SUSE-SU-2024:2190-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Tue Jun 25 12:32:30 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2190-1  
Rating: important  
References:

  * bsc#1065729
  * bsc#1141539
  * bsc#1174585
  * bsc#1181674
  * bsc#1187716
  * bsc#1190569
  * bsc#1191949
  * bsc#1192107
  * bsc#1193983
  * bsc#1194288
  * bsc#1194869
  * bsc#1196956
  * bsc#1197915
  * bsc#1200465
  * bsc#1205205
  * bsc#1207284
  * bsc#1207361
  * bsc#1207948
  * bsc#1208149
  * bsc#1209657
  * bsc#1209799
  * bsc#1209834
  * bsc#1209980
  * bsc#1210335
  * bsc#1213863
  * bsc#1214852
  * bsc#1215322
  * bsc#1215702
  * bsc#1216358
  * bsc#1216702
  * bsc#1217169
  * bsc#1217339
  * bsc#1217515
  * bsc#1218447
  * bsc#1220021
  * bsc#1220267
  * bsc#1220363
  * bsc#1220783
  * bsc#1221044
  * bsc#1221081
  * bsc#1221615
  * bsc#1221777
  * bsc#1221816
  * bsc#1221829
  * bsc#1222011
  * bsc#1222374
  * bsc#1222385
  * bsc#1222413
  * bsc#1222464
  * bsc#1222513
  * bsc#1222559
  * bsc#1222561
  * bsc#1222608
  * bsc#1222619
  * bsc#1222627
  * bsc#1222721
  * bsc#1222765
  * bsc#1222770
  * bsc#1222783
  * bsc#1222793
  * bsc#1222870
  * bsc#1222893
  * bsc#1222960
  * bsc#1222961
  * bsc#1222974
  * bsc#1222975
  * bsc#1222976
  * bsc#1223011
  * bsc#1223023
  * bsc#1223027
  * bsc#1223031
  * bsc#1223043
  * bsc#1223046
  * bsc#1223048
  * bsc#1223049
  * bsc#1223084
  * bsc#1223113
  * bsc#1223119
  * bsc#1223137
  * bsc#1223138
  * bsc#1223140
  * bsc#1223188
  * bsc#1223203
  * bsc#1223207
  * bsc#1223315
  * bsc#1223360
  * bsc#1223384
  * bsc#1223390
  * bsc#1223432
  * bsc#1223489
  * bsc#1223505
  * bsc#1223532
  * bsc#1223575
  * bsc#1223595
  * bsc#1223626
  * bsc#1223627
  * bsc#1223628
  * bsc#1223631
  * bsc#1223633
  * bsc#1223638
  * bsc#1223650
  * bsc#1223653
  * bsc#1223666
  * bsc#1223670
  * bsc#1223671
  * bsc#1223675
  * bsc#1223677
  * bsc#1223678
  * bsc#1223679
  * bsc#1223698
  * bsc#1223712
  * bsc#1223715
  * bsc#1223717
  * bsc#1223718
  * bsc#1223737
  * bsc#1223738
  * bsc#1223741
  * bsc#1223744
  * bsc#1223747
  * bsc#1223748
  * bsc#1223750
  * bsc#1223752
  * bsc#1223754
  * bsc#1223756
  * bsc#1223757
  * bsc#1223762
  * bsc#1223769
  * bsc#1223770
  * bsc#1223779
  * bsc#1223780
  * bsc#1223781
  * bsc#1223788
  * bsc#1223802
  * bsc#1223819
  * bsc#1223823
  * bsc#1223826
  * bsc#1223828
  * bsc#1223829
  * bsc#1223837
  * bsc#1223842
  * bsc#1223843
  * bsc#1223844
  * bsc#1223847
  * bsc#1223858
  * bsc#1223875
  * bsc#1223879
  * bsc#1223895
  * bsc#1223959
  * bsc#1223961
  * bsc#1223991
  * bsc#1223996
  * bsc#1224020
  * bsc#1224076
  * bsc#1224096
  * bsc#1224098
  * bsc#1224099
  * bsc#1224137
  * bsc#1224166
  * bsc#1224174
  * bsc#1224177
  * bsc#1224180
  * bsc#1224181
  * bsc#1224187
  * bsc#1224331
  * bsc#1224346
  * bsc#1224423
  * bsc#1224432
  * bsc#1224437
  * bsc#1224438
  * bsc#1224442
  * bsc#1224443
  * bsc#1224445
  * bsc#1224449
  * bsc#1224479
  * bsc#1224482
  * bsc#1224487
  * bsc#1224488
  * bsc#1224492
  * bsc#1224494
  * bsc#1224495
  * bsc#1224502
  * bsc#1224508
  * bsc#1224509
  * bsc#1224511
  * bsc#1224519
  * bsc#1224524
  * bsc#1224525
  * bsc#1224530
  * bsc#1224531
  * bsc#1224534
  * bsc#1224535
  * bsc#1224537
  * bsc#1224541
  * bsc#1224543
  * bsc#1224549
  * bsc#1224550
  * bsc#1224558
  * bsc#1224559
  * bsc#1224566
  * bsc#1224567
  * bsc#1224571
  * bsc#1224575
  * bsc#1224576
  * bsc#1224579
  * bsc#1224580
  * bsc#1224581
  * bsc#1224582
  * bsc#1224586
  * bsc#1224587
  * bsc#1224592
  * bsc#1224598
  * bsc#1224601
  * bsc#1224607
  * bsc#1224608
  * bsc#1224611
  * bsc#1224615
  * bsc#1224617
  * bsc#1224618
  * bsc#1224621
  * bsc#1224622
  * bsc#1224624
  * bsc#1224627
  * bsc#1224628
  * bsc#1224629
  * bsc#1224632
  * bsc#1224636
  * bsc#1224637
  * bsc#1224638
  * bsc#1224640
  * bsc#1224643
  * bsc#1224644
  * bsc#1224645
  * bsc#1224647
  * bsc#1224648
  * bsc#1224649
  * bsc#1224650
  * bsc#1224651
  * bsc#1224657
  * bsc#1224659
  * bsc#1224660
  * bsc#1224663
  * bsc#1224664
  * bsc#1224665
  * bsc#1224666
  * bsc#1224667
  * bsc#1224668
  * bsc#1224671
  * bsc#1224672
  * bsc#1224676
  * bsc#1224678
  * bsc#1224679
  * bsc#1224680
  * bsc#1224681
  * bsc#1224682
  * bsc#1224685
  * bsc#1224686
  * bsc#1224692
  * bsc#1224697
  * bsc#1224699
  * bsc#1224701
  * bsc#1224703
  * bsc#1224705
  * bsc#1224707
  * bsc#1224717
  * bsc#1224718
  * bsc#1224721
  * bsc#1224722
  * bsc#1224723
  * bsc#1224725
  * bsc#1224727
  * bsc#1224728
  * bsc#1224729
  * bsc#1224730
  * bsc#1224731
  * bsc#1224732
  * bsc#1224733
  * bsc#1224736
  * bsc#1224738
  * bsc#1224739
  * bsc#1224740
  * bsc#1224747
  * bsc#1224749
  * bsc#1224759
  * bsc#1224763
  * bsc#1224764
  * bsc#1224765
  * bsc#1224766
  * bsc#1224794
  * bsc#1224795
  * bsc#1224796
  * bsc#1224803
  * bsc#1224816
  * bsc#1224895
  * bsc#1224898
  * bsc#1224900
  * bsc#1224901
  * bsc#1224902
  * bsc#1224903
  * bsc#1224904
  * bsc#1224905
  * bsc#1224907
  * bsc#1224909
  * bsc#1224910
  * bsc#1224911
  * bsc#1224912
  * bsc#1224913
  * bsc#1224914
  * bsc#1224915
  * bsc#1224920
  * bsc#1224928
  * bsc#1224929
  * bsc#1224930
  * bsc#1224931
  * bsc#1224932
  * bsc#1224936
  * bsc#1224937
  * bsc#1224941
  * bsc#1224942
  * bsc#1224944
  * bsc#1224945
  * bsc#1224947
  * bsc#1224956
  * bsc#1224988
  * bsc#1224992
  * bsc#1225000
  * bsc#1225003
  * bsc#1225005
  * bsc#1225008
  * bsc#1225009
  * bsc#1225022
  * bsc#1225031
  * bsc#1225032
  * bsc#1225036
  * bsc#1225041
  * bsc#1225044
  * bsc#1225053
  * bsc#1225076
  * bsc#1225077
  * bsc#1225082
  * bsc#1225085
  * bsc#1225086
  * bsc#1225092
  * bsc#1225095
  * bsc#1225096
  * bsc#1225097
  * bsc#1225106
  * bsc#1225108
  * bsc#1225109
  * bsc#1225114
  * bsc#1225118
  * bsc#1225121
  * bsc#1225122
  * bsc#1225123
  * bsc#1225125
  * bsc#1225126
  * bsc#1225127
  * bsc#1225129
  * bsc#1225131
  * bsc#1225132
  * bsc#1225138
  * bsc#1225139
  * bsc#1225145
  * bsc#1225151
  * bsc#1225153
  * bsc#1225156
  * bsc#1225158
  * bsc#1225160
  * bsc#1225161
  * bsc#1225164
  * bsc#1225167
  * bsc#1225180
  * bsc#1225183
  * bsc#1225184
  * bsc#1225186
  * bsc#1225187
  * bsc#1225189
  * bsc#1225190
  * bsc#1225191
  * bsc#1225192
  * bsc#1225193
  * bsc#1225195
  * bsc#1225198
  * bsc#1225201
  * bsc#1225203
  * bsc#1225205
  * bsc#1225206
  * bsc#1225207
  * bsc#1225208
  * bsc#1225209
  * bsc#1225210
  * bsc#1225214
  * bsc#1225222
  * bsc#1225223
  * bsc#1225224
  * bsc#1225225
  * bsc#1225227
  * bsc#1225228
  * bsc#1225229
  * bsc#1225230
  * bsc#1225232
  * bsc#1225233
  * bsc#1225235
  * bsc#1225236
  * bsc#1225237
  * bsc#1225238
  * bsc#1225239
  * bsc#1225240
  * bsc#1225241
  * bsc#1225242
  * bsc#1225243
  * bsc#1225244
  * bsc#1225245
  * bsc#1225246
  * bsc#1225247
  * bsc#1225248
  * bsc#1225249
  * bsc#1225250
  * bsc#1225251
  * bsc#1225252
  * bsc#1225253
  * bsc#1225254
  * bsc#1225255
  * bsc#1225256
  * bsc#1225257
  * bsc#1225258
  * bsc#1225259
  * bsc#1225260
  * bsc#1225261
  * bsc#1225262
  * bsc#1225263
  * bsc#1225268
  * bsc#1225301
  * bsc#1225303
  * bsc#1225304
  * bsc#1225306
  * bsc#1225316
  * bsc#1225318
  * bsc#1225320
  * bsc#1225321
  * bsc#1225322
  * bsc#1225323
  * bsc#1225326
  * bsc#1225327
  * bsc#1225328
  * bsc#1225329
  * bsc#1225330
  * bsc#1225331
  * bsc#1225332
  * bsc#1225333
  * bsc#1225334
  * bsc#1225335
  * bsc#1225336
  * bsc#1225337
  * bsc#1225338
  * bsc#1225339
  * bsc#1225341
  * bsc#1225342
  * bsc#1225344
  * bsc#1225346
  * bsc#1225347
  * bsc#1225351
  * bsc#1225353
  * bsc#1225354
  * bsc#1225355
  * bsc#1225357
  * bsc#1225358
  * bsc#1225360
  * bsc#1225361
  * bsc#1225366
  * bsc#1225367
  * bsc#1225368
  * bsc#1225369
  * bsc#1225370
  * bsc#1225372
  * bsc#1225373
  * bsc#1225374
  * bsc#1225375
  * bsc#1225376
  * bsc#1225377
  * bsc#1225379
  * bsc#1225380
  * bsc#1225382
  * bsc#1225383
  * bsc#1225384
  * bsc#1225386
  * bsc#1225387
  * bsc#1225388
  * bsc#1225390
  * bsc#1225392
  * bsc#1225393
  * bsc#1225396
  * bsc#1225400
  * bsc#1225404
  * bsc#1225405
  * bsc#1225408
  * bsc#1225409
  * bsc#1225410
  * bsc#1225411
  * bsc#1225424
  * bsc#1225425
  * bsc#1225427
  * bsc#1225431
  * bsc#1225435
  * bsc#1225436
  * bsc#1225437
  * bsc#1225438
  * bsc#1225439
  * bsc#1225441
  * bsc#1225442
  * bsc#1225443
  * bsc#1225444
  * bsc#1225445
  * bsc#1225446
  * bsc#1225447
  * bsc#1225450
  * bsc#1225453
  * bsc#1225455
  * bsc#1225461
  * bsc#1225463
  * bsc#1225464
  * bsc#1225466
  * bsc#1225467
  * bsc#1225468
  * bsc#1225471
  * bsc#1225472
  * bsc#1225478
  * bsc#1225479
  * bsc#1225480
  * bsc#1225482
  * bsc#1225483
  * bsc#1225486
  * bsc#1225488
  * bsc#1225490
  * bsc#1225492
  * bsc#1225495
  * bsc#1225499
  * bsc#1225500
  * bsc#1225501
  * bsc#1225502
  * bsc#1225506
  * bsc#1225508
  * bsc#1225510
