sti: avoid potential dereference of error pointers in
    sti_gdp_atomic_check (git-fixes).
  * drm/sti: avoid potential dereference of error pointers in
    sti_hqvdp_atomic_check (git-fixes).
  * drm/v3d: Address race-condition in MMU flush (git-fixes).
  * drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
  * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
    VLA (stable-fixes).
  * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
    fixes).
  * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).
  * drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
  * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
  * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
  * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
  * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
    fixes).
  * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
    fixes).
  * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
  * drm/vmwgfx: Handle surface check failure correctly (git-fixes).
  * drm/vmwgfx: Limit display layout ioctl array size to
    VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
  * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
  * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
  * drm: Use XArray instead of IDR for minors (jsc#PED-11580).
  * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
  * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
  * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
  * e1000e: Fix S0ix residency on corporate systems (git-fixes).
  * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
  * e1000e: change I219 (19) devices to ADP (git-fixes).
  * e1000e: fix force smbus during suspend flow (git-fixes).
  * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes).
  * efi/libstub: Free correct pointer on failure (git-fixes).
  * efi/libstub: fix efi_parse_options() ignoring the default command line (git-
    fixes).
  * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
  * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
  * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
    (stable-fixes).
  * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
    fixes).
  * ext4: do not track ranges in fast_commit if inode has inlined data
    (bsc#1231635).
  * ext4: fix fast commit inode enqueueing during a full journal commit
    (bsc#1231636).
  * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible()
    (bsc#1231637).
  * ext4: fix possible tid_t sequence overflows (bsc#1231634).
  * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
  * ext4: fix unttached inode after power cut with orphan file feature enabled
    (bsc#1234009).
  * ext4: mark fc as ineligible using an handle in ext4_xattr_set()
    (bsc#1231640).
  * ext4: use handle to mark fc as ineligible in __track_dentry_update()
    (bsc#1231639).
  * f2fs: get out of a repeat loop when getting a locked data page
    (bsc#1234011).
  * fat: fix uninitialized variable (git-fixes).
  * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes).
  * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
    fixes).
  * fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
  * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
  * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
  * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-
    fixes).
  * filemap: remove use of wait bookmarks (bsc#1224088).
  * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git-
    fixes).
  * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git-
    fixes).
  * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
    fixes).
  * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git-
    fixes).
  * firmware: google: Unregister driver_info on failure (git-fixes).
  * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
    fixes).
  * fs/9p: drop inodes immediately on non-.L too (git-fixes).
  * fs/9p: fix the cache always being enabled on files with qid flags (git-
    fixes).
  * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
  * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
  * fs/ntfs3: Sequential field availability check in mi_enum_attr()
    (bsc#1233207)
  * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
  * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
  * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
  * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
  * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
  * gpio: davinci: fix lazy disable (git-fixes).
  * gpio: exar: set value when external pull-up or pull-down is present (git-
    fixes).
  * gpio: zevio: Add missed label initialisation (git-fixes).
  * gve: Fix XDP TX completion handling when counters overflow (git-fixes).
  * gve: Fix an edge case for TSO skb validity check (git-fixes).
  * gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
    fixes).
  * hid: intel-ish-hid: Fix uninitialized variable 'rv' in
    ish_fw_xfer_direct_dma (git-fixes).
  * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
    (git-fixes).
  * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
    fixes).
  * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
  * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes).
  * hwmon: (max16065) Fix alarm attributes (git-fixes).
  * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes).
  * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes).
  * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes).
  * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-
    fixes).
  * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
  * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
  * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature
    (git-fixes).
  * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git-
    fixes).
  * i2c: core: fix lockdep warning for sparsely nested adapter chain (git-
    fixes).
  * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes).
  * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
    (git-fixes).
  * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes).
  * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes).
  * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes).
  * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
  * i2c: i801: add helper i801_restore_regs (git-fixes).
  * i2c: ismt: kill transaction in hardware on timeout (git-fixes).
  * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes).
  * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes).
  * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git-
    fixes).
  * i2c: omap: wakeup the controller during suspend() callback (git-fixes).
  * i2c: rcar: properly format a debug output (git-fixes).
  * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
    (git-fixes).
  * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes).
  * i2c: synquacer: Deal with optional PCLK correctly (git-fixes).
  * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable-
    fixes).
  * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
  * i2c: xiic: improve error message when transfer fails to start (stable-
    fixes).
  * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
    fixes).
  * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master
    Driver Due to Race Condition (stable-fixes).
  * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
    (git-fixes).
  * i40e: Fix XDP program unloading while removing the driver (git-fixes).
  * i40e: Report MFS in decimal base instead of hex (git-fixes).
  * i40e: fix race condition by adding filter's intermediate sync state (git-
    fixes).
  * iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
  * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
  * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes).
  * ice: Fix lldp packets dropping after changing the number of channels (git-
    fixes).
  * ice: Fix netif_is_ice() in Safe Mode (git-fixes).
  * ice: Fix package download algorithm (git-fixes).
  * ice: Fix recipe read procedure (git-fixes).
  * ice: Fix reset handler (git-fixes).
  * ice: Flush FDB entries before reset (git-fixes).
  * ice: Interpret .set_channels() input differently (git-fixes).
  * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes).
  * ice: Reject pin requests with unsupported flags (git-fixes).
  * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git-
    fixes).
  * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes).
  * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes).
  * ice: clear port vlan config during reset (git-fixes).
  * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes).
  * ice: do not bring the VSI up, if it was down before the XDP setup (git-
    fixes).
  * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes).
  * ice: fix 200G PHY types to link speed mapping (git-fixes).
  * ice: fix 200G link speed message log (git-fixes).
  * ice: fix ICE_LAST_OFFSET formula (git-fixes).
  * ice: fix VLAN replay after reset (git-fixes).
  * ice: fix VSI lists confusion when adding VLANs (git-fixes).
  * ice: fix accounting for filters shared by multiple VSIs (git-fixes).
  * ice: fix accounting if a VLAN already exists (git-fixes).
  * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes).
  * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes).
  * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes).
  * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes).
  * ice: implement AQ download pkg retry (git-fixes).
  * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git-
    fixes).
  * ice: remove af_xdp_zc_qps bitmap (git-fixes).
  * ice: replace synchronize_rcu with synchronize_net (git-fixes).
  * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
  * ice: set correct dst VSI in only LAN filters (git-fixes).
  * ice: tc: allow zero flags in parsing tc flower (git-fixes).
  * ice: tc: check src_vsi in case of traffic from VF (git-fixes).
  * ice: use proper macro for testing bit (git-fixes).
  * idpf: Interpret .set_channels() input differently (git-fixes).
  * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes).
  * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
    fixes).
  * idpf: do not skip over ethtool tcp-data-split setting (git-fixes).
  * idpf: fix UAFs when destroying the queues (git-fixes).
  * idpf: fix memleak in vport interrupt configuration (git-fixes).
  * idpf: fix memory leaks and crashes while performing a soft reset (git-
    fixes).
  * ieee802154: Fix build error (git-fixes).
  * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
  * igb: Disable threaded IRQ for igb_msix_other (git-fixes).
  * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
  * igc: Fix double reset adapter triggered from a single taprio cmd (git-
    fixes).
  * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer
    (git-fixes).
  * igc: Fix qbv tx latency by setting gtxoffset (git-fixes).
  * igc: Fix qbv_config_change_errors logics (git-fixes).
  * igc: Fix reset adapter logics when tx mode change (git-fixes).
  * igc: Unlock on error in igc_io_resume() (git-fixes).
  * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
  * iio: accel: bma400: Fix uninitialized variable field_value in tap event
    handling (git-fixes).
  * iio: accel: kx022a: Fix raw read format (git-fixes).
  * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    (git-fixes).
  * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
    fixes).
  * iio: adc: ad7606: Fix typo in the driver name (git-fixes).
  * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
  * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    (git-fixes).
  * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    (git-fixes).
  * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes).
  * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git-
    fixes).
  * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    (git-fixes).
  * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-
    fixes).
  * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
  * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
  * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-
    fixes).
  * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git-
    fixes).
  * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git-
    fixes).
  * iio: gts-helper: Fix memory leaks for the error path of
    iio_gts_build_avail_scale_table() (git-fixes).
  * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git-
    fixes).
  * iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
  * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
  * iio: hid-sensors: Fix an error handling path in
    _hid_sensor_set_report_latency() (git-fixes).
  * iio: light: al3010: Fix an error handling path in al3010_probe() (git-
    fixes).
  * iio: light: opt3001: add missing full-scale range value (git-fixes).
  * iio: light: veml6030: fix ALS sensor resolution (git-fixes).
  * iio: light: veml6030: fix IIO device retrieval from embedded device (git-
    fixes).
  * iio: light: veml6030: fix microlux value calculation (git-fixes).
  * iio: magnetometer: ak8975: Convert enum->pointer for data in the match
    tables (stable-fixes).
  * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes).
  * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes).
  * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    (git-fixes).
  * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
  * initramfs: avoid filename buffer overrun (bsc#1232436).
  * intel_idle: add Granite Rapids Xeon support (bsc#1231630).
  * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
  * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes).
  * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes).
  * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes).
  * io_uring/net: harden multishot termination case for recv (git-fixes).
  * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes).
  * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
  * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes).
  * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
  * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes).
  * io_uring/sqpoll: do not put cpumask on stack (git-fixes).
  * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes).
  * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL
    (git-fixes).
  * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes).
  * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes).
  * iommu/amd: Fix typo of , instead of ; (git-fixes).
  * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
  * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git-
    fixes).
  * iommufd: Check the domain owner of the parent before creating a nesting
    domain (git-fixes).
  * iommufd: Protect against overflow of ALIGN() during iova allocation (git-
    fixes).
  * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
  * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
  * jbd2: avoid infinite transaction commit loop (bsc#1234039).
  * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
  * jbd2: avoid mount failed when commit block is partial submitted
    (bsc#1234040).
  * jbd2: correct the printing of write_flags in jbd2_write_superblock()
    (bsc#1234045).
  * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit
    (bsc#1231638).
  * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
  * jbd2: fix potential data lost in recovering journal raced with synchronizing
    fs bdev (bsc#1234044).
  * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
  * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
  * jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
  * jfs: Fix sanity check in dbMount (git-fixes).
  * jfs: Fix uaf in dbFreeBits (git-fixes).
  * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
  * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
  * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
  * jump_label: Fix static_key_slow_dec() yet again (git-fixes).
  * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC)
    (git-fixes).
  * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
  * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes).
  * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
    fixes kabi).
  * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes).
  * kasan: move checks to do_strncpy_from_user (git-fixes).
  * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414
    bsc#1229450).
  * kbuild,bpf: Add module-specific pahole flags for distilled base BTF
    (bsc#1230414 bsc#1229450).
  * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later
    (bsc#1230414 bsc#1229450).
  * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414
    bsc#1229450).
  * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
  * kconfig: qconf: fix buffer overflow in debug links (git-fixes).
  * kernel-binary: Enable livepatch package only when livepatch is enabled
    (bsc#1218644).
  * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
    (git-fixes).
  * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry
    (git-fixes).
  * keys: Fix overwrite of key expiration on instantiation (git-fixes).
  * kthread: unpark only parked kthread (git-fixes).
  * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
  * lib/xarray: introduce a new helper xas_get_order (bsc#1231617).
  * lib: string_helpers: silence snprintf() output truncation warning (git-
    fixes).
  * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
  * macsec: do not increment counters for an unrelated SA (git-fixes).
  * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
  * maple_tree: correct tree corruption on spanning store (git-fixes).
  * maple_tree: fix alloc node fail issue (git-fixes).
  * maple_tree: refine mas_store_root() on storing NULL (git-fixes).
  * media: adv7604: prevent underflow condition when reporting colorspace (git-
    fixes).
  * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
    fixes).
  * media: amphion: Set video drvdata before register video device (git-fixes).
  * media: ar0521: do not overflow when checking PLL values (git-fixes).
  * media: atomisp: Add check for rgby_data memory allocation failure (git-
    fixes).
  * media: bttv: use audio defaults for winfast2000 (git-fixes).
  * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git-
    fixes).
  * media: cx24116: prevent overflows on SNR calculus (git-fixes).
  * media: dvb_frontend: do not play tricks with underflow values (git-fixes).
  * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
    fixes).
  * media: dvbdev: prevent the risk of out of memory access (git-fixes).
  * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
    fixes).
  * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
    (git-fixes).
  * media: i2c: imx335: Enable regulator supplies (stable-fixes).
  * media: i2c: tc358743: Fix crash in the probe error path when using polling
    (git-fixes).
  * media: imx-jpeg: Ensure power suppliers be suspended before detach them
    (git-fixes).
  * media: imx-jpeg: Set video drvdata before register video device (git-fixes).
  * media: imx335: Fix reset-gpio handling (git-fixes).
  * media: mantis: remove orphan mantis_core.h (git-fixes).
  * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
  * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning
    (git-fixes).
  * media: platform: allegro-dvt: Fix possible memory leak in
    allocate_buffers_internal() (git-fixes).
  * media: platform: exynos4-is: Fix an OF node reference leak in
    fimc_md_is_isp_available (git-fixes).
  * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
  * media: s5p-jpeg: prevent buffer overflows (git-fixes).
  * media: stb0899_algo: initialize cfr before using it (git-fixes).
  * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
  * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
  * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
    uvc_parse_format (git-fixes).
  * media: uvcvideo: Stop stream during unregister (git-fixes).
  * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
  * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
  * media: vb2: Fix comment (git-fixes).
  * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
    fixes).
  * media: videobuf2-core: clear memory related fields in
    __vb2_plane_dmabuf_put() (stable-fixes).
  * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes).
  * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
  * mei: use kvmalloc for read buffer (git-fixes).
  * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict
    (stable-fixes).
  * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
  * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
    fixes).
  * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes).
  * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
  * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
  * mlx5: avoid truncating error message (git-fixes).
  * mlx5: stop warning for 64KB pages (git-fixes).
  * mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
  * mm/filemap: optimize filemap folio adding (bsc#1231617).
  * mm/filemap: return early if failed to allocate memory for split
    (bsc#1231617).
  * mm/hugetlb: fix nodes huge page allocation when there are surplus pages
    (bsc#1234012).
  * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
    fixes).
  * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace
    point (git-fixes).
  * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978).
  * mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
  * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
  * mm: refactor map_deny_write_exec() (git-fixes).
  * mm: resolve faulty mmap_region() error path behaviour (git-fixes).
  * mm: unconditionally close VMAs on error (git-fixes).
  * mmc: mmc_spi: drop buggy snprintf() (git-fixes).
  * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
  * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git-
    fixes).
  * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host
    (git-fixes).
  * modpost: remove incorrect code in do_eisa_entry() (git-fixes).
  * module: abort module loading when sysfs setup suffer errors (git-fixes).
  * mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
  * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
  * nbd: fix race between timeout and normal completion (bsc#1230918).
  * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
    fixes).
  * net/mlx5: Added cond_resched() to crdump collection (git-fixes).
  * net/mlx5: Check capability for fw_reset (git-fixes).
  * net/mlx5: Check for invalid vector index on EQ creation (git-fixes).
  * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
  * net/mlx5: Fix command bitmask initialization (git-fixes).
  * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes).
  * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
  * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
  * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes).
  * net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
  * net/mlx5: Update the list of the PCI supported devices (git-fixes).
  * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
    (git-fixes).
  * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes).
  * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
  * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
    fixes).
  * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
  * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes).
  * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
  * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
  * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
    packets (git-fixes).
  * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio
    capability (git-fixes).
  * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
    exhaustion (git-fixes).
  * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
  * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
  * net: mdio-ipq4019: add missing error check (git-fixes).
  * net: phy: Remove LED entry from LEDs list on unregister (git-fixes).
  * net: phy: bcm84881: Fix some error handling paths (git-fixes).
  * net: phy: dp83822: Fix reset pin definitions (git-fixes).
  * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes).
  * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
  * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes).
  * net: qede: use return from qede_parse_actions() (git-fixes).
  * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
  * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes).
  * net: relax socket state check at accept time (git-fixes).
  * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes)
  * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes).
  * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-
    fixes).
  * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
    (git-fixes).
  * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
    (git-fixes).
  * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
    configuration (git-fixes).
  * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
  * net: usb: usbnet: fix name regression (get-fixes).
  * net: usb: usbnet: fix race in probe failure (git-fixes).
  * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
  * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
    fixes).
  * net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
  * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
  * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
  * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
  * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
  * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
  * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
  * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
    (git-fixes).
  * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
    (git-fixes).
  * nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
  * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
  * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-
    fixes).
  * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
  * nfsd: return -EINVAL when namelen is 0 (git-fixes).
  * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-
    fixes).
  * nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
  * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes).
  * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-
    fixes).
  * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
  * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes).
  * nouveau: fw: sync dma after setup is called (git-fixes).
  * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
  * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-
    fixes).
  * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
  * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
  * nvme-loop: flush off pending I/O while shutting down loop controller (git-
    fixes).
  * nvme-multipath: suppress partition scan until the disk is ready
    (bsc#1228244).
  * nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
  * nvme-pci: fix race condition between reset and nvme_dev_disable() (git-
    fixes).
  * nvme-pci: qdepth 1 quirk (git-fixes).
  * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
  * nvme-pci: set doorbell config before unquiescing (git-fixes).
  * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
  * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901).
  * nvme: null terminate nvme_tls_attrs (git-fixes).
  * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes).
  * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
  * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
  * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
  * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
  * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
  * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
  * ocfs2: remove entry once instead of null-ptr-dereference in
    ocfs2_xa_remove() (git-fixes).
  * ocfs2: uncache inode which has failed entering the group (git-fixes).
  * of: Add cleanup.h based auto release via __free(device_node) markings
    (bsc#1232386)
  * parport: Proper fix for array out-of-bounds access (git-fixes).
  * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git-
    fixes).
  * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes).
  * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes).
  * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
  * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes).
  * pinctrl: apple: check devm_kasprintf() returned value (git-fixes).
  * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
  * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes).
  * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
  * pinctrl: zynqmp: drop excess struct member description (git-fixes).
  * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
    fixes).
  * platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
  * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes).
  * platform/x86: dell-sysman: add support for alienware products (stable-
    fixes).
  * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
  * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes).
  * platform/x86: panasonic-laptop: Return errno correctly in show callback
    (git-fixes).
  * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
  * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
  * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-
    fixes).
  * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
  * power: supply: core: Remove might_sleep() from power_supply_put() (git-
    fixes).
  * power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
    fixes).
  * power: supply: rt9471: Use IC status regfield to report real charger status
    (git-fixes).
  * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes).
  * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
  * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
  * powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
  * powerpc/code-patching: Add generic memory patching (bsc#1194869).
  * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of
    failure (bsc#1194869).
  * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501
    ltc#208632).
  * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501
    ltc#208632).
  * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace
    (bsc#1194869).
  * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu
    (bsc#1194869).
  * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
  * printk: Add notation to console_srcu locking (bsc#1232183).
  * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
  * qed: avoid truncating work queue length (git-fixes).
  * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
    (bsc#1226631).
  * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623).
  * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
  * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to
    IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.
  * rpm/release-projects: Add SLFO projects (bsc#1231293).
  * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
    by the new klp-convert implementation. (bsc#1218644)
  * rpmsg: glink: Handle rejected intent request better (git-fixes).
  * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
    (git-fixes).
  * rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
  * rtc: bbnsm: add remove hook (git-fixes).
  * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
    fixes).
  * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
  * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * runtime constants: add default dummy infrastructure (git-fixes).
  * runtime constants: add x86 architecture support (git-fixes).
  * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
  * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629).
  * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628).
  * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes
    bsc#1232627).
  * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
  * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
    fixes).
  * scsi: Remove scsi device no_start_on_resume flag (git-fixes).
  * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
  * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
  * scsi: core: Disable CDL by default (git-fixes).
  * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
  * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
  * scsi: core: Handle devices which return an unusually large VPD page count
    (git-fixes).
  * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
  * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
  * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
  * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
  * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
  * scsi: libsas: Fix exp-attached device scan after probe failure scanned in
    again after probe failed (git-fixes).
  * scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
    fixes).
  * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in
    lpfc_els_flush_cmd() (bsc#1232757).
  * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
    jsc#PED-9943).
  * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
    (bsc#1233241 jsc#PED-9943).
  * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
    jsc#PED-9943).
  * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
    FDMI (bsc#1233241 jsc#PED-9943).
  * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
    (bsc#1233241 jsc#PED-9943).
  * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
    jsc#PED-9943).
  * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV
    instance (bsc#1232757).
  * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler
    (bsc#1232757).
  * scsi: lpfc: Modify CGN warning signal calculation based on EDC response
    (bsc#1233241 jsc#PED-9943).
  * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
    (bsc#1233241 jsc#PED-9943).
  * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
    jsc#PED-9943).
  * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
  * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757
    bsc#1228119).
  * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to
    KERN_WARNING (bsc#1232757).
  * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
  * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
  * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
  * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
    flag (bsc#1233241 jsc#PED-9943).
  * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE
    (bsc#1232757).
  * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
  * scsi: mac_scsi: Refactor polling loop (git-fixes).
  * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
  * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
  * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
  * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings
    (git-fixes).
  * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
  * scsi: mpi3mr: Validate SAS port assignments (git-fixes).
  * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
  * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
  * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
    fixes).
  * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
  * scsi: scsi_transport_fc: Allow setting rport state to current state (git-
    fixes).
  * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-
    fixes).
  * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
  * scsi: smartpqi: correct stream detection (git-fixes).
  * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
    fixes).
  * scsi: spi: Fix sshdr use (git-fixes).
  * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
  * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
  * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
  * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
  * selftests/bpf: Add a test case to write strtol result into .rodata (git-
    fixes).
  * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx()
    (git-fixes).
  * selftests/bpf: Add test for truncation after sign extension in
    coerce_reg_to_size_sx() (git-fixes).
  * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses
    (git-fixes).
  * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
  * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
  * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-
    fixes).
  * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
  * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes).
  * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes).
  * signal: Replace BUG_ON()s (bsc#1234093).
  * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-
    fixes).
  * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
    fixes).
  * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * soundwire: intel_bus_common: enable interrupts before exiting reset (stable-
    fixes).
  * spi: Fix acpi deferred irq probe (git-fixes).
  * spi: atmel-quadspi: Fix register name in verbose logging function (git-
    fixes).
  * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes).
  * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes).
  * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
  * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes).
  * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
    fixes).
  * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
  * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git-
    fixes).
  * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes).
  * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git-
    fixes).
  * srcu: Fix callbacks acceleration mishandling (git-fixes).
  * staging: iio: frequency: ad9832: fix division by zero in
    ad9832_calc_freqreg() (git-fixes).
  * sumversion: Fix a memory leak in get_src_version() (git-fixes).
  * supported.conf: mark nhpoly1305 module as supported (bsc#1231035).
  * supported.conf: mark ultravisor userspace access as supported (bsc#1232090).
  * task_work: add kerneldoc annotation for 'data' argument (git-fixes).
  * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
  * thermal: core: Initialize thermal zones before registering them (git-fixes).
  * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).
  * thermal: intel: int340x: processor: Fix warning during module unload (git-
    fixes).
  * thunderbolt: Honor TMU requirements in the domain when setting TMU mode
    (stable-fixes).
  * thunderbolt: Improve DisplayPort tunnel setup process to be more robust
    (stable-fixes).
  * tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
  * tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
  * tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
  * tools: hv: rm .*.cmd when make clean (git-fixes).
  * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
  * tpm: fix signed/unsigned bug when checking event logs (git-fixes).
  * tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
  * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes).
  * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes).
  * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git-
    fixes).
  * tracing/osnoise: Use a cpumask to know what threads are kthreads (git-
    fixes).
  * tracing/timerlat: Add interface_lock around clearing of kthread in
    stop_kthread() (git-fixes).
  * tracing/timerlat: Add user-space interface (git-fixes).
  * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes).
  * tracing/timerlat: Fix a race during cpuhp processing (git-fixes).
  * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline
    (git-fixes).
  * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes).
  * tracing/timerlat: Only clear timer if a kthread exists (git-fixes).
  * tracing: Consider the NULL character when validating the event length (git-
    fixes).
  * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
  * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes).
  * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file
    (git-fixes).
  * ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
  * ubifs: Fix unattached xattr inode if powercut happens after deleting (git-
    fixes).
  * ubifs: add check for crypto_shash_tfm_digest (git-fixes).
  * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
  * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
  * unicode: Do not special case ignorable code points (stable-fixes).
  * unicode: Fix utf8_load() error path (git-fixes).
  * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
  * uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
  * uprobes: introduce the global struct vm_special_mapping xol_mapping
    (bsc#1231114).
  * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114).
  * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
  * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the
    Crashkernel Scenario (stable-fixes).
  * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git-
    fixes).
  * usb: dwc3: core: Stop processing of pending events if controller is halted
    (git-fixes).
  * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
    logic (git-fixes).
  * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
  * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
  * usb: ehci-spear: fix call balance of sehci clk handling routines (git-
    fixes).
  * usb: gadget: core: force synchronous registration (git-fixes).
  * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
    fixes).
  * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).
  * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
    fixes).
  * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant
    (stable-fixes).
  * usb: gadget: f_uac2: fix non-newline-terminated function name (stable-
    fixes).
  * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git-
    fixes).
  * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
  * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
  * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
  * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip
    (stable-fixes).
  * usb: typec: altmode should keep reference to parent (git-fixes).
  * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
    (git-fixes).
  * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
    (git-fixes).
  * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
    (git-fixes).
  * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
  * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
  * usb: xhci: fix loss of data on Cadence xHC (git-fixes).
  * usb: yurex: make waiting on yurex_write interruptible (git-fixes).
  * usbip: tools: Fix detach_port() invalid port error path (git-fixes).
  * usbnet: fix cyclical race on disconnect with work queue (git-fixes).
  * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes).
  * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes).
  * vdpa_sim_blk: allocate the buffer zeroed (git-fixes).
  * vduse: avoid using __GFP_NOFAIL (git-fixes).
  * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes).
  * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
  * vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
  * virtio_console: fix misc probe bugs (git-fixes).
  * vmalloc: modify the alloc_vmap_area() error message for better diagnostics
    (jsc#PED-10978).
  * vmxnet3: Add XDP support (bsc#1226498).
  * vmxnet3: Fix missing reserved tailroom (bsc#1226498).
  * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498).
  * vmxnet3: add command to allow disabling of offloads (bsc#1226498).
  * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
  * vmxnet3: prepare for version 9 changes (bsc#1226498).
  * vmxnet3: update to version 9 (bsc#1226498).
  * vsock: Update msg_count on read_skb() (git-fixes).
  * vt: prevent kernel-infoleak in con_font_get() (git-fixes).
  * wifi: ath10k: Fix memory leak in management tx (git-fixes).
  * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
    (git-fixes).
  * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
    (git-fixes).
  * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
    fixes).
  * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
  * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
  * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
  * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes).
  * wifi: ath12k: fix crash when unbinding (git-fixes).
  * wifi: ath12k: fix warning when unbinding (git-fixes).
  * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
  * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
    (git-fixes).
  * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-
    fixes).
  * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
    (stable-fixes).
  * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
  * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).
  * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes).
  * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes).
  * wifi: cw1200: Fix potential NULL dereference (git-fixes).
  * wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
    fixes).
  * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd()
    (git-fixes).
  * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes).
  * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes).
  * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes).
  * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
    (git-fixes).
  * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes).
  * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes).
  * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes).
  * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes).
  * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes).
  * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable-
    fixes).
  * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
    (git-fixes).
  * wifi: mac80211: fix RCU list iterations (stable-fixes).
  * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
  * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation
    (stable-fixes).
  * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable
    (stable-fixes).
  * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable-
    fixes).
  * wifi: mwifiex: Fix memcpy() field-spanning write warning in
    mwifiex_cmd_802_11_scan_ext() (stable-fixes).
  * wifi: mwifiex: Fix memcpy() field-spanning write warning in
    mwifiex_config_scan() (git-fixes).
  * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes).
  * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes).
  * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
  * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
    (stable-fixes).
  * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes).
  * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes).
  * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
  * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
  * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load
    (git-fixes).
  * x86/Documentation: Indent 'note::' directive for protocol version number
    note (git-fixes).
  * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes).
  * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes).
  * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes).
  * x86/apic: Make x2apic_disable() work correctly (git-fixes).
  * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
  * x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
  * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
  * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
  * x86/e820: Add a new e820 table update helper (bsc#1234034).
  * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
  * x86/entry: Remove unwanted instrumentation in common_interrupt() (git-
    fixes).
  * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency
    (git-fixes).
  * x86/microcode/intel: Remove unnecessary cache writeback and invalidation
    (git-fixes).
  * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes).
  * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes).
  * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes).
  * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
  * x86/sev: Add callback to apply RMP table fixups for kexec (bsc#1234034).
  * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-
    fixes).
  * x86/sev: Dump SEV_STATUS (bsc#1234034).
  * x86/sev: Ensure that RMP table fixups are reserved (bsc#1234034).
  * x86/sev: Move sev_guest.h into common SEV header (jsc#PED-5865).
  * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
  * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
  * x86/tdx: Enable CPU topology enumeration (git-fixes).
  * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
  * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
  * x86/tdx: Warning with 32bit build shift-count-overflow (jsc#PED-6143).
  * x86/traps: move kmsan check after instrumentation_begin (git-fixes).
  * x86/virt/tdx: Export SEAMCALL functions (jsc#PED-6143).
  * x86/virt/tdx: Export TDX KeyID information (jsc#PED-6143).
  * x86/virt/tdx: Export global metadata read infrastructure (jsc#PED-6143).
  * x86/virt/tdx: Move TDMR metadata fields map table to local variable
    (jsc#PED-6143).
  * x86/virt/tdx: Rename _offset to _member for TD_SYSINFO_MAP() macro
    (jsc#PED-6143).
  * x86/virt/tdx: Support global metadata read for all element sizes
    (jsc#PED-6143).
  * x86/virt/tdx: Unbind global metadata read with 'struct tdx_tdmr_sysinfo'
    (jsc#PED-6143).
  * x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
  * x86: do the user address masking outside the user access area (git-fixes).
  * x86: fix off-by-one in access_ok() (git-fixes).
  * x86: fix user address masking non-canonical speculation issue (git-fixes).
  * x86: make the masked_user_access_begin() macro use its argument only once
    (git-fixes).
  * x86: support user address masking instead of non-speculative conditional
    (git-fixes).
  * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
  * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).
  * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2
    (git-fixes).
  * xfs: check shortform attr entry flags specifically (git-fixes).
  * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git-
    fixes).
  * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes).
  * xfs: fix freeing speculative preallocations for preallocated files (git-
    fixes).
  * xfs: make sure sb_fdblocks is non-negative (git-fixes).
  * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git-
    fixes).
  * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git-
    fixes).
  * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes).
  * xfs: validate recovered name buffers when recovering xattr items (git-
    fixes).
  * xhci: Add a quirk for writing ERST in high-low order (git-fixes).
  * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
  * xhci: Fix incorrect stream context type macro (git-fixes).
  * xhci: Mitigate failed set dequeue pointer commands (git-fixes).
  * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
  * xhci: tegra: fix checked USB2 port number (git-fixes).
  * zonefs: Improve error handling (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * Confidential Computing Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2024-4387=1

## Package List:

  * Confidential Computing Module 15-SP6 (nosrc x86_64)
    * kernel-coco_debug-6.4.0-15061.9.coco15sp6.1
    * kernel-coco-6.4.0-15061.9.coco15sp6.1
  * Confidential Computing Module 15-SP6 (x86_64)
    * kernel-coco_debug-debuginfo-6.4.0-15061.9.coco15sp6.1
    * kernel-coco_debug-devel-6.4.0-15061.9.coco15sp6.1
    * kernel-coco_debug-debugsource-6.4.0-15061.9.coco15sp6.1
    * kernel-coco-debugsource-6.4.0-15061.9.coco15sp6.1
    * kernel-coco_debug-devel-debuginfo-6.4.0-15061.9.coco15sp6.1
    * reiserfs-kmp-coco-debuginfo-6.4.0-15061.9.coco15sp6.1
    * kernel-coco-vdso-debuginfo-6.4.0-15061.9.coco15sp6.1
    * kernel-coco-devel-6.4.0-15061.9.coco15sp6.1
    * reiserfs-kmp-coco-6.4.0-15061.9.coco15sp6.1
    * kernel-syms-coco-6.4.0-15061.9.coco15sp6.1
    * kernel-coco-debuginfo-6.4.0-15061.9.coco15sp6.1
  * Confidential Computing Module 15-SP6 (noarch)
    * kernel-source-coco-6.4.0-15061.9.coco15sp6.1
    * kernel-devel-coco-6.4.0-15061.9.coco15sp6.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52778.html
  * https://www.suse.com/security/cve/CVE-2023-52800.html
  * https://www.suse.com/security/cve/CVE-2023-52881.html
  * https://www.suse.com/security/cve/CVE-2023-52917.html
  * https://www.suse.com/security/cve/CVE-2023-52918.html
  * https://www.suse.com/security/cve/CVE-2023-52919.html
  * https://www.suse.com/security/cve/CVE-2023-52920.html
  * https://www.suse.com/security/cve/CVE-2023-52921.html
  * https://www.suse.com/security/cve/CVE-2023-52922.html
  * https://www.suse.com/security/cve/CVE-2023-6270.html
  * https://www.suse.com/security/cve/CVE-2024-26703.html
  * https://www.suse.com/security/cve/CVE-2024-26741.html
  * https://www.suse.com/security/cve/CVE-2024-26758.html
  * https://www.suse.com/security/cve/CVE-2024-26761.html
  * https://www.suse.com/security/cve/CVE-2024-26767.html
  * https://www.suse.com/security/cve/CVE-2024-26782.html
  * https://www.suse.com/security/cve/CVE-2024-26864.html
  * https://www.suse.com/security/cve/CVE-2024-26943.html
  * https://www.suse.com/security/cve/CVE-2024-26953.html
  * https://www.suse.com/security/cve/CVE-2024-27017.html
  * https://www.suse.com/security/cve/CVE-2024-27026.html
  * https://www.suse.com/security/cve/CVE-2024-27043.html
  * https://www.suse.com/security/cve/CVE-2024-27407.html
  * https://www.suse.com/security/cve/CVE-2024-35888.html
  * https://www.suse.com/security/cve/CVE-2024-35980.html
  * https://www.suse.com/security/cve/CVE-2024-36000.html
  * https://www.suse.com/security/cve/CVE-2024-36031.html
  * https://www.suse.com/security/cve/CVE-2024-36244.html
  * https://www.suse.com/security/cve/CVE-2024-36484.html
  * https://www.suse.com/security/cve/CVE-2024-36883.html
  * https://www.suse.com/security/cve/CVE-2024-36886.html
  * https://www.suse.com/security/cve/CVE-2024-36905.html
  * https://www.suse.com/security/cve/CVE-2024-36920.html
  * https://www.suse.com/security/cve/CVE-2024-36927.html
  * https://www.suse.com/security/cve/CVE-2024-36954.html
  * https://www.suse.com/security/cve/CVE-2024-36968.html
  * https://www.suse.com/security/cve/CVE-2024-38576.html
  * https://www.suse.com/security/cve/CVE-2024-38577.html
  * https://www.suse.com/security/cve/CVE-2024-38589.html
  * https://www.suse.com/security/cve/CVE-2024-38599.html
  * https://www.suse.com/security/cve/CVE-2024-40914.html
  * https://www.suse.com/security/cve/CVE-2024-41016.html
  * https://www.suse.com/security/cve/CVE-2024-41023.html
  * https://www.suse.com/security/cve/CVE-2024-41031.html
  * https://www.suse.com/security/cve/CVE-2024-41047.html
  * https://www.suse.com/security/cve/CVE-2024-41082.html
  * https://www.suse.com/security/cve/CVE-2024-42102.html
  * https://www.suse.com/security/cve/CVE-2024-42145.html
  * https://www.suse.com/security/cve/CVE-2024-44932.html
  * https://www.suse.com/security/cve/CVE-2024-44958.html
  * https://www.suse.com/security/cve/CVE-2024-44964.html
  * https://www.suse.com/security/cve/CVE-2024-44995.html
  * https://www.suse.com/security/cve/CVE-2024-45016.html
  * https://www.suse.com/security/cve/CVE-2024-45025.html
  * https://www.suse.com/security/cve/CVE-2024-46678.html
  * https://www.suse.com/security/cve/CVE-2024-46681.html
  * https://www.suse.com/security/cve/CVE-2024-46721.html
  * https://www.suse.com/security/cve/CVE-2024-46754.html
  * https://www.suse.com/security/cve/CVE-2024-46766.html
  * https://www.suse.com/security/cve/CVE-2024-46770.html
  * https://www.suse.com/security/cve/CVE-2024-46775.html
  * https://www.suse.com/security/cve/CVE-2024-46777.html
  * https://www.suse.com/security/cve/CVE-2024-46788.html
  * https://www.suse.com/security/cve/CVE-2024-46797.html
  * https://www.suse.com/security/cve/CVE-2024-46802.html
  * https://www.suse.com/security/cve/CVE-2024-46803.html
  * https://www.suse.com/security/cve/CVE-2024-46804.html
  * https://www.suse.com/security/cve/CVE-2024-46805.html
  * https://www.suse.com/security/cve/CVE-2024-46806.html
  * https://www.suse.com/security/cve/CVE-2024-46807.html
  * https://www.suse.com/security/cve/CVE-2024-46809.html