  * bsc#1225513
  * bsc#1225515
  * bsc#1225529
  * bsc#1225530
  * bsc#1225532
  * bsc#1225534
  * bsc#1225535
  * bsc#1225548
  * bsc#1225549
  * bsc#1225550
  * bsc#1225553
  * bsc#1225554
  * bsc#1225555
  * bsc#1225556
  * bsc#1225557
  * bsc#1225559
  * bsc#1225560
  * bsc#1225565
  * bsc#1225566
  * bsc#1225568
  * bsc#1225569
  * bsc#1225570
  * bsc#1225571
  * bsc#1225572
  * bsc#1225577
  * bsc#1225583
  * bsc#1225584
  * bsc#1225587
  * bsc#1225588
  * bsc#1225589
  * bsc#1225590
  * bsc#1225591
  * bsc#1225592
  * bsc#1225593
  * bsc#1225595
  * bsc#1225599
  * bsc#1225616
  * bsc#1225640
  * bsc#1225642
  * bsc#1225705
  * bsc#1225708
  * bsc#1225715
  * bsc#1225720
  * bsc#1225722
  * bsc#1225734
  * bsc#1225735
  * bsc#1225747
  * bsc#1225748
  * bsc#1225756
  * bsc#1225761
  * bsc#1225766
  * bsc#1225775
  * bsc#1225810
  * bsc#1225820
  * bsc#1225829
  * bsc#1225835
  * bsc#1225842
  * jsc#PED-3259
  * jsc#PED-7167

  
Cross-References:

  * CVE-2020-36788
  * CVE-2021-4148
  * CVE-2021-47358
  * CVE-2021-47359
  * CVE-2021-47360
  * CVE-2021-47361
  * CVE-2021-47362
  * CVE-2021-47363
  * CVE-2021-47364
  * CVE-2021-47365
  * CVE-2021-47366
  * CVE-2021-47367
  * CVE-2021-47368
  * CVE-2021-47369
  * CVE-2021-47370
  * CVE-2021-47371
  * CVE-2021-47372
  * CVE-2021-47373
  * CVE-2021-47374
  * CVE-2021-47375
  * CVE-2021-47376
  * CVE-2021-47378
  * CVE-2021-47379
  * CVE-2021-47380
  * CVE-2021-47381
  * CVE-2021-47382
  * CVE-2021-47383
  * CVE-2021-47384
  * CVE-2021-47385
  * CVE-2021-47386
  * CVE-2021-47387
  * CVE-2021-47388
  * CVE-2021-47389
  * CVE-2021-47390
  * CVE-2021-47391
  * CVE-2021-47392
  * CVE-2021-47393
  * CVE-2021-47394
  * CVE-2021-47395
  * CVE-2021-47396
  * CVE-2021-47397
  * CVE-2021-47398
  * CVE-2021-47399
  * CVE-2021-47400
  * CVE-2021-47401
  * CVE-2021-47402
  * CVE-2021-47403
  * CVE-2021-47404
  * CVE-2021-47405
  * CVE-2021-47406
  * CVE-2021-47407
  * CVE-2021-47408
  * CVE-2021-47409
  * CVE-2021-47410
  * CVE-2021-47412
  * CVE-2021-47413
  * CVE-2021-47414
  * CVE-2021-47415
  * CVE-2021-47416
  * CVE-2021-47417
  * CVE-2021-47418
  * CVE-2021-47419
  * CVE-2021-47420
  * CVE-2021-47421
  * CVE-2021-47422
  * CVE-2021-47423
  * CVE-2021-47424
  * CVE-2021-47425
  * CVE-2021-47426
  * CVE-2021-47427
  * CVE-2021-47428
  * CVE-2021-47429
  * CVE-2021-47430
  * CVE-2021-47431
  * CVE-2021-47433
  * CVE-2021-47434
  * CVE-2021-47435
  * CVE-2021-47436
  * CVE-2021-47437
  * CVE-2021-47438
  * CVE-2021-47439
  * CVE-2021-47440
  * CVE-2021-47441
  * CVE-2021-47442
  * CVE-2021-47443
  * CVE-2021-47444
  * CVE-2021-47445
  * CVE-2021-47446
  * CVE-2021-47447
  * CVE-2021-47448
  * CVE-2021-47449
  * CVE-2021-47450
  * CVE-2021-47451
  * CVE-2021-47452
  * CVE-2021-47453
  * CVE-2021-47454
  * CVE-2021-47455
  * CVE-2021-47456
  * CVE-2021-47457
  * CVE-2021-47458
  * CVE-2021-47459
  * CVE-2021-47460
  * CVE-2021-47461
  * CVE-2021-47462
  * CVE-2021-47463
  * CVE-2021-47464
  * CVE-2021-47465
  * CVE-2021-47466
  * CVE-2021-47467
  * CVE-2021-47468
  * CVE-2021-47469
  * CVE-2021-47470
  * CVE-2021-47471
  * CVE-2021-47472
  * CVE-2021-47473
  * CVE-2021-47474
  * CVE-2021-47475
  * CVE-2021-47476
  * CVE-2021-47477
  * CVE-2021-47478
  * CVE-2021-47479
  * CVE-2021-47480
  * CVE-2021-47481
  * CVE-2021-47482
  * CVE-2021-47483
  * CVE-2021-47484
  * CVE-2021-47485
  * CVE-2021-47486
  * CVE-2021-47488
  * CVE-2021-47489
  * CVE-2021-47490
  * CVE-2021-47491
  * CVE-2021-47492
  * CVE-2021-47493
  * CVE-2021-47494
  * CVE-2021-47495
  * CVE-2021-47496
  * CVE-2021-47497
  * CVE-2021-47498
  * CVE-2021-47499
  * CVE-2021-47500
  * CVE-2021-47501
  * CVE-2021-47502
  * CVE-2021-47503
  * CVE-2021-47504
  * CVE-2021-47505
  * CVE-2021-47506
  * CVE-2021-47507
  * CVE-2021-47508
  * CVE-2021-47509
  * CVE-2021-47510
  * CVE-2021-47511
  * CVE-2021-47512
  * CVE-2021-47513
  * CVE-2021-47514
  * CVE-2021-47516
  * CVE-2021-47518
  * CVE-2021-47520
  * CVE-2021-47521
  * CVE-2021-47522
  * CVE-2021-47523
  * CVE-2021-47524
  * CVE-2021-47525
  * CVE-2021-47526
  * CVE-2021-47527
  * CVE-2021-47528
  * CVE-2021-47529
  * CVE-2021-47530
  * CVE-2021-47531
  * CVE-2021-47532
  * CVE-2021-47533
  * CVE-2021-47534
  * CVE-2021-47535
  * CVE-2021-47536
  * CVE-2021-47537
  * CVE-2021-47540
  * CVE-2021-47541
  * CVE-2021-47542
  * CVE-2021-47544
  * CVE-2021-47548
  * CVE-2021-47549
  * CVE-2021-47550
  * CVE-2021-47551
  * CVE-2021-47552
  * CVE-2021-47553
  * CVE-2021-47554
  * CVE-2021-47555
  * CVE-2021-47556
  * CVE-2021-47557
  * CVE-2021-47558
  * CVE-2021-47559
  * CVE-2021-47560
  * CVE-2021-47562
  * CVE-2021-47563
  * CVE-2021-47564
  * CVE-2021-47565
  * CVE-2021-47569
  * CVE-2022-48633
  * CVE-2022-48662
  * CVE-2022-48669
  * CVE-2022-48689
  * CVE-2022-48691
  * CVE-2022-48699
  * CVE-2022-48705
  * CVE-2022-48708
  * CVE-2022-48709
  * CVE-2022-48710
  * CVE-2023-0160
  * CVE-2023-1829
  * CVE-2023-42755
  * CVE-2023-47233
  * CVE-2023-52586
  * CVE-2023-52591
  * CVE-2023-52618
  * CVE-2023-52642
  * CVE-2023-52643
  * CVE-2023-52644
  * CVE-2023-52646
  * CVE-2023-52650
  * CVE-2023-52653
  * CVE-2023-52654
  * CVE-2023-52655
  * CVE-2023-52656
  * CVE-2023-52657
  * CVE-2023-52659
  * CVE-2023-52660
  * CVE-2023-52661
  * CVE-2023-52662
  * CVE-2023-52664
  * CVE-2023-52669
  * CVE-2023-52671
  * CVE-2023-52674
  * CVE-2023-52676
  * CVE-2023-52678
  * CVE-2023-52679
  * CVE-2023-52680
  * CVE-2023-52683
  * CVE-2023-52685
  * CVE-2023-52686
  * CVE-2023-52690
  * CVE-2023-52691
  * CVE-2023-52692
  * CVE-2023-52693
  * CVE-2023-52694
  * CVE-2023-52696
  * CVE-2023-52698
  * CVE-2023-52699
  * CVE-2023-52702
  * CVE-2023-52703
  * CVE-2023-52705
  * CVE-2023-52707
  * CVE-2023-52708
  * CVE-2023-52730
  * CVE-2023-52731
  * CVE-2023-52732
  * CVE-2023-52733
  * CVE-2023-52736
  * CVE-2023-52738
  * CVE-2023-52739
  * CVE-2023-52740
  * CVE-2023-52741
  * CVE-2023-52742
  * CVE-2023-52743
  * CVE-2023-52744
  * CVE-2023-52745
  * CVE-2023-52746
  * CVE-2023-52747
  * CVE-2023-52753
  * CVE-2023-52754
  * CVE-2023-52756
  * CVE-2023-52757
  * CVE-2023-52759
  * CVE-2023-52763
  * CVE-2023-52764
  * CVE-2023-52766
  * CVE-2023-52773
  * CVE-2023-52774
  * CVE-2023-52777
  * CVE-2023-52781
  * CVE-2023-52788
  * CVE-2023-52789
  * CVE-2023-52791
  * CVE-2023-52795
  * CVE-2023-52796
  * CVE-2023-52798
  * CVE-2023-52799
  * CVE-2023-52800
  * CVE-2023-52803
  * CVE-2023-52804
  * CVE-2023-52805
  * CVE-2023-52806
  * CVE-2023-52807
  * CVE-2023-52808
  * CVE-2023-52809
  * CVE-2023-52810
  * CVE-2023-52811
  * CVE-2023-52814
  * CVE-2023-52815
  * CVE-2023-52816
  * CVE-2023-52817
  * CVE-2023-52818
  * CVE-2023-52819
  * CVE-2023-52821
  * CVE-2023-52825
  * CVE-2023-52826
  * CVE-2023-52832
  * CVE-2023-52833
  * CVE-2023-52834
  * CVE-2023-52838
  * CVE-2023-52840
  * CVE-2023-52841
  * CVE-2023-52844
  * CVE-2023-52847
  * CVE-2023-52851
  * CVE-2023-52853
  * CVE-2023-52854
  * CVE-2023-52855
  * CVE-2023-52856
  * CVE-2023-52858
  * CVE-2023-52860
  * CVE-2023-52861
  * CVE-2023-52864
  * CVE-2023-52865
  * CVE-2023-52867
  * CVE-2023-52868
  * CVE-2023-52870
  * CVE-2023-52871
  * CVE-2023-52872
  * CVE-2023-52873
  * CVE-2023-52875
  * CVE-2023-52876
  * CVE-2023-52877
  * CVE-2023-52878
  * CVE-2023-52880
  * CVE-2023-6531
  * CVE-2024-2201
  * CVE-2024-26597
  * CVE-2024-26643
  * CVE-2024-26679
  * CVE-2024-26692
  * CVE-2024-26698
  * CVE-2024-26700
  * CVE-2024-26715
  * CVE-2024-26739
  * CVE-2024-26742
  * CVE-2024-26748
  * CVE-2024-26758
  * CVE-2024-26764
  * CVE-2024-26775
  * CVE-2024-26777
  * CVE-2024-26778
  * CVE-2024-26788
  * CVE-2024-26791
  * CVE-2024-26801
  * CVE-2024-26822
  * CVE-2024-26828
  * CVE-2024-26829
  * CVE-2024-26838
  * CVE-2024-26839
  * CVE-2024-26840
  * CVE-2024-26846
  * CVE-2024-26859
  * CVE-2024-26870
  * CVE-2024-26874
  * CVE-2024-26876
  * CVE-2024-26877
  * CVE-2024-26880
  * CVE-2024-26889
  * CVE-2024-26894
  * CVE-2024-26900
  * CVE-2024-26907
  * CVE-2024-26915
  * CVE-2024-26916
  * CVE-2024-26919
  * CVE-2024-26920
  * CVE-2024-26921
  * CVE-2024-26922
  * CVE-2024-26925
  * CVE-2024-26928
  * CVE-2024-26929
  * CVE-2024-26930
  * CVE-2024-26931
  * CVE-2024-26933
  * CVE-2024-26934
  * CVE-2024-26935
  * CVE-2024-26937
  * CVE-2024-26938
  * CVE-2024-26939
  * CVE-2024-26940
  * CVE-2024-26943
  * CVE-2024-26957
  * CVE-2024-26958
  * CVE-2024-26964
  * CVE-2024-26974
  * CVE-2024-26977
  * CVE-2024-26979
  * CVE-2024-26984
  * CVE-2024-26988
  * CVE-2024-26989
  * CVE-2024-26994
  * CVE-2024-26996
  * CVE-2024-26997
  * CVE-2024-26999
  * CVE-2024-27000
  * CVE-2024-27001
  * CVE-2024-27004
  * CVE-2024-27008
  * CVE-2024-27028
  * CVE-2024-27037
  * CVE-2024-27042
  * CVE-2024-27045
  * CVE-2024-27047
  * CVE-2024-27051
  * CVE-2024-27052
  * CVE-2024-27053
  * CVE-2024-27054
  * CVE-2024-27059
  * CVE-2024-27072
  * CVE-2024-27073
  * CVE-2024-27074
  * CVE-2024-27075
  * CVE-2024-27076
  * CVE-2024-27077
  * CVE-2024-27078
  * CVE-2024-27388
  * CVE-2024-27393
  * CVE-2024-27395
  * CVE-2024-27396
  * CVE-2024-27398
  * CVE-2024-27399
  * CVE-2024-27400
  * CVE-2024-27401
  * CVE-2024-27405
  * CVE-2024-27410
  * CVE-2024-27412
  * CVE-2024-27413
  * CVE-2024-27416
  * CVE-2024-27417
  * CVE-2024-27419
  * CVE-2024-27431
  * CVE-2024-27435
  * CVE-2024-27436
  * CVE-2024-35789
  * CVE-2024-35791
  * CVE-2024-35796
  * CVE-2024-35799
  * CVE-2024-35801
  * CVE-2024-35804
  * CVE-2024-35806
  * CVE-2024-35809
  * CVE-2024-35811
  * CVE-2024-35812
  * CVE-2024-35813
  * CVE-2024-35815
  * CVE-2024-35817
  * CVE-2024-35821
  * CVE-2024-35822
  * CVE-2024-35823
  * CVE-2024-35825
  * CVE-2024-35828
  * CVE-2024-35829
  * CVE-2024-35830
  * CVE-2024-35833
  * CVE-2024-35845
  * CVE-2024-35847
  * CVE-2024-35849
  * CVE-2024-35851
  * CVE-2024-35852
  * CVE-2024-35854
  * CVE-2024-35860
  * CVE-2024-35861
  * CVE-2024-35862
  * CVE-2024-35863
  * CVE-2024-35864
  * CVE-2024-35865
  * CVE-2024-35866
  * CVE-2024-35867
  * CVE-2024-35868
  * CVE-2024-35869
  * CVE-2024-35870
  * CVE-2024-35872
  * CVE-2024-35875
  * CVE-2024-35877
  * CVE-2024-35878
  * CVE-2024-35879
  * CVE-2024-35885
  * CVE-2024-35887
  * CVE-2024-35895
  * CVE-2024-35901
  * CVE-2024-35904
  * CVE-2024-35905
  * CVE-2024-35907
  * CVE-2024-35912
  * CVE-2024-35914
  * CVE-2024-35915
  * CVE-2024-35922
  * CVE-2024-35924
  * CVE-2024-35930
  * CVE-2024-35932
  * CVE-2024-35933
  * CVE-2024-35935
  * CVE-2024-35936
  * CVE-2024-35938
  * CVE-2024-35939
  * CVE-2024-35940
  * CVE-2024-35943
  * CVE-2024-35944
  * CVE-2024-35947
  * CVE-2024-35950
  * CVE-2024-35951
  * CVE-2024-35952
  * CVE-2024-35955
  * CVE-2024-35959
  * CVE-2024-35963
  * CVE-2024-35964
  * CVE-2024-35965
  * CVE-2024-35966
  * CVE-2024-35967
  * CVE-2024-35969
  * CVE-2024-35973
  * CVE-2024-35976
  * CVE-2024-35978
  * CVE-2024-35982
  * CVE-2024-35984
  * CVE-2024-35989
  * CVE-2024-35990
  * CVE-2024-35998
  * CVE-2024-35999
  * CVE-2024-36006
  * CVE-2024-36007
  * CVE-2024-36012
  * CVE-2024-36014
  * CVE-2024-36015
  * CVE-2024-36016
  * CVE-2024-36026
  * CVE-2024-36029
  * CVE-2024-36032
  * CVE-2024-36880
  * CVE-2024-36893
  * CVE-2024-36896
  * CVE-2024-36897
  * CVE-2024-36906
  * CVE-2024-36918
  * CVE-2024-36924
  * CVE-2024-36926
  * CVE-2024-36928
  * CVE-2024-36931
  * CVE-2024-36938
  * CVE-2024-36940
  * CVE-2024-36941
  * CVE-2024-36942
  * CVE-2024-36944
  * CVE-2024-36947
  * CVE-2024-36950
  * CVE-2024-36952
  * CVE-2024-36955
  * CVE-2024-36959

  
CVSS scores:

  * CVE-2020-36788 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-4148 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-4148 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47358 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47359 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47360 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47361 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47362 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47363 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47364 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47365 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47366 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
  * CVE-2021-47367 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47368 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47369 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47370 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47371 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47372 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47373 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47374 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47375 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47376 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47378 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47379 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47380 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47381 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47382 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47383 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47384 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47385 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47386 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47387 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47388 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47389 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2021-47390 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2021-47391 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47392 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47393 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47394 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47395 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47396 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47397 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47398 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-47399 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47400 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47401 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47402 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47403 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47404 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2021-47405 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47406 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47407 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47408 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47409 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47410 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47412 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47413 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47414 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47415 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47416 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47417 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47418 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47419 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47420 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47421 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47422 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47423 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47424 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47425 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47426 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47427 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47428 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47429 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2021-47430 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47431 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47433 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2021-47434 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47435 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47438 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47439 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47440 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47441 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47442 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47443 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47445 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47447 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47448 ( SUSE ):  5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