  * https://www.suse.com/security/cve/CVE-2024-46810.html
  * https://www.suse.com/security/cve/CVE-2024-46811.html
  * https://www.suse.com/security/cve/CVE-2024-46812.html
  * https://www.suse.com/security/cve/CVE-2024-46813.html
  * https://www.suse.com/security/cve/CVE-2024-46814.html
  * https://www.suse.com/security/cve/CVE-2024-46815.html
  * https://www.suse.com/security/cve/CVE-2024-46816.html
  * https://www.suse.com/security/cve/CVE-2024-46817.html
  * https://www.suse.com/security/cve/CVE-2024-46818.html
  * https://www.suse.com/security/cve/CVE-2024-46819.html
  * https://www.suse.com/security/cve/CVE-2024-46821.html
  * https://www.suse.com/security/cve/CVE-2024-46825.html
  * https://www.suse.com/security/cve/CVE-2024-46826.html
  * https://www.suse.com/security/cve/CVE-2024-46827.html
  * https://www.suse.com/security/cve/CVE-2024-46828.html
  * https://www.suse.com/security/cve/CVE-2024-46830.html
  * https://www.suse.com/security/cve/CVE-2024-46831.html
  * https://www.suse.com/security/cve/CVE-2024-46834.html
  * https://www.suse.com/security/cve/CVE-2024-46835.html
  * https://www.suse.com/security/cve/CVE-2024-46836.html
  * https://www.suse.com/security/cve/CVE-2024-46840.html
  * https://www.suse.com/security/cve/CVE-2024-46841.html
  * https://www.suse.com/security/cve/CVE-2024-46842.html
  * https://www.suse.com/security/cve/CVE-2024-46843.html
  * https://www.suse.com/security/cve/CVE-2024-46845.html
  * https://www.suse.com/security/cve/CVE-2024-46846.html
  * https://www.suse.com/security/cve/CVE-2024-46848.html
  * https://www.suse.com/security/cve/CVE-2024-46849.html
  * https://www.suse.com/security/cve/CVE-2024-46851.html
  * https://www.suse.com/security/cve/CVE-2024-46852.html
  * https://www.suse.com/security/cve/CVE-2024-46853.html
  * https://www.suse.com/security/cve/CVE-2024-46854.html
  * https://www.suse.com/security/cve/CVE-2024-46855.html
  * https://www.suse.com/security/cve/CVE-2024-46857.html
  * https://www.suse.com/security/cve/CVE-2024-46859.html
  * https://www.suse.com/security/cve/CVE-2024-46860.html
  * https://www.suse.com/security/cve/CVE-2024-46861.html
  * https://www.suse.com/security/cve/CVE-2024-46864.html
  * https://www.suse.com/security/cve/CVE-2024-46870.html
  * https://www.suse.com/security/cve/CVE-2024-46871.html
  * https://www.suse.com/security/cve/CVE-2024-47658.html
  * https://www.suse.com/security/cve/CVE-2024-47660.html
  * https://www.suse.com/security/cve/CVE-2024-47661.html
  * https://www.suse.com/security/cve/CVE-2024-47662.html
  * https://www.suse.com/security/cve/CVE-2024-47663.html
  * https://www.suse.com/security/cve/CVE-2024-47664.html
  * https://www.suse.com/security/cve/CVE-2024-47665.html
  * https://www.suse.com/security/cve/CVE-2024-47666.html
  * https://www.suse.com/security/cve/CVE-2024-47667.html
  * https://www.suse.com/security/cve/CVE-2024-47668.html
  * https://www.suse.com/security/cve/CVE-2024-47669.html
  * https://www.suse.com/security/cve/CVE-2024-47670.html
  * https://www.suse.com/security/cve/CVE-2024-47671.html
  * https://www.suse.com/security/cve/CVE-2024-47672.html
  * https://www.suse.com/security/cve/CVE-2024-47673.html
  * https://www.suse.com/security/cve/CVE-2024-47674.html
  * https://www.suse.com/security/cve/CVE-2024-47675.html
  * https://www.suse.com/security/cve/CVE-2024-47679.html
  * https://www.suse.com/security/cve/CVE-2024-47681.html
  * https://www.suse.com/security/cve/CVE-2024-47682.html
  * https://www.suse.com/security/cve/CVE-2024-47684.html
  * https://www.suse.com/security/cve/CVE-2024-47685.html
  * https://www.suse.com/security/cve/CVE-2024-47686.html
  * https://www.suse.com/security/cve/CVE-2024-47687.html
  * https://www.suse.com/security/cve/CVE-2024-47688.html
  * https://www.suse.com/security/cve/CVE-2024-47692.html
  * https://www.suse.com/security/cve/CVE-2024-47693.html
  * https://www.suse.com/security/cve/CVE-2024-47695.html
  * https://www.suse.com/security/cve/CVE-2024-47696.html
  * https://www.suse.com/security/cve/CVE-2024-47697.html
  * https://www.suse.com/security/cve/CVE-2024-47698.html
  * https://www.suse.com/security/cve/CVE-2024-47699.html
  * https://www.suse.com/security/cve/CVE-2024-47701.html
  * https://www.suse.com/security/cve/CVE-2024-47702.html
  * https://www.suse.com/security/cve/CVE-2024-47703.html
  * https://www.suse.com/security/cve/CVE-2024-47704.html
  * https://www.suse.com/security/cve/CVE-2024-47705.html
  * https://www.suse.com/security/cve/CVE-2024-47706.html
  * https://www.suse.com/security/cve/CVE-2024-47707.html
  * https://www.suse.com/security/cve/CVE-2024-47709.html
  * https://www.suse.com/security/cve/CVE-2024-47710.html
  * https://www.suse.com/security/cve/CVE-2024-47712.html
  * https://www.suse.com/security/cve/CVE-2024-47713.html
  * https://www.suse.com/security/cve/CVE-2024-47714.html
  * https://www.suse.com/security/cve/CVE-2024-47715.html
  * https://www.suse.com/security/cve/CVE-2024-47718.html
  * https://www.suse.com/security/cve/CVE-2024-47719.html
  * https://www.suse.com/security/cve/CVE-2024-47720.html
  * https://www.suse.com/security/cve/CVE-2024-47723.html
  * https://www.suse.com/security/cve/CVE-2024-47727.html
  * https://www.suse.com/security/cve/CVE-2024-47728.html
  * https://www.suse.com/security/cve/CVE-2024-47730.html
  * https://www.suse.com/security/cve/CVE-2024-47731.html
  * https://www.suse.com/security/cve/CVE-2024-47732.html
  * https://www.suse.com/security/cve/CVE-2024-47735.html
  * https://www.suse.com/security/cve/CVE-2024-47737.html
  * https://www.suse.com/security/cve/CVE-2024-47738.html
  * https://www.suse.com/security/cve/CVE-2024-47739.html
  * https://www.suse.com/security/cve/CVE-2024-47741.html
  * https://www.suse.com/security/cve/CVE-2024-47742.html
  * https://www.suse.com/security/cve/CVE-2024-47743.html
  * https://www.suse.com/security/cve/CVE-2024-47744.html
  * https://www.suse.com/security/cve/CVE-2024-47745.html
  * https://www.suse.com/security/cve/CVE-2024-47747.html
  * https://www.suse.com/security/cve/CVE-2024-47748.html
  * https://www.suse.com/security/cve/CVE-2024-47749.html
  * https://www.suse.com/security/cve/CVE-2024-47750.html
  * https://www.suse.com/security/cve/CVE-2024-47751.html
  * https://www.suse.com/security/cve/CVE-2024-47752.html
  * https://www.suse.com/security/cve/CVE-2024-47753.html
  * https://www.suse.com/security/cve/CVE-2024-47754.html
  * https://www.suse.com/security/cve/CVE-2024-47756.html
  * https://www.suse.com/security/cve/CVE-2024-47757.html
  * https://www.suse.com/security/cve/CVE-2024-49850.html
  * https://www.suse.com/security/cve/CVE-2024-49851.html
  * https://www.suse.com/security/cve/CVE-2024-49852.html
  * https://www.suse.com/security/cve/CVE-2024-49853.html
  * https://www.suse.com/security/cve/CVE-2024-49855.html
  * https://www.suse.com/security/cve/CVE-2024-49858.html
  * https://www.suse.com/security/cve/CVE-2024-49860.html
  * https://www.suse.com/security/cve/CVE-2024-49861.html
  * https://www.suse.com/security/cve/CVE-2024-49862.html
  * https://www.suse.com/security/cve/CVE-2024-49863.html
  * https://www.suse.com/security/cve/CVE-2024-49864.html
  * https://www.suse.com/security/cve/CVE-2024-49866.html
  * https://www.suse.com/security/cve/CVE-2024-49867.html
  * https://www.suse.com/security/cve/CVE-2024-49868.html
  * https://www.suse.com/security/cve/CVE-2024-49870.html
  * https://www.suse.com/security/cve/CVE-2024-49871.html
  * https://www.suse.com/security/cve/CVE-2024-49874.html
  * https://www.suse.com/security/cve/CVE-2024-49875.html
  * https://www.suse.com/security/cve/CVE-2024-49877.html
  * https://www.suse.com/security/cve/CVE-2024-49878.html
  * https://www.suse.com/security/cve/CVE-2024-49879.html
  * https://www.suse.com/security/cve/CVE-2024-49881.html
  * https://www.suse.com/security/cve/CVE-2024-49882.html
  * https://www.suse.com/security/cve/CVE-2024-49883.html
  * https://www.suse.com/security/cve/CVE-2024-49884.html
  * https://www.suse.com/security/cve/CVE-2024-49886.html
  * https://www.suse.com/security/cve/CVE-2024-49888.html
  * https://www.suse.com/security/cve/CVE-2024-49890.html
  * https://www.suse.com/security/cve/CVE-2024-49891.html
  * https://www.suse.com/security/cve/CVE-2024-49892.html
  * https://www.suse.com/security/cve/CVE-2024-49894.html
  * https://www.suse.com/security/cve/CVE-2024-49895.html
  * https://www.suse.com/security/cve/CVE-2024-49896.html
  * https://www.suse.com/security/cve/CVE-2024-49897.html
  * https://www.suse.com/security/cve/CVE-2024-49898.html
  * https://www.suse.com/security/cve/CVE-2024-49899.html
  * https://www.suse.com/security/cve/CVE-2024-49900.html
  * https://www.suse.com/security/cve/CVE-2024-49901.html
  * https://www.suse.com/security/cve/CVE-2024-49902.html
  * https://www.suse.com/security/cve/CVE-2024-49903.html
  * https://www.suse.com/security/cve/CVE-2024-49905.html
  * https://www.suse.com/security/cve/CVE-2024-49906.html
  * https://www.suse.com/security/cve/CVE-2024-49907.html
  * https://www.suse.com/security/cve/CVE-2024-49908.html
  * https://www.suse.com/security/cve/CVE-2024-49909.html
  * https://www.suse.com/security/cve/CVE-2024-49911.html
  * https://www.suse.com/security/cve/CVE-2024-49912.html
  * https://www.suse.com/security/cve/CVE-2024-49913.html
  * https://www.suse.com/security/cve/CVE-2024-49914.html
  * https://www.suse.com/security/cve/CVE-2024-49917.html
  * https://www.suse.com/security/cve/CVE-2024-49918.html
  * https://www.suse.com/security/cve/CVE-2024-49919.html
  * https://www.suse.com/security/cve/CVE-2024-49920.html
  * https://www.suse.com/security/cve/CVE-2024-49921.html
  * https://www.suse.com/security/cve/CVE-2024-49922.html
  * https://www.suse.com/security/cve/CVE-2024-49923.html
  * https://www.suse.com/security/cve/CVE-2024-49925.html
  * https://www.suse.com/security/cve/CVE-2024-49928.html
  * https://www.suse.com/security/cve/CVE-2024-49929.html
  * https://www.suse.com/security/cve/CVE-2024-49930.html
  * https://www.suse.com/security/cve/CVE-2024-49931.html
  * https://www.suse.com/security/cve/CVE-2024-49933.html
  * https://www.suse.com/security/cve/CVE-2024-49934.html
  * https://www.suse.com/security/cve/CVE-2024-49935.html
  * https://www.suse.com/security/cve/CVE-2024-49936.html
  * https://www.suse.com/security/cve/CVE-2024-49937.html
  * https://www.suse.com/security/cve/CVE-2024-49938.html
  * https://www.suse.com/security/cve/CVE-2024-49939.html
  * https://www.suse.com/security/cve/CVE-2024-49945.html
  * https://www.suse.com/security/cve/CVE-2024-49946.html
  * https://www.suse.com/security/cve/CVE-2024-49947.html
  * https://www.suse.com/security/cve/CVE-2024-49949.html
  * https://www.suse.com/security/cve/CVE-2024-49950.html
  * https://www.suse.com/security/cve/CVE-2024-49953.html
  * https://www.suse.com/security/cve/CVE-2024-49954.html
  * https://www.suse.com/security/cve/CVE-2024-49955.html
  * https://www.suse.com/security/cve/CVE-2024-49957.html
  * https://www.suse.com/security/cve/CVE-2024-49958.html
  * https://www.suse.com/security/cve/CVE-2024-49959.html
  * https://www.suse.com/security/cve/CVE-2024-49960.html
  * https://www.suse.com/security/cve/CVE-2024-49961.html
  * https://www.suse.com/security/cve/CVE-2024-49962.html
  * https://www.suse.com/security/cve/CVE-2024-49963.html
  * https://www.suse.com/security/cve/CVE-2024-49965.html
  * https://www.suse.com/security/cve/CVE-2024-49966.html
  * https://www.suse.com/security/cve/CVE-2024-49967.html
  * https://www.suse.com/security/cve/CVE-2024-49968.html
  * https://www.suse.com/security/cve/CVE-2024-49969.html
  * https://www.suse.com/security/cve/CVE-2024-49972.html
  * https://www.suse.com/security/cve/CVE-2024-49973.html
  * https://www.suse.com/security/cve/CVE-2024-49974.html
  * https://www.suse.com/security/cve/CVE-2024-49975.html
  * https://www.suse.com/security/cve/CVE-2024-49976.html
  * https://www.suse.com/security/cve/CVE-2024-49981.html
  * https://www.suse.com/security/cve/CVE-2024-49982.html
  * https://www.suse.com/security/cve/CVE-2024-49983.html
  * https://www.suse.com/security/cve/CVE-2024-49985.html
  * https://www.suse.com/security/cve/CVE-2024-49986.html
  * https://www.suse.com/security/cve/CVE-2024-49987.html
  * https://www.suse.com/security/cve/CVE-2024-49989.html
  * https://www.suse.com/security/cve/CVE-2024-49991.html
  * https://www.suse.com/security/cve/CVE-2024-49993.html
  * https://www.suse.com/security/cve/CVE-2024-49995.html
  * https://www.suse.com/security/cve/CVE-2024-49996.html
  * https://www.suse.com/security/cve/CVE-2024-50000.html
  * https://www.suse.com/security/cve/CVE-2024-50001.html
  * https://www.suse.com/security/cve/CVE-2024-50002.html
  * https://www.suse.com/security/cve/CVE-2024-50003.html
  * https://www.suse.com/security/cve/CVE-2024-50004.html
  * https://www.suse.com/security/cve/CVE-2024-50006.html
  * https://www.suse.com/security/cve/CVE-2024-50007.html
  * https://www.suse.com/security/cve/CVE-2024-50008.html
  * https://www.suse.com/security/cve/CVE-2024-50009.html
  * https://www.suse.com/security/cve/CVE-2024-50012.html
  * https://www.suse.com/security/cve/CVE-2024-50013.html
  * https://www.suse.com/security/cve/CVE-2024-50014.html
  * https://www.suse.com/security/cve/CVE-2024-50015.html
  * https://www.suse.com/security/cve/CVE-2024-50017.html
  * https://www.suse.com/security/cve/CVE-2024-50019.html
  * https://www.suse.com/security/cve/CVE-2024-50020.html
  * https://www.suse.com/security/cve/CVE-2024-50021.html
  * https://www.suse.com/security/cve/CVE-2024-50022.html
  * https://www.suse.com/security/cve/CVE-2024-50023.html
  * https://www.suse.com/security/cve/CVE-2024-50024.html
  * https://www.suse.com/security/cve/CVE-2024-50025.html
  * https://www.suse.com/security/cve/CVE-2024-50026.html
  * https://www.suse.com/security/cve/CVE-2024-50027.html
  * https://www.suse.com/security/cve/CVE-2024-50028.html
  * https://www.suse.com/security/cve/CVE-2024-50031.html
  * https://www.suse.com/security/cve/CVE-2024-50033.html
  * https://www.suse.com/security/cve/CVE-2024-50035.html
  * https://www.suse.com/security/cve/CVE-2024-50040.html
  * https://www.suse.com/security/cve/CVE-2024-50041.html
  * https://www.suse.com/security/cve/CVE-2024-50042.html
  * https://www.suse.com/security/cve/CVE-2024-50044.html
  * https://www.suse.com/security/cve/CVE-2024-50045.html
  * https://www.suse.com/security/cve/CVE-2024-50046.html
  * https://www.suse.com/security/cve/CVE-2024-50047.html
  * https://www.suse.com/security/cve/CVE-2024-50048.html
  * https://www.suse.com/security/cve/CVE-2024-50049.html
  * https://www.suse.com/security/cve/CVE-2024-50055.html
  * https://www.suse.com/security/cve/CVE-2024-50058.html
  * https://www.suse.com/security/cve/CVE-2024-50059.html
  * https://www.suse.com/security/cve/CVE-2024-50060.html
  * https://www.suse.com/security/cve/CVE-2024-50061.html
  * https://www.suse.com/security/cve/CVE-2024-50062.html
  * https://www.suse.com/security/cve/CVE-2024-50063.html
  * https://www.suse.com/security/cve/CVE-2024-50064.html
  * https://www.suse.com/security/cve/CVE-2024-50067.html
  * https://www.suse.com/security/cve/CVE-2024-50069.html
  * https://www.suse.com/security/cve/CVE-2024-50073.html
  * https://www.suse.com/security/cve/CVE-2024-50074.html
  * https://www.suse.com/security/cve/CVE-2024-50075.html
  * https://www.suse.com/security/cve/CVE-2024-50076.html
  * https://www.suse.com/security/cve/CVE-2024-50077.html
  * https://www.suse.com/security/cve/CVE-2024-50078.html
  * https://www.suse.com/security/cve/CVE-2024-50080.html
  * https://www.suse.com/security/cve/CVE-2024-50081.html
  * https://www.suse.com/security/cve/CVE-2024-50082.html
  * https://www.suse.com/security/cve/CVE-2024-50084.html
  * https://www.suse.com/security/cve/CVE-2024-50087.html
  * https://www.suse.com/security/cve/CVE-2024-50088.html
  * https://www.suse.com/security/cve/CVE-2024-50089.html
  * https://www.suse.com/security/cve/CVE-2024-50093.html
  * https://www.suse.com/security/cve/CVE-2024-50095.html
  * https://www.suse.com/security/cve/CVE-2024-50096.html
  * https://www.suse.com/security/cve/CVE-2024-50098.html
  * https://www.suse.com/security/cve/CVE-2024-50099.html
  * https://www.suse.com/security/cve/CVE-2024-50100.html
  * https://www.suse.com/security/cve/CVE-2024-50101.html
  * https://www.suse.com/security/cve/CVE-2024-50102.html
  * https://www.suse.com/security/cve/CVE-2024-50103.html
  * https://www.suse.com/security/cve/CVE-2024-50108.html
  * https://www.suse.com/security/cve/CVE-2024-50110.html
  * https://www.suse.com/security/cve/CVE-2024-50115.html
  * https://www.suse.com/security/cve/CVE-2024-50116.html
  * https://www.suse.com/security/cve/CVE-2024-50117.html
  * https://www.suse.com/security/cve/CVE-2024-50121.html
  * https://www.suse.com/security/cve/CVE-2024-50124.html
  * https://www.suse.com/security/cve/CVE-2024-50125.html
  * https://www.suse.com/security/cve/CVE-2024-50127.html
  * https://www.suse.com/security/cve/CVE-2024-50128.html
  * https://www.suse.com/security/cve/CVE-2024-50130.html
  * https://www.suse.com/security/cve/CVE-2024-50131.html
  * https://www.suse.com/security/cve/CVE-2024-50134.html
  * https://www.suse.com/security/cve/CVE-2024-50135.html
  * https://www.suse.com/security/cve/CVE-2024-50136.html
  * https://www.suse.com/security/cve/CVE-2024-50138.html
  * https://www.suse.com/security/cve/CVE-2024-50139.html
  * https://www.suse.com/security/cve/CVE-2024-50141.html
  * https://www.suse.com/security/cve/CVE-2024-50145.html
  * https://www.suse.com/security/cve/CVE-2024-50146.html
  * https://www.suse.com/security/cve/CVE-2024-50147.html
  * https://www.suse.com/security/cve/CVE-2024-50148.html
  * https://www.suse.com/security/cve/CVE-2024-50150.html
  * https://www.suse.com/security/cve/CVE-2024-50153.html
  * https://www.suse.com/security/cve/CVE-2024-50154.html
  * https://www.suse.com/security/cve/CVE-2024-50155.html
  * https://www.suse.com/security/cve/CVE-2024-50156.html
  * https://www.suse.com/security/cve/CVE-2024-50157.html
  * https://www.suse.com/security/cve/CVE-2024-50158.html
  * https://www.suse.com/security/cve/CVE-2024-50159.html
  * https://www.suse.com/security/cve/CVE-2024-50160.html
  * https://www.suse.com/security/cve/CVE-2024-50166.html
  * https://www.suse.com/security/cve/CVE-2024-50167.html
  * https://www.suse.com/security/cve/CVE-2024-50169.html
  * https://www.suse.com/security/cve/CVE-2024-50171.html
  * https://www.suse.com/security/cve/CVE-2024-50172.html
  * https://www.suse.com/security/cve/CVE-2024-50175.html
  * https://www.suse.com/security/cve/CVE-2024-50176.html
  * https://www.suse.com/security/cve/CVE-2024-50177.html
  * https://www.suse.com/security/cve/CVE-2024-50179.html
  * https://www.suse.com/security/cve/CVE-2024-50180.html
  * https://www.suse.com/security/cve/CVE-2024-50181.html
  * https://www.suse.com/security/cve/CVE-2024-50182.html
  * https://www.suse.com/security/cve/CVE-2024-50183.html
  * https://www.suse.com/security/cve/CVE-2024-50184.html
  * https://www.suse.com/security/cve/CVE-2024-50186.html
  * https://www.suse.com/security/cve/CVE-2024-50187.html
  * https://www.suse.com/security/cve/CVE-2024-50188.html
  * https://www.suse.com/security/cve/CVE-2024-50189.html
  * https://www.suse.com/security/cve/CVE-2024-50192.html
  * https://www.suse.com/security/cve/CVE-2024-50194.html
  * https://www.suse.com/security/cve/CVE-2024-50195.html
  * https://www.suse.com/security/cve/CVE-2024-50196.html
  * https://www.suse.com/security/cve/CVE-2024-50198.html
  * https://www.suse.com/security/cve/CVE-2024-50200.html
  * https://www.suse.com/security/cve/CVE-2024-50201.html
  * https://www.suse.com/security/cve/CVE-2024-50205.html
  * https://www.suse.com/security/cve/CVE-2024-50208.html
  * https://www.suse.com/security/cve/CVE-2024-50209.html
  * https://www.suse.com/security/cve/CVE-2024-50210.html
  * https://www.suse.com/security/cve/CVE-2024-50215.html
  * https://www.suse.com/security/cve/CVE-2024-50216.html
  * https://www.suse.com/security/cve/CVE-2024-50218.html
  * https://www.suse.com/security/cve/CVE-2024-50221.html
  * https://www.suse.com/security/cve/CVE-2024-50224.html
  * https://www.suse.com/security/cve/CVE-2024-50225.html
  * https://www.suse.com/security/cve/CVE-2024-50229.html
  * https://www.suse.com/security/cve/CVE-2024-50230.html
  * https://www.suse.com/security/cve/CVE-2024-50231.html
  * https://www.suse.com/security/cve/CVE-2024-50232.html
  * https://www.suse.com/security/cve/CVE-2024-50233.html
  * https://www.suse.com/security/cve/CVE-2024-50234.html
  * https://www.suse.com/security/cve/CVE-2024-50235.html
  * https://www.suse.com/security/cve/CVE-2024-50236.html
  * https://www.suse.com/security/cve/CVE-2024-50237.html
  * https://www.suse.com/security/cve/CVE-2024-50240.html
  * https://www.suse.com/security/cve/CVE-2024-50245.html
  * https://www.suse.com/security/cve/CVE-2024-50246.html
  * https://www.suse.com/security/cve/CVE-2024-50248.html
  * https://www.suse.com/security/cve/CVE-2024-50249.html
  * https://www.suse.com/security/cve/CVE-2024-50250.html
  * https://www.suse.com/security/cve/CVE-2024-50255.html
  * https://www.suse.com/security/cve/CVE-2024-50257.html
  * https://www.suse.com/security/cve/CVE-2024-50261.html
  * https://www.suse.com/security/cve/CVE-2024-50264.html
  * https://www.suse.com/security/cve/CVE-2024-50265.html
  * https://www.suse.com/security/cve/CVE-2024-50267.html
  * https://www.suse.com/security/cve/CVE-2024-50268.html
  * https://www.suse.com/security/cve/CVE-2024-50269.html
  * https://www.suse.com/security/cve/CVE-2024-50271.html
  * https://www.suse.com/security/cve/CVE-2024-50273.html
  * https://www.suse.com/security/cve/CVE-2024-50274.html
  * https://www.suse.com/security/cve/CVE-2024-50275.html
  * https://www.suse.com/security/cve/CVE-2024-50276.html
  * https://www.suse.com/security/cve/CVE-2024-50279.html
  * https://www.suse.com/security/cve/CVE-2024-50282.html
  * https://www.suse.com/security/cve/CVE-2024-50287.html
  * https://www.suse.com/security/cve/CVE-2024-50289.html
  * https://www.suse.com/security/cve/CVE-2024-50290.html
  * https://www.suse.com/security/cve/CVE-2024-50292.html
  * https://www.suse.com/security/cve/CVE-2024-50295.html
  * https://www.suse.com/security/cve/CVE-2024-50298.html
  * https://www.suse.com/security/cve/CVE-2024-50301.html
  * https://www.suse.com/security/cve/CVE-2024-50302.html
  * https://www.suse.com/security/cve/CVE-2024-53042.html
  * https://www.suse.com/security/cve/CVE-2024-53045.html