  * CVE-2021-47449 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47450 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47451 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47452 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47453 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47454 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47455 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47456 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47457 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47458 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47459 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47461 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47462 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47463 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47464 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47465 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2021-47466 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47467 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2021-47468 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47469 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47470 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47471 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47472 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47473 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47474 ( SUSE ):  6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47475 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47476 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47477 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2021-47478 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47479 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47480 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47481 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47482 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47483 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47484 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47485 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47486 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47488 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47489 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47490 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47491 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47492 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47493 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47494 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47495 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47496 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47497 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47498 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47499 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47500 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47501 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47502 ( SUSE ):  7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2021-47503 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47504 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47505 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47506 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47507 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47508 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47509 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47510 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47511 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47512 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47513 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47513 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47514 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47516 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47516 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47518 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47518 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47520 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47520 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47521 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47521 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47522 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47522 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47523 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47524 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47525 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47525 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47526 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47526 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47528 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47528 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47529 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47529 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47530 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47531 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47532 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47533 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47534 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47535 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2021-47536 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2021-47537 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47537 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47540 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47540 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47541 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47541 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47542 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47542 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47544 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2021-47548 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2021-47549 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47550 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47550 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47551 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47552 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47553 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47554 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47555 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47556 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47556 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47557 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47558 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47559 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47559 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47560 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47562 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47563 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47564 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47565 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47569 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48633 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48662 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48662 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48669 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48689 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48689 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48691 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48691 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48705 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48708 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48709 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48710 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0160 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0160 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-1829 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-1829 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-42755 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2023-42755 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-47233 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-47233 ( NVD ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52586 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52591 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52618 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52642 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52643 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52644 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52646 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52650 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52653 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52654 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52656 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52657 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52659 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52660 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52661 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2023-52662 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2023-52664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52669 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52671 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52674 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52676 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52678 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52679 