  * https://www.suse.com/security/cve/CVE-2024-53048.html
  * https://www.suse.com/security/cve/CVE-2024-53052.html
  * https://www.suse.com/security/cve/CVE-2024-53058.html
  * https://www.suse.com/security/cve/CVE-2024-53059.html
  * https://www.suse.com/security/cve/CVE-2024-53060.html
  * https://www.suse.com/security/cve/CVE-2024-53061.html
  * https://www.suse.com/security/cve/CVE-2024-53063.html
  * https://www.suse.com/security/cve/CVE-2024-53066.html
  * https://www.suse.com/security/cve/CVE-2024-53068.html
  * https://www.suse.com/security/cve/CVE-2024-53072.html
  * https://www.suse.com/security/cve/CVE-2024-53074.html
  * https://www.suse.com/security/cve/CVE-2024-53076.html
  * https://www.suse.com/security/cve/CVE-2024-53079.html
  * https://www.suse.com/security/cve/CVE-2024-53081.html
  * https://www.suse.com/security/cve/CVE-2024-53082.html
  * https://www.suse.com/security/cve/CVE-2024-53085.html
  * https://www.suse.com/security/cve/CVE-2024-53088.html
  * https://www.suse.com/security/cve/CVE-2024-53093.html
  * https://www.suse.com/security/cve/CVE-2024-53094.html
  * https://www.suse.com/security/cve/CVE-2024-53096.html
  * https://www.suse.com/security/cve/CVE-2024-53100.html
  * https://www.suse.com/security/cve/CVE-2024-53101.html
  * https://www.suse.com/security/cve/CVE-2024-53104.html
  * https://www.suse.com/security/cve/CVE-2024-53106.html
  * https://www.suse.com/security/cve/CVE-2024-53108.html
  * https://www.suse.com/security/cve/CVE-2024-53112.html
  * https://www.suse.com/security/cve/CVE-2024-53114.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1012628
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1082555
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1215199
  * https://bugzilla.suse.com/show_bug.cgi?id=1217845
  * https://bugzilla.suse.com/show_bug.cgi?id=1218562
  * https://bugzilla.suse.com/show_bug.cgi?id=1218644
  * https://bugzilla.suse.com/show_bug.cgi?id=1219596
  * https://bugzilla.suse.com/show_bug.cgi?id=1219803
  * https://bugzilla.suse.com/show_bug.cgi?id=1220382
  * https://bugzilla.suse.com/show_bug.cgi?id=1221309
  * https://bugzilla.suse.com/show_bug.cgi?id=1222423
  * https://bugzilla.suse.com/show_bug.cgi?id=1222587
  * https://bugzilla.suse.com/show_bug.cgi?id=1222590
  * https://bugzilla.suse.com/show_bug.cgi?id=1223112
  * https://bugzilla.suse.com/show_bug.cgi?id=1223384
  * https://bugzilla.suse.com/show_bug.cgi?id=1223656
  * https://bugzilla.suse.com/show_bug.cgi?id=1223700
  * https://bugzilla.suse.com/show_bug.cgi?id=1223733
  * https://bugzilla.suse.com/show_bug.cgi?id=1223824
  * https://bugzilla.suse.com/show_bug.cgi?id=1223848
  * https://bugzilla.suse.com/show_bug.cgi?id=1224088
  * https://bugzilla.suse.com/show_bug.cgi?id=1224429
  * https://bugzilla.suse.com/show_bug.cgi?id=1224518
  * https://bugzilla.suse.com/show_bug.cgi?id=1224548
  * https://bugzilla.suse.com/show_bug.cgi?id=1224574
  * https://bugzilla.suse.com/show_bug.cgi?id=1224948
  * https://bugzilla.suse.com/show_bug.cgi?id=1225611
  * https://bugzilla.suse.com/show_bug.cgi?id=1225713
  * https://bugzilla.suse.com/show_bug.cgi?id=1225725
  * https://bugzilla.suse.com/show_bug.cgi?id=1225730
  * https://bugzilla.suse.com/show_bug.cgi?id=1225742
  * https://bugzilla.suse.com/show_bug.cgi?id=1225764
  * https://bugzilla.suse.com/show_bug.cgi?id=1225768
  * https://bugzilla.suse.com/show_bug.cgi?id=1225813
  * https://bugzilla.suse.com/show_bug.cgi?id=1225903
  * https://bugzilla.suse.com/show_bug.cgi?id=1226003
  * https://bugzilla.suse.com/show_bug.cgi?id=1226130
  * https://bugzilla.suse.com/show_bug.cgi?id=1226498
  * https://bugzilla.suse.com/show_bug.cgi?id=1226623
  * https://bugzilla.suse.com/show_bug.cgi?id=1226631
  * https://bugzilla.suse.com/show_bug.cgi?id=1226748
  * https://bugzilla.suse.com/show_bug.cgi?id=1226797
  * https://bugzilla.suse.com/show_bug.cgi?id=1226848
  * https://bugzilla.suse.com/show_bug.cgi?id=1226872
  * https://bugzilla.suse.com/show_bug.cgi?id=1227726
  * https://bugzilla.suse.com/show_bug.cgi?id=1227842
  * https://bugzilla.suse.com/show_bug.cgi?id=1228119
  * https://bugzilla.suse.com/show_bug.cgi?id=1228244
  * https://bugzilla.suse.com/show_bug.cgi?id=1228269
  * https://bugzilla.suse.com/show_bug.cgi?id=1228410
  * https://bugzilla.suse.com/show_bug.cgi?id=1228430
  * https://bugzilla.suse.com/show_bug.cgi?id=1228454
  * https://bugzilla.suse.com/show_bug.cgi?id=1228537
  * https://bugzilla.suse.com/show_bug.cgi?id=1228620
  * https://bugzilla.suse.com/show_bug.cgi?id=1228743
  * https://bugzilla.suse.com/show_bug.cgi?id=1228747
  * https://bugzilla.suse.com/show_bug.cgi?id=1228850
  * https://bugzilla.suse.com/show_bug.cgi?id=1228857
  * https://bugzilla.suse.com/show_bug.cgi?id=1229019
  * https://bugzilla.suse.com/show_bug.cgi?id=1229165
  * https://bugzilla.suse.com/show_bug.cgi?id=1229429
  * https://bugzilla.suse.com/show_bug.cgi?id=1229450
  * https://bugzilla.suse.com/show_bug.cgi?id=1229585
  * https://bugzilla.suse.com/show_bug.cgi?id=1229677
  * https://bugzilla.suse.com/show_bug.cgi?id=1229769
  * https://bugzilla.suse.com/show_bug.cgi?id=1229808
  * https://bugzilla.suse.com/show_bug.cgi?id=1229891
  * https://bugzilla.suse.com/show_bug.cgi?id=1230055
  * https://bugzilla.suse.com/show_bug.cgi?id=1230132
  * https://bugzilla.suse.com/show_bug.cgi?id=1230179
  * https://bugzilla.suse.com/show_bug.cgi?id=1230220
  * https://bugzilla.suse.com/show_bug.cgi?id=1230231
  * https://bugzilla.suse.com/show_bug.cgi?id=1230289
  * https://bugzilla.suse.com/show_bug.cgi?id=1230295
  * https://bugzilla.suse.com/show_bug.cgi?id=1230339
  * https://bugzilla.suse.com/show_bug.cgi?id=1230341
  * https://bugzilla.suse.com/show_bug.cgi?id=1230375
  * https://bugzilla.suse.com/show_bug.cgi?id=1230414
  * https://bugzilla.suse.com/show_bug.cgi?id=1230429
  * https://bugzilla.suse.com/show_bug.cgi?id=1230456
  * https://bugzilla.suse.com/show_bug.cgi?id=1230501
  * https://bugzilla.suse.com/show_bug.cgi?id=1230527
  * https://bugzilla.suse.com/show_bug.cgi?id=1230550
  * https://bugzilla.suse.com/show_bug.cgi?id=1230558
  * https://bugzilla.suse.com/show_bug.cgi?id=1230600
  * https://bugzilla.suse.com/show_bug.cgi?id=1230620
  * https://bugzilla.suse.com/show_bug.cgi?id=1230710
  * https://bugzilla.suse.com/show_bug.cgi?id=1230733
  * https://bugzilla.suse.com/show_bug.cgi?id=1230762
  * https://bugzilla.suse.com/show_bug.cgi?id=1230763
  * https://bugzilla.suse.com/show_bug.cgi?id=1230773
  * https://bugzilla.suse.com/show_bug.cgi?id=1230774
  * https://bugzilla.suse.com/show_bug.cgi?id=1230801
  * https://bugzilla.suse.com/show_bug.cgi?id=1230817
  * https://bugzilla.suse.com/show_bug.cgi?id=1230831
  * https://bugzilla.suse.com/show_bug.cgi?id=1230914
  * https://bugzilla.suse.com/show_bug.cgi?id=1230918
  * https://bugzilla.suse.com/show_bug.cgi?id=1230971
  * https://bugzilla.suse.com/show_bug.cgi?id=1231016
  * https://bugzilla.suse.com/show_bug.cgi?id=1231035
  * https://bugzilla.suse.com/show_bug.cgi?id=1231072
  * https://bugzilla.suse.com/show_bug.cgi?id=1231073
  * https://bugzilla.suse.com/show_bug.cgi?id=1231075
  * https://bugzilla.suse.com/show_bug.cgi?id=1231076
  * https://bugzilla.suse.com/show_bug.cgi?id=1231081
  * https://bugzilla.suse.com/show_bug.cgi?id=1231082
  * https://bugzilla.suse.com/show_bug.cgi?id=1231083
  * https://bugzilla.suse.com/show_bug.cgi?id=1231084
  * https://bugzilla.suse.com/show_bug.cgi?id=1231085
  * https://bugzilla.suse.com/show_bug.cgi?id=1231087
  * https://bugzilla.suse.com/show_bug.cgi?id=1231089
  * https://bugzilla.suse.com/show_bug.cgi?id=1231092
  * https://bugzilla.suse.com/show_bug.cgi?id=1231093
  * https://bugzilla.suse.com/show_bug.cgi?id=1231094
  * https://bugzilla.suse.com/show_bug.cgi?id=1231096
  * https://bugzilla.suse.com/show_bug.cgi?id=1231098
  * https://bugzilla.suse.com/show_bug.cgi?id=1231100
  * https://bugzilla.suse.com/show_bug.cgi?id=1231101
  * https://bugzilla.suse.com/show_bug.cgi?id=1231102
  * https://bugzilla.suse.com/show_bug.cgi?id=1231105
  * https://bugzilla.suse.com/show_bug.cgi?id=1231108
  * https://bugzilla.suse.com/show_bug.cgi?id=1231111
  * https://bugzilla.suse.com/show_bug.cgi?id=1231114
  * https://bugzilla.suse.com/show_bug.cgi?id=1231115
  * https://bugzilla.suse.com/show_bug.cgi?id=1231116
  * https://bugzilla.suse.com/show_bug.cgi?id=1231117
  * https://bugzilla.suse.com/show_bug.cgi?id=1231131
  * https://bugzilla.suse.com/show_bug.cgi?id=1231132
  * https://bugzilla.suse.com/show_bug.cgi?id=1231135
  * https://bugzilla.suse.com/show_bug.cgi?id=1231136
  * https://bugzilla.suse.com/show_bug.cgi?id=1231138
  * https://bugzilla.suse.com/show_bug.cgi?id=1231148
  * https://bugzilla.suse.com/show_bug.cgi?id=1231169
  * https://bugzilla.suse.com/show_bug.cgi?id=1231170
  * https://bugzilla.suse.com/show_bug.cgi?id=1231171
  * https://bugzilla.suse.com/show_bug.cgi?id=1231178
  * https://bugzilla.suse.com/show_bug.cgi?id=1231179
  * https://bugzilla.suse.com/show_bug.cgi?id=1231182
  * https://bugzilla.suse.com/show_bug.cgi?id=1231183
  * https://bugzilla.suse.com/show_bug.cgi?id=1231187
  * https://bugzilla.suse.com/show_bug.cgi?id=1231191
  * https://bugzilla.suse.com/show_bug.cgi?id=1231193
  * https://bugzilla.suse.com/show_bug.cgi?id=1231195
  * https://bugzilla.suse.com/show_bug.cgi?id=1231197
  * https://bugzilla.suse.com/show_bug.cgi?id=1231200
  * https://bugzilla.suse.com/show_bug.cgi?id=1231202
  * https://bugzilla.suse.com/show_bug.cgi?id=1231203
  * https://bugzilla.suse.com/show_bug.cgi?id=1231276
  * https://bugzilla.suse.com/show_bug.cgi?id=1231293
  * https://bugzilla.suse.com/show_bug.cgi?id=1231384
  * https://bugzilla.suse.com/show_bug.cgi?id=1231434
  * https://bugzilla.suse.com/show_bug.cgi?id=1231435
  * https://bugzilla.suse.com/show_bug.cgi?id=1231436
  * https://bugzilla.suse.com/show_bug.cgi?id=1231439
  * https://bugzilla.suse.com/show_bug.cgi?id=1231440
  * https://bugzilla.suse.com/show_bug.cgi?id=1231441
  * https://bugzilla.suse.com/show_bug.cgi?id=1231442
  * https://bugzilla.suse.com/show_bug.cgi?id=1231452
  * https://bugzilla.suse.com/show_bug.cgi?id=1231453
  * https://bugzilla.suse.com/show_bug.cgi?id=1231465
  * https://bugzilla.suse.com/show_bug.cgi?id=1231474
  * https://bugzilla.suse.com/show_bug.cgi?id=1231481
  * https://bugzilla.suse.com/show_bug.cgi?id=1231496
  * https://bugzilla.suse.com/show_bug.cgi?id=1231502
  * https://bugzilla.suse.com/show_bug.cgi?id=1231537
  * https://bugzilla.suse.com/show_bug.cgi?id=1231539
  * https://bugzilla.suse.com/show_bug.cgi?id=1231540
  * https://bugzilla.suse.com/show_bug.cgi?id=1231541
  * https://bugzilla.suse.com/show_bug.cgi?id=1231617
  * https://bugzilla.suse.com/show_bug.cgi?id=1231630
  * https://bugzilla.suse.com/show_bug.cgi?id=1231634
  * https://bugzilla.suse.com/show_bug.cgi?id=1231635
  * https://bugzilla.suse.com/show_bug.cgi?id=1231636
  * https://bugzilla.suse.com/show_bug.cgi?id=1231637
  * https://bugzilla.suse.com/show_bug.cgi?id=1231638
  * https://bugzilla.suse.com/show_bug.cgi?id=1231639
  * https://bugzilla.suse.com/show_bug.cgi?id=1231640
  * https://bugzilla.suse.com/show_bug.cgi?id=1231673
  * https://bugzilla.suse.com/show_bug.cgi?id=1231828
  * https://bugzilla.suse.com/show_bug.cgi?id=1231849
  * https://bugzilla.suse.com/show_bug.cgi?id=1231855
  * https://bugzilla.suse.com/show_bug.cgi?id=1231856
  * https://bugzilla.suse.com/show_bug.cgi?id=1231857
  * https://bugzilla.suse.com/show_bug.cgi?id=1231858
  * https://bugzilla.suse.com/show_bug.cgi?id=1231859
  * https://bugzilla.suse.com/show_bug.cgi?id=1231860
  * https://bugzilla.suse.com/show_bug.cgi?id=1231861
  * https://bugzilla.suse.com/show_bug.cgi?id=1231864
  * https://bugzilla.suse.com/show_bug.cgi?id=1231865
  * https://bugzilla.suse.com/show_bug.cgi?id=1231868
  * https://bugzilla.suse.com/show_bug.cgi?id=1231869
  * https://bugzilla.suse.com/show_bug.cgi?id=1231871
  * https://bugzilla.suse.com/show_bug.cgi?id=1231872
  * https://bugzilla.suse.com/show_bug.cgi?id=1231901
  * https://bugzilla.suse.com/show_bug.cgi?id=1231902
  * https://bugzilla.suse.com/show_bug.cgi?id=1231903
  * https://bugzilla.suse.com/show_bug.cgi?id=1231904
  * https://bugzilla.suse.com/show_bug.cgi?id=1231906
  * https://bugzilla.suse.com/show_bug.cgi?id=1231907
  * https://bugzilla.suse.com/show_bug.cgi?id=1231908
  * https://bugzilla.suse.com/show_bug.cgi?id=1231914
  * https://bugzilla.suse.com/show_bug.cgi?id=1231916
  * https://bugzilla.suse.com/show_bug.cgi?id=1231920
  * https://bugzilla.suse.com/show_bug.cgi?id=1231924
  * https://bugzilla.suse.com/show_bug.cgi?id=1231926
  * https://bugzilla.suse.com/show_bug.cgi?id=1231930
  * https://bugzilla.suse.com/show_bug.cgi?id=1231931
  * https://bugzilla.suse.com/show_bug.cgi?id=1231935
  * https://bugzilla.suse.com/show_bug.cgi?id=1231942
  * https://bugzilla.suse.com/show_bug.cgi?id=1231944
  * https://bugzilla.suse.com/show_bug.cgi?id=1231946
  * https://bugzilla.suse.com/show_bug.cgi?id=1231947
  * https://bugzilla.suse.com/show_bug.cgi?id=1231950
  * https://bugzilla.suse.com/show_bug.cgi?id=1231951
  * https://bugzilla.suse.com/show_bug.cgi?id=1231952
  * https://bugzilla.suse.com/show_bug.cgi?id=1231953
  * https://bugzilla.suse.com/show_bug.cgi?id=1231954
  * https://bugzilla.suse.com/show_bug.cgi?id=1231955
  * https://bugzilla.suse.com/show_bug.cgi?id=1231956
  * https://bugzilla.suse.com/show_bug.cgi?id=1231957
  * https://bugzilla.suse.com/show_bug.cgi?id=1231965
  * https://bugzilla.suse.com/show_bug.cgi?id=1231967
  * https://bugzilla.suse.com/show_bug.cgi?id=1231968
  * https://bugzilla.suse.com/show_bug.cgi?id=1231987
  * https://bugzilla.suse.com/show_bug.cgi?id=1231988
  * https://bugzilla.suse.com/show_bug.cgi?id=1231989
  * https://bugzilla.suse.com/show_bug.cgi?id=1231990
  * https://bugzilla.suse.com/show_bug.cgi?id=1231998
  * https://bugzilla.suse.com/show_bug.cgi?id=1232000
  * https://bugzilla.suse.com/show_bug.cgi?id=1232003
  * https://bugzilla.suse.com/show_bug.cgi?id=1232009
  * https://bugzilla.suse.com/show_bug.cgi?id=1232013
  * https://bugzilla.suse.com/show_bug.cgi?id=1232015
  * https://bugzilla.suse.com/show_bug.cgi?id=1232016
  * https://bugzilla.suse.com/show_bug.cgi?id=1232017
  * https://bugzilla.suse.com/show_bug.cgi?id=1232018
  * https://bugzilla.suse.com/show_bug.cgi?id=1232033
  * https://bugzilla.suse.com/show_bug.cgi?id=1232034
  * https://bugzilla.suse.com/show_bug.cgi?id=1232036
  * https://bugzilla.suse.com/show_bug.cgi?id=1232043
  * https://bugzilla.suse.com/show_bug.cgi?id=1232047
  * https://bugzilla.suse.com/show_bug.cgi?id=1232048
  * https://bugzilla.suse.com/show_bug.cgi?id=1232049
  * https://bugzilla.suse.com/show_bug.cgi?id=1232050
  * https://bugzilla.suse.com/show_bug.cgi?id=1232056
  * https://bugzilla.suse.com/show_bug.cgi?id=1232075
  * https://bugzilla.suse.com/show_bug.cgi?id=1232076
  * https://bugzilla.suse.com/show_bug.cgi?id=1232079
  * https://bugzilla.suse.com/show_bug.cgi?id=1232080
  * https://bugzilla.suse.com/show_bug.cgi?id=1232083
  * https://bugzilla.suse.com/show_bug.cgi?id=1232084
  * https://bugzilla.suse.com/show_bug.cgi?id=1232085
  * https://bugzilla.suse.com/show_bug.cgi?id=1232089
  * https://bugzilla.suse.com/show_bug.cgi?id=1232090
  * https://bugzilla.suse.com/show_bug.cgi?id=1232093
  * https://bugzilla.suse.com/show_bug.cgi?id=1232094
  * https://bugzilla.suse.com/show_bug.cgi?id=1232096
  * https://bugzilla.suse.com/show_bug.cgi?id=1232097
  * https://bugzilla.suse.com/show_bug.cgi?id=1232098
  * https://bugzilla.suse.com/show_bug.cgi?id=1232103
  * https://bugzilla.suse.com/show_bug.cgi?id=1232104
  * https://bugzilla.suse.com/show_bug.cgi?id=1232105
  * https://bugzilla.suse.com/show_bug.cgi?id=1232109
  * https://bugzilla.suse.com/show_bug.cgi?id=1232111
  * https://bugzilla.suse.com/show_bug.cgi?id=1232114
  * https://bugzilla.suse.com/show_bug.cgi?id=1232116
  * https://bugzilla.suse.com/show_bug.cgi?id=1232117
  * https://bugzilla.suse.com/show_bug.cgi?id=1232124
  * https://bugzilla.suse.com/show_bug.cgi?id=1232126
  * https://bugzilla.suse.com/show_bug.cgi?id=1232127
  * https://bugzilla.suse.com/show_bug.cgi?id=1232129
  * https://bugzilla.suse.com/show_bug.cgi?id=1232130
  * https://bugzilla.suse.com/show_bug.cgi?id=1232131
  * https://bugzilla.suse.com/show_bug.cgi?id=1232132
  * https://bugzilla.suse.com/show_bug.cgi?id=1232134
  * https://bugzilla.suse.com/show_bug.cgi?id=1232135
  * https://bugzilla.suse.com/show_bug.cgi?id=1232140
  * https://bugzilla.suse.com/show_bug.cgi?id=1232141
  * https://bugzilla.suse.com/show_bug.cgi?id=1232142
  * https://bugzilla.suse.com/show_bug.cgi?id=1232145
  * https://bugzilla.suse.com/show_bug.cgi?id=1232147
  * https://bugzilla.suse.com/show_bug.cgi?id=1232148
  * https://bugzilla.suse.com/show_bug.cgi?id=1232149
  * https://bugzilla.suse.com/show_bug.cgi?id=1232151
  * https://bugzilla.suse.com/show_bug.cgi?id=1232152
  * https://bugzilla.suse.com/show_bug.cgi?id=1232154
  * https://bugzilla.suse.com/show_bug.cgi?id=1232155
  * https://bugzilla.suse.com/show_bug.cgi?id=1232156
  * https://bugzilla.suse.com/show_bug.cgi?id=1232159
  * https://bugzilla.suse.com/show_bug.cgi?id=1232160
  * https://bugzilla.suse.com/show_bug.cgi?id=1232162
  * https://bugzilla.suse.com/show_bug.cgi?id=1232164
  * https://bugzilla.suse.com/show_bug.cgi?id=1232165
  * https://bugzilla.suse.com/show_bug.cgi?id=1232174
  * https://bugzilla.suse.com/show_bug.cgi?id=1232180
  * https://bugzilla.suse.com/show_bug.cgi?id=1232182
  * https://bugzilla.suse.com/show_bug.cgi?id=1232183
  * https://bugzilla.suse.com/show_bug.cgi?id=1232185
  * https://bugzilla.suse.com/show_bug.cgi?id=1232187
  * https://bugzilla.suse.com/show_bug.cgi?id=1232189
  * https://bugzilla.suse.com/show_bug.cgi?id=1232192
  * https://bugzilla.suse.com/show_bug.cgi?id=1232195
  * https://bugzilla.suse.com/show_bug.cgi?id=1232196
  * https://bugzilla.suse.com/show_bug.cgi?id=1232198
  * https://bugzilla.suse.com/show_bug.cgi?id=1232199
  * https://bugzilla.suse.com/show_bug.cgi?id=1232200
  * https://bugzilla.suse.com/show_bug.cgi?id=1232201
  * https://bugzilla.suse.com/show_bug.cgi?id=1232207
  * https://bugzilla.suse.com/show_bug.cgi?id=1232208
  * https://bugzilla.suse.com/show_bug.cgi?id=1232217
  * https://bugzilla.suse.com/show_bug.cgi?id=1232218
  * https://bugzilla.suse.com/show_bug.cgi?id=1232220
  * https://bugzilla.suse.com/show_bug.cgi?id=1232221
  * https://bugzilla.suse.com/show_bug.cgi?id=1232222
  * https://bugzilla.suse.com/show_bug.cgi?id=1232224
  * https://bugzilla.suse.com/show_bug.cgi?id=1232232
  * https://bugzilla.suse.com/show_bug.cgi?id=1232250
  * https://bugzilla.suse.com/show_bug.cgi?id=1232251
  * https://bugzilla.suse.com/show_bug.cgi?id=1232253
  * https://bugzilla.suse.com/show_bug.cgi?id=1232254
  * https://bugzilla.suse.com/show_bug.cgi?id=1232255
  * https://bugzilla.suse.com/show_bug.cgi?id=1232256
  * https://bugzilla.suse.com/show_bug.cgi?id=1232258
  * https://bugzilla.suse.com/show_bug.cgi?id=1232259
  * https://bugzilla.suse.com/show_bug.cgi?id=1232260
  * https://bugzilla.suse.com/show_bug.cgi?id=1232262
  * https://bugzilla.suse.com/show_bug.cgi?id=1232263
  * https://bugzilla.suse.com/show_bug.cgi?id=1232264
  * https://bugzilla.suse.com/show_bug.cgi?id=1232272
  * https://bugzilla.suse.com/show_bug.cgi?id=1232275
  * https://bugzilla.suse.com/show_bug.cgi?id=1232279
  * https://bugzilla.suse.com/show_bug.cgi?id=1232282
  * https://bugzilla.suse.com/show_bug.cgi?id=1232285
  * https://bugzilla.suse.com/show_bug.cgi?id=1232287
  * https://bugzilla.suse.com/show_bug.cgi?id=1232295
  * https://bugzilla.suse.com/show_bug.cgi?id=1232305
  * https://bugzilla.suse.com/show_bug.cgi?id=1232307
  * https://bugzilla.suse.com/show_bug.cgi?id=1232309
  * https://bugzilla.suse.com/show_bug.cgi?id=1232310
  * https://bugzilla.suse.com/show_bug.cgi?id=1232312
  * https://bugzilla.suse.com/show_bug.cgi?id=1232313
  * https://bugzilla.suse.com/show_bug.cgi?id=1232314
  * https://bugzilla.suse.com/show_bug.cgi?id=1232315
  * https://bugzilla.suse.com/show_bug.cgi?id=1232316
  * https://bugzilla.suse.com/show_bug.cgi?id=1232317
  * https://bugzilla.suse.com/show_bug.cgi?id=1232318
  * https://bugzilla.suse.com/show_bug.cgi?id=1232329
  * https://bugzilla.suse.com/show_bug.cgi?id=1232332
  * https://bugzilla.suse.com/show_bug.cgi?id=1232333
  * https://bugzilla.suse.com/show_bug.cgi?id=1232334
  * https://bugzilla.suse.com/show_bug.cgi?id=1232335
  * https://bugzilla.suse.com/show_bug.cgi?id=1232337
  * https://bugzilla.suse.com/show_bug.cgi?id=1232339
  * https://bugzilla.suse.com/show_bug.cgi?id=1232340
  * https://bugzilla.suse.com/show_bug.cgi?id=1232342
  * https://bugzilla.suse.com/show_bug.cgi?id=1232345
  * https://bugzilla.suse.com/show_bug.cgi?id=1232349
  * https://bugzilla.suse.com/show_bug.cgi?id=1232352
  * https://bugzilla.suse.com/show_bug.cgi?id=1232354
  * https://bugzilla.suse.com/show_bug.cgi?id=1232355
  * https://bugzilla.suse.com/show_bug.cgi?id=1232357
  * https://bugzilla.suse.com/show_bug.cgi?id=1232358
  * https://bugzilla.suse.com/show_bug.cgi?id=1232359
  * https://bugzilla.suse.com/show_bug.cgi?id=1232361
  * https://bugzilla.suse.com/show_bug.cgi?id=1232362
  * https://bugzilla.suse.com/show_bug.cgi?id=1232366
  * https://bugzilla.suse.com/show_bug.cgi?id=1232367
  * https://bugzilla.suse.com/show_bug.cgi?id=1232368
  * https://bugzilla.suse.com/show_bug.cgi?id=1232369
  * https://bugzilla.suse.com/show_bug.cgi?id=1232370
  * https://bugzilla.suse.com/show_bug.cgi?id=1232371
  * https://bugzilla.suse.com/show_bug.cgi?id=1232374
  * https://bugzilla.suse.com/show_bug.cgi?id=1232378
  * https://bugzilla.suse.com/show_bug.cgi?id=1232381
  * https://bugzilla.suse.com/show_bug.cgi?id=1232383
  * https://bugzilla.suse.com/show_bug.cgi?id=1232385
  * https://bugzilla.suse.com/show_bug.cgi?id=1232386
  * https://bugzilla.suse.com/show_bug.cgi?id=1232387
  * https://bugzilla.suse.com/show_bug.cgi?id=1232392
  * https://bugzilla.suse.com/show_bug.cgi?id=1232394
  * https://bugzilla.suse.com/show_bug.cgi?id=1232395
  * https://bugzilla.suse.com/show_bug.cgi?id=1232396
  * https://bugzilla.suse.com/show_bug.cgi?id=1232413
  * https://bugzilla.suse.com/show_bug.cgi?id=1232416
  * https://bugzilla.suse.com/show_bug.cgi?id=1232417
  * https://bugzilla.suse.com/show_bug.cgi?id=1232418
  * https://bugzilla.suse.com/show_bug.cgi?id=1232424
  * https://bugzilla.suse.com/show_bug.cgi?id=1232427
  * https://bugzilla.suse.com/show_bug.cgi?id=1232432
  * https://bugzilla.suse.com/show_bug.cgi?id=1232435
  * https://bugzilla.suse.com/show_bug.cgi?id=1232436