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52680 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52683 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52685 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52686 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52690 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52691 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52692 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52693 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52694 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52696 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52698 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52702 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52703 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2023-52705 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52707 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52708 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52730 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52731 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52732 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52733 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52736 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52738 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52739 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52740 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52741 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52742 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52743 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52744 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52745 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52746 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2023-52747 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52753 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52756 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-52757 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52763 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52764 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52773 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52773 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52774 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52777 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52781 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52788 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52789 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52795 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52798 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52799 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52803 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52804 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52805 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-52806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52806 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52807 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52809 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52814 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52815 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52817 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52818 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52819 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52821 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52825 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52832 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52834 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52838 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52840 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52844 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52847 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52853 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52856 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52858 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52860 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52861 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52865 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52867 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52868 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52870 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52871 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-52872 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52873 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52875 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52876 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52880 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6531 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6531 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-2201 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-26597 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-26597 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-26643 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26679 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26692 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26698 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26700 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26715 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26742 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26748 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26764 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26775 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26777 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26778 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26788 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26801 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26822 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26828 ( SUSE ):  7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
  * CVE-2024-26829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26838 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26839 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26840 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26846 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26870 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26874 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26876 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26877 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26880 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26894 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26900 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26907 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-26907 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26916 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26921 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26922 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26925 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26928 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26929 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26929 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26933 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26933 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26934 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26934 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26935 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26937 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26938 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26939 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26940 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26943 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26964 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26974 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26977 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26979 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-26979 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26984 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26988 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-26989 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26994 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26996 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26997 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26999 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27000 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-27001 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27004 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-27008 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-27028 