  * https://bugzilla.suse.com/show_bug.cgi?id=1232442
  * https://bugzilla.suse.com/show_bug.cgi?id=1232446
  * https://bugzilla.suse.com/show_bug.cgi?id=1232483
  * https://bugzilla.suse.com/show_bug.cgi?id=1232494
  * https://bugzilla.suse.com/show_bug.cgi?id=1232498
  * https://bugzilla.suse.com/show_bug.cgi?id=1232499
  * https://bugzilla.suse.com/show_bug.cgi?id=1232500
  * https://bugzilla.suse.com/show_bug.cgi?id=1232501
  * https://bugzilla.suse.com/show_bug.cgi?id=1232502
  * https://bugzilla.suse.com/show_bug.cgi?id=1232503
  * https://bugzilla.suse.com/show_bug.cgi?id=1232504
  * https://bugzilla.suse.com/show_bug.cgi?id=1232505
  * https://bugzilla.suse.com/show_bug.cgi?id=1232506
  * https://bugzilla.suse.com/show_bug.cgi?id=1232507
  * https://bugzilla.suse.com/show_bug.cgi?id=1232511
  * https://bugzilla.suse.com/show_bug.cgi?id=1232519
  * https://bugzilla.suse.com/show_bug.cgi?id=1232520
  * https://bugzilla.suse.com/show_bug.cgi?id=1232529
  * https://bugzilla.suse.com/show_bug.cgi?id=1232552
  * https://bugzilla.suse.com/show_bug.cgi?id=1232623
  * https://bugzilla.suse.com/show_bug.cgi?id=1232626
  * https://bugzilla.suse.com/show_bug.cgi?id=1232627
  * https://bugzilla.suse.com/show_bug.cgi?id=1232628
  * https://bugzilla.suse.com/show_bug.cgi?id=1232629
  * https://bugzilla.suse.com/show_bug.cgi?id=1232704
  * https://bugzilla.suse.com/show_bug.cgi?id=1232757
  * https://bugzilla.suse.com/show_bug.cgi?id=1232768
  * https://bugzilla.suse.com/show_bug.cgi?id=1232819
  * https://bugzilla.suse.com/show_bug.cgi?id=1232823
  * https://bugzilla.suse.com/show_bug.cgi?id=1232860
  * https://bugzilla.suse.com/show_bug.cgi?id=1232869
  * https://bugzilla.suse.com/show_bug.cgi?id=1232870
  * https://bugzilla.suse.com/show_bug.cgi?id=1232873
  * https://bugzilla.suse.com/show_bug.cgi?id=1232876
  * https://bugzilla.suse.com/show_bug.cgi?id=1232877
  * https://bugzilla.suse.com/show_bug.cgi?id=1232878
  * https://bugzilla.suse.com/show_bug.cgi?id=1232880
  * https://bugzilla.suse.com/show_bug.cgi?id=1232881
  * https://bugzilla.suse.com/show_bug.cgi?id=1232884
  * https://bugzilla.suse.com/show_bug.cgi?id=1232885
  * https://bugzilla.suse.com/show_bug.cgi?id=1232887
  * https://bugzilla.suse.com/show_bug.cgi?id=1232888
  * https://bugzilla.suse.com/show_bug.cgi?id=1232890
  * https://bugzilla.suse.com/show_bug.cgi?id=1232892
  * https://bugzilla.suse.com/show_bug.cgi?id=1232894
  * https://bugzilla.suse.com/show_bug.cgi?id=1232896
  * https://bugzilla.suse.com/show_bug.cgi?id=1232897
  * https://bugzilla.suse.com/show_bug.cgi?id=1232905
  * https://bugzilla.suse.com/show_bug.cgi?id=1232907
  * https://bugzilla.suse.com/show_bug.cgi?id=1232914
  * https://bugzilla.suse.com/show_bug.cgi?id=1232919
  * https://bugzilla.suse.com/show_bug.cgi?id=1232925
  * https://bugzilla.suse.com/show_bug.cgi?id=1232926
  * https://bugzilla.suse.com/show_bug.cgi?id=1232928
  * https://bugzilla.suse.com/show_bug.cgi?id=1232935
  * https://bugzilla.suse.com/show_bug.cgi?id=1233029
  * https://bugzilla.suse.com/show_bug.cgi?id=1233032
  * https://bugzilla.suse.com/show_bug.cgi?id=1233035
  * https://bugzilla.suse.com/show_bug.cgi?id=1233036
  * https://bugzilla.suse.com/show_bug.cgi?id=1233041
  * https://bugzilla.suse.com/show_bug.cgi?id=1233044
  * https://bugzilla.suse.com/show_bug.cgi?id=1233049
  * https://bugzilla.suse.com/show_bug.cgi?id=1233050
  * https://bugzilla.suse.com/show_bug.cgi?id=1233051
  * https://bugzilla.suse.com/show_bug.cgi?id=1233056
  * https://bugzilla.suse.com/show_bug.cgi?id=1233057
  * https://bugzilla.suse.com/show_bug.cgi?id=1233061
  * https://bugzilla.suse.com/show_bug.cgi?id=1233062
  * https://bugzilla.suse.com/show_bug.cgi?id=1233063
  * https://bugzilla.suse.com/show_bug.cgi?id=1233065
  * https://bugzilla.suse.com/show_bug.cgi?id=1233067
  * https://bugzilla.suse.com/show_bug.cgi?id=1233070
  * https://bugzilla.suse.com/show_bug.cgi?id=1233073
  * https://bugzilla.suse.com/show_bug.cgi?id=1233074
  * https://bugzilla.suse.com/show_bug.cgi?id=1233088
  * https://bugzilla.suse.com/show_bug.cgi?id=1233091
  * https://bugzilla.suse.com/show_bug.cgi?id=1233092
  * https://bugzilla.suse.com/show_bug.cgi?id=1233097
  * https://bugzilla.suse.com/show_bug.cgi?id=1233100
  * https://bugzilla.suse.com/show_bug.cgi?id=1233103
  * https://bugzilla.suse.com/show_bug.cgi?id=1233104
  * https://bugzilla.suse.com/show_bug.cgi?id=1233105
  * https://bugzilla.suse.com/show_bug.cgi?id=1233106
  * https://bugzilla.suse.com/show_bug.cgi?id=1233107
  * https://bugzilla.suse.com/show_bug.cgi?id=1233108
  * https://bugzilla.suse.com/show_bug.cgi?id=1233110
  * https://bugzilla.suse.com/show_bug.cgi?id=1233111
  * https://bugzilla.suse.com/show_bug.cgi?id=1233113
  * https://bugzilla.suse.com/show_bug.cgi?id=1233114
  * https://bugzilla.suse.com/show_bug.cgi?id=1233115
  * https://bugzilla.suse.com/show_bug.cgi?id=1233117
  * https://bugzilla.suse.com/show_bug.cgi?id=1233119
  * https://bugzilla.suse.com/show_bug.cgi?id=1233123
  * https://bugzilla.suse.com/show_bug.cgi?id=1233125
  * https://bugzilla.suse.com/show_bug.cgi?id=1233127
  * https://bugzilla.suse.com/show_bug.cgi?id=1233129
  * https://bugzilla.suse.com/show_bug.cgi?id=1233130
  * https://bugzilla.suse.com/show_bug.cgi?id=1233132
  * https://bugzilla.suse.com/show_bug.cgi?id=1233135
  * https://bugzilla.suse.com/show_bug.cgi?id=1233176
  * https://bugzilla.suse.com/show_bug.cgi?id=1233179
  * https://bugzilla.suse.com/show_bug.cgi?id=1233185
  * https://bugzilla.suse.com/show_bug.cgi?id=1233188
  * https://bugzilla.suse.com/show_bug.cgi?id=1233189
  * https://bugzilla.suse.com/show_bug.cgi?id=1233191
  * https://bugzilla.suse.com/show_bug.cgi?id=1233193
  * https://bugzilla.suse.com/show_bug.cgi?id=1233197
  * https://bugzilla.suse.com/show_bug.cgi?id=1233203
  * https://bugzilla.suse.com/show_bug.cgi?id=1233205
  * https://bugzilla.suse.com/show_bug.cgi?id=1233206
  * https://bugzilla.suse.com/show_bug.cgi?id=1233207
  * https://bugzilla.suse.com/show_bug.cgi?id=1233208
  * https://bugzilla.suse.com/show_bug.cgi?id=1233209
  * https://bugzilla.suse.com/show_bug.cgi?id=1233210
  * https://bugzilla.suse.com/show_bug.cgi?id=1233211
  * https://bugzilla.suse.com/show_bug.cgi?id=1233212
  * https://bugzilla.suse.com/show_bug.cgi?id=1233216
  * https://bugzilla.suse.com/show_bug.cgi?id=1233217
  * https://bugzilla.suse.com/show_bug.cgi?id=1233219
  * https://bugzilla.suse.com/show_bug.cgi?id=1233226
  * https://bugzilla.suse.com/show_bug.cgi?id=1233238
  * https://bugzilla.suse.com/show_bug.cgi?id=1233241
  * https://bugzilla.suse.com/show_bug.cgi?id=1233244
  * https://bugzilla.suse.com/show_bug.cgi?id=1233253
  * https://bugzilla.suse.com/show_bug.cgi?id=1233255
  * https://bugzilla.suse.com/show_bug.cgi?id=1233293
  * https://bugzilla.suse.com/show_bug.cgi?id=1233298
  * https://bugzilla.suse.com/show_bug.cgi?id=1233305
  * https://bugzilla.suse.com/show_bug.cgi?id=1233320
  * https://bugzilla.suse.com/show_bug.cgi?id=1233350
  * https://bugzilla.suse.com/show_bug.cgi?id=1233443
  * https://bugzilla.suse.com/show_bug.cgi?id=1233452
  * https://bugzilla.suse.com/show_bug.cgi?id=1233453
  * https://bugzilla.suse.com/show_bug.cgi?id=1233454
  * https://bugzilla.suse.com/show_bug.cgi?id=1233456
  * https://bugzilla.suse.com/show_bug.cgi?id=1233457
  * https://bugzilla.suse.com/show_bug.cgi?id=1233458
  * https://bugzilla.suse.com/show_bug.cgi?id=1233460
  * https://bugzilla.suse.com/show_bug.cgi?id=1233462
  * https://bugzilla.suse.com/show_bug.cgi?id=1233463
  * https://bugzilla.suse.com/show_bug.cgi?id=1233464
  * https://bugzilla.suse.com/show_bug.cgi?id=1233465
  * https://bugzilla.suse.com/show_bug.cgi?id=1233468
  * https://bugzilla.suse.com/show_bug.cgi?id=1233471
  * https://bugzilla.suse.com/show_bug.cgi?id=1233476
  * https://bugzilla.suse.com/show_bug.cgi?id=1233478
  * https://bugzilla.suse.com/show_bug.cgi?id=1233479
  * https://bugzilla.suse.com/show_bug.cgi?id=1233481
  * https://bugzilla.suse.com/show_bug.cgi?id=1233484
  * https://bugzilla.suse.com/show_bug.cgi?id=1233487
  * https://bugzilla.suse.com/show_bug.cgi?id=1233490
  * https://bugzilla.suse.com/show_bug.cgi?id=1233491
  * https://bugzilla.suse.com/show_bug.cgi?id=1233524
  * https://bugzilla.suse.com/show_bug.cgi?id=1233540
  * https://bugzilla.suse.com/show_bug.cgi?id=1233548
  * https://bugzilla.suse.com/show_bug.cgi?id=1233552
  * https://bugzilla.suse.com/show_bug.cgi?id=1233553
  * https://bugzilla.suse.com/show_bug.cgi?id=1233554
  * https://bugzilla.suse.com/show_bug.cgi?id=1233555
  * https://bugzilla.suse.com/show_bug.cgi?id=1233557
  * https://bugzilla.suse.com/show_bug.cgi?id=1233560
  * https://bugzilla.suse.com/show_bug.cgi?id=1233561
  * https://bugzilla.suse.com/show_bug.cgi?id=1233564
  * https://bugzilla.suse.com/show_bug.cgi?id=1233566
  * https://bugzilla.suse.com/show_bug.cgi?id=1233567
  * https://bugzilla.suse.com/show_bug.cgi?id=1233570
  * https://bugzilla.suse.com/show_bug.cgi?id=1233572
  * https://bugzilla.suse.com/show_bug.cgi?id=1233573
  * https://bugzilla.suse.com/show_bug.cgi?id=1233577
  * https://bugzilla.suse.com/show_bug.cgi?id=1233580
  * https://bugzilla.suse.com/show_bug.cgi?id=1233640
  * https://bugzilla.suse.com/show_bug.cgi?id=1233641
  * https://bugzilla.suse.com/show_bug.cgi?id=1233721
  * https://bugzilla.suse.com/show_bug.cgi?id=1233754
  * https://bugzilla.suse.com/show_bug.cgi?id=1233756
  * https://bugzilla.suse.com/show_bug.cgi?id=1233769
  * https://bugzilla.suse.com/show_bug.cgi?id=1233771
  * https://bugzilla.suse.com/show_bug.cgi?id=1233977
  * https://bugzilla.suse.com/show_bug.cgi?id=1234009
  * https://bugzilla.suse.com/show_bug.cgi?id=1234011
  * https://bugzilla.suse.com/show_bug.cgi?id=1234012
  * https://bugzilla.suse.com/show_bug.cgi?id=1234025
  * https://bugzilla.suse.com/show_bug.cgi?id=1234034
  * https://bugzilla.suse.com/show_bug.cgi?id=1234039
  * https://bugzilla.suse.com/show_bug.cgi?id=1234040
  * https://bugzilla.suse.com/show_bug.cgi?id=1234041
  * https://bugzilla.suse.com/show_bug.cgi?id=1234042
  * https://bugzilla.suse.com/show_bug.cgi?id=1234043
  * https://bugzilla.suse.com/show_bug.cgi?id=1234044
  * https://bugzilla.suse.com/show_bug.cgi?id=1234045
  * https://bugzilla.suse.com/show_bug.cgi?id=1234046
  * https://bugzilla.suse.com/show_bug.cgi?id=1234072
  * https://bugzilla.suse.com/show_bug.cgi?id=1234081
  * https://bugzilla.suse.com/show_bug.cgi?id=1234083
  * https://bugzilla.suse.com/show_bug.cgi?id=1234087
  * https://bugzilla.suse.com/show_bug.cgi?id=1234093
  * https://bugzilla.suse.com/show_bug.cgi?id=1234098
  * https://bugzilla.suse.com/show_bug.cgi?id=1234108
  * https://bugzilla.suse.com/show_bug.cgi?id=1234121
  * https://jira.suse.com/browse/PED-10559
  * https://jira.suse.com/browse/PED-10978
  * https://jira.suse.com/browse/PED-11316
  * https://jira.suse.com/browse/PED-11442
  * https://jira.suse.com/browse/PED-11580
  * https://jira.suse.com/browse/PED-5865
  * https://jira.suse.com/browse/PED-6143
  * https://jira.suse.com/browse/PED-9899
  * https://jira.suse.com/browse/PED-9901
  * https://jira.suse.com/browse/PED-9943

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20241219/584d4b1a/attachment.htm>


More information about the sle-security-updates mailing list