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27037 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27042 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-27045 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-27047 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27051 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-27052 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27053 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-27054 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27072 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27073 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27074 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27075 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27076 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27077 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27078 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27388 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27393 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27395 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27396 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27398 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27399 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27400 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27401 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-27405 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-27410 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27412 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27413 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27416 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27417 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27419 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-27431 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27435 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27436 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35789 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35799 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35801 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35804 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35809 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35812 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35817 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35822 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-35823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35825 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35845 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35847 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35849 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-35851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35860 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35861 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35862 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35863 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35864 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35866 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35867 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35869 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35872 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35875 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
  * CVE-2024-35877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35885 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35895 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35904 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35905 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35907 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35922 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35924 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-35930 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35932 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35933 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35935 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35936 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35938 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-35939 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-35940 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-35943 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35944 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-35947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35950 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35951 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35952 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35955 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35959 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35963 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-35964 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35965 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35966 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35973 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35978 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35982 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35984 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35984 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35989 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35990 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35990 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35998 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35999 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-36006 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36007 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36012 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36015 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36016 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36026 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36029 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36032 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-36880 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
  * CVE-2024-36893 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36893 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36897 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36897 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36906 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-36918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36924 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36928 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36931 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
  * CVE-2024-36938 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36940 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-36941 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36942 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-36944 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36947 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-36950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36952 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36955 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36959 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * Basesystem Module 15-SP5
  * Development Tools Module 15-SP5
  * Legacy Module 15-SP5
  * openSUSE Leap 15.5
  * SUSE Linux Enterprise Desktop 15 SP5
  * SUSE Linux Enterprise High Availability Extension 15 SP5
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Live Patching 15-SP5
  * SUSE Linux Enterprise Micro 5.5
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Linux Enterprise Workstation Extension 15 SP5

  
  
An update that solves 557 vulnerabilities, contains two features and has 42
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
  * CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
  * CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
  * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
    filter (tcindex) (bsc#1210335).
  * CVE-2023-42755: Check user supplied offsets (bsc#1215702).
  * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
  * CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
  * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
  * CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
  * CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).
  * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
  * CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1
    (bsc#1224729).
  * CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
  * CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
  * CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config()
    (bsc#1224628).
  * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
  * CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr()
    (bsc#1225114)
  * CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
  * CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
  * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
  * CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is
    read via debugfs (bsc#1225097).
  * CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
  * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix
    garbage collector's deletion of SKB races with unix_stream_read_generic()on
    the socket that the SKB is queued on (bsc#1218447).
  * CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
  * CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with
    timeout (bsc#1221829).
  * CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error()
    (bsc#1222385).
  * CVE-2024-26692: Fixed regression in writes when non-standard maximum write
    size negotiated (bsc#1222464).
  * CVE-2024-26700: Fixed drm/amd/display: Fix MST Null Ptr for RV (bsc#1222870)
  * CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend
    (bsc#1222561).
  * CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).
  * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
  * CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)
  * CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage
    (bsc#1222770)
  * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
  * CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts
    (bsc#1223011).
  * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
  * CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
  * CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
  * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
  * CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment
    in mlx5 (bsc#1223203).
  * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
  * CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
  * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
  * CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path
    (bsc#1223390).
  * CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show()
    (bsc#1223532).
  * CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
  * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
  * CVE-2024-27042: Fixed potential out-of-bounds access in
    'amdgpu_discovery_reg_base_init()' (bsc#1223823).
  * CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
  * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
  * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
    (bsc#1224174).
  * CVE-2024-27401: Fixed user_length taken into account when fetching packet
    contents (bsc#1224181).
  * CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
  * CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr()
    (bsc#1224721)
  * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
  * CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running XDP
    program (bsc#1224718).
  * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in
    svm_register_enc_region() (bsc#1224725).
  * CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
  * CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty
    (bsc#1224638).
  * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
  * CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
  * CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
  * CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround
    (bsc#1224531).
  * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
    (bsc#1224766).
  * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
    (bsc#1224764).
  * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
    (bsc#1224763).
  * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
    (bsc#1224765,).
  * CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()
    (bsc#1224668).
  * CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
  * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
  * CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write()
    (bsc#1224678).
  * CVE-2024-35869: Guarantee refcounted children from parent session
    (bsc#1224679).
  * CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224020,
    bsc#1224672).
  * CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
  * CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems
    (bsc#1224665).
  * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
  * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()
    (bsc#1224671).
  * CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
  * CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
  * CVE-2024-35904: Fixed dereference of garbage after mount failure
    (bsc#1224494).
  * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
  * CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).
  * CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
  * CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure
    (bsc#1224535).
  * CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init
    (bsc#1224649).
  * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()
    (bsc#1224648).
  * CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr()
    (bsc#1224701).
  * CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
  * CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
  * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and
    ipv6_del_addr (bsc#1224580).
  * CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).
  * CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
    (bsc#1224575).
  * CVE-2024-35998: Fixed lock ordering potential deadlock in
    cifs_sync_mid_result (bsc#1224549).
  * CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
  * CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
  * CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
  * CVE-2024-36938: Fixed NULL pointer dereference in
    sk_psock_skb_ingress_enqueue (bsc#1225761).

The following non-security bugs were fixed:

  * 9p: explicitly deny setlease attempts (git-fixes).
  * ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
  * ACPI: disable -Wstringop-truncation (git-fixes).
  * ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
  * ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
  * admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
    (git-fixes).
  * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
    (bsc#1223384).
  * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
  * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
  * ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
  * ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
  * ALSA: line6: Zero-initialize message buffers (stable-fixes).
  * ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
  * ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
  * ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
  * ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
  * ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
  * ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
  * ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
  * ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
  * ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
  * ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
  * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
  * ata: pata_legacy: make legacy_exit() work again (git-fixes).
  * ata: sata_gemini: Check clk_enable() result (stable-fixes).
  * autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
  * Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
  * Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()
    (git-fixes).
  * Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor
    (bsc#1216358).
  * Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
  * Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
  * Bluetooth: qca: add missing firmware sanity checks (git-fixes).
  * Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
  * Bluetooth: qca: fix firmware check error path (git-fixes).
  * Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
  * Bluetooth: qca: fix NVM configuration parsing (git-fixes).
  * bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-
    fixes)
  * bpf: decouple prune and jump points (bsc#1225756).
  * bpf: fix precision backtracking instruction iteration (bsc#1225756).
  * bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
  * bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
  * bpf: mostly decouple jump history management from is_state_visited()
    (bsc#1225756).
  * bpf: remove unnecessary prune and jump points (bsc#1225756).
  * btrfs: add error messages to all unrecognized mount options (git-fixes)
  * btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
  * btrfs: export: handle invalid inode or root reference in btrfs_get_parent()
    (git-fixes)
  * btrfs: extend locking to all space_info members accesses (git-fixes)
  * btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
  * btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
  * btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
  * btrfs: fix off-by-one chunk length calculation at contains_pending_extent()
    (git-fixes)
  * btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
  * btrfs: fix silent failure when deleting root reference (git-fixes)
  * btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
  * btrfs: free exchange changeset on failures (git-fixes)
  * btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-
    fixes)
  * btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
  * btrfs: prevent copying too big compressed lzo segment (git-fixes)
  * btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
  * btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
  * btrfs: repair super block num_devices automatically (git-fixes)
  * btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling
    (git-fixes)
  * btrfs: send: ensure send_fd is writable (git-fixes)
  * btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-
    fixes)
  * btrfs: send: in case of IO error log it (git-fixes)
  * btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
  * btrfs: tree-checker: check item_size for dev_item (git-fixes)
  * btrfs: tree-checker: check item_size for inode_item (git-fixes)
  * cifs: account for primary channel in the interface list (bsc#1224020).
  * cifs: cifs_chan_is_iface_active should be called with chan_lock held
    (bsc#1224020).
  * cifs: distribute channels across interfaces based on speed (bsc#1224020).
  * cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
  * cifs: failure to add channel on iface should bump up weight (git-fixes,
    bsc#1224020).
  * cifs: fix charset issue in reconnection (bsc#1224020).
  * cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
  * cifs: handle cases where a channel is closed (bsc#1224020).
  * cifs: handle cases where multiple sessions share connection (bsc#1224020).
  * cifs: reconnect work should have reference on server struct (bsc#1224020).
  * clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
  * clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
  * counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-
    fixes).
  * counter: stm32-timer-cnt: Provide defines for slave mode selection (git-
    fixes).
  * cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
  * cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
  * cpumask: Add for_each_cpu_from() (bsc#1225053).
  * crypto: bcm - Fix pointer arithmetic (git-fixes).
  * crypto: ccp - drop platform ifdef checks (git-fixes).
  * crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
  * crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
  * crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
  * crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
  * dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
  * dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
  * dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11
    users (git-fixes).
  * dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
  * docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
  * drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
  * drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
  * drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
  * drm/amd/display: Fix potential index out of bounds in color transformation
    function (git-fixes).
  * drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
  * drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
  * drm/amdgpu: Refine IB schedule error logging (stable-fixes).
  * drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-
    fixes).
  * drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
  * drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-
    fixes).
  * drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-
    fixes).
  * drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-
    fixes).
  * drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-
    fixes).
  * drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-
    fixes).
  * drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-
    fixes).
  * drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-
    fixes).
  * drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
  * drm/connector: Add \n to message about demoting connector force-probes (git-
    fixes).
  * drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
  * drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
  * drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
  * drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
  * drm/meson: dw-hdmi: power up phy on device init (git-fixes).
  * drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
  * drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
  * drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
  * drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk
    (git-fixes).
  * drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
  * drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not
    assert (git-fixes).
  * drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found
    (git-fixes).
  * drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector
    (git-fixes).
  * drm: vc4: Fix possible null pointer dereference (git-fixes).
  * dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
  * dyndbg: fix old BUG_ON in >control parser (stable-fixes).
  * efi: libstub: only free priv.runtime_map when allocated (git-fixes).
  * extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
  * fail_function: fix wrong use of fei_attr_remove().
  * fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
  * fbdev: shmobile: fix snprintf truncation (git-fixes).
  * fbdev: sisfb: hide unused variables (git-fixes).
  * firewire: ohci: mask bus reset interrupts between ISR and bottom half
    (stable-fixes).
  * firmware: dmi-id: add a release callback function (git-fixes).
  * firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
  * fs/9p: drop inodes immediately on non-.L too (git-fixes).
  * fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
  * fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
  * gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
  * gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
  * gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
  * HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
  * hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-
    fixes).
  * hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-
    fixes).
  * hwmon: (corsair-cpro) Use complete_all() instead of complete() in
    ccp_raw_event() (git-fixes).
  * hwmon: (lm70) fix links in doc and comments (git-fixes).
  * hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
  * i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame
    (git-fixes).
  * i3c: master: svc: fix invalidate IBI type and miss call client IBI handler
    (git-fixes).
  * IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
  * idpf: extend tx watchdog timeout (bsc#1224137).
  * iio: core: Leave private pointer NULL when no private data supplied (git-
    fixes).
  * iio: pressure: dps310: support negative temperature values (git-fixes).
  * Input: cyapa - add missing input core locking to suspend/resume functions
    (git-fixes).
  * Input: ims-pcu - fix printf string overflow (git-fixes).
  * Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
  * iomap: Fix inline extent handling in iomap_readpage (git-fixes)
  * iomap: iomap: fix memory corruption when recording errors during writeback
    (git-fixes)
  * iomap: Support partial direct I/O on user copy failures (git-fixes)
  * iommu/dma: Force swiotlb_max_mapping_size on an untrusted device
    (bsc#1224331)
  * io_uring/unix: drop usage of io_uring socket (git-fixes).
  * irqchip/gic-v3-its: Prevent double free on error (git-fixes).
  * jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
  * kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
  * kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes
    bsc#1223959)
  * KEYS: trusted: Do not use WARN when encode fails (git-fixes).
  * KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
  * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
    bsc#1224794).
  * leds: pwm: Disable PWM when going to suspend (git-fixes).
  * libsubcmd: Fix parse-options memory leak (git-fixes).
  * locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
  * media: atomisp: ssh_css: Fix a null-pointer dereference in
    load_video_binaries (git-fixes).
  * media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
  * media: mc: mark the media devnode as registered from the, start (git-fixes).
  * media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
  * media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
  * mei: me: add lunar lake point M DID (stable-fixes).
  * mfd: intel-lpss: Revert "Add missing check for platform_get_resource" (git-
    fixes).
  * mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-
    fixes).
  * mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
  * mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
  * mlxbf_gige: Fix intermittent no ip issue (git-fixes).
  * mlxbf_gige: stop PHY during open() error paths (git-fixes).
  * mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
  * mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
  * Move upstreamed patches into sorted section
  * mtd: core: Report error if first mtd_otp_size() call fails in
    mtd_otp_nvmem_add() (git-fixes).
  * mtd: rawnand: hynix: fixed typo (git-fixes).
  * net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes
    bsc#1223959)
  * netfilter: nf_tables: bail out early if hardware offload is not supported
    (git-fixes bsc#1223961)
  * net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
  * net: nfc: remove inappropriate attrs check (stable-fixes).
  * net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
  * net: usb: ax88179_178a: fix link status when link is set to down/up (git-
    fixes).
  * net:usb:qmi_wwan: support Rolling modules (stable-fixes).
  * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
  * net: usb: sr9700: stop lying about skb->truesize (git-fixes).
  * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
    (bsc#1223360).
  * nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-
    fixes).
  * nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
  * nilfs2: fix out-of-range warning (git-fixes).
  * nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
  * nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
  * nilfs2: make superblock data array index computation sparse friendly (git-
    fixes).
  * nvme: ensure disabling pairs with unquiesce (bsc#1224534).
  * nvme: fix miss command type check (git-fixes).
  * nvme: fix multipath batched completion accounting (git-fixes).
  * nvme-multipath: fix io accounting on failover (git-fixes).
  * nvmet: fix ns enable/disable possible hang (git-fixes).
  * PCI: dwc: Detect iATU settings after getting "addr_space" resource (git-
    fixes).
  * PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host
    (git-fixes).
  * PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
  * PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
  * PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
  * PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
  * PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
  * pinctrl: armada-37xx: remove an unused variable (git-fixes).
  * pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
  * pinctrl: core: handle radix_tree_insert() errors in
    pinctrl_register_one_pin() (stable-fixes).
  * pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
  * pinctrl/meson: fix typo in PDM's pin name (git-fixes).
  * pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-
    fixes).
  * platform/x86/intel-uncore-freq: Do not present root domain on error (git-
    fixes).
  * platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-
    fixes).
  * powerpc/eeh: Permanently disable the removed device (bsc#1223991
    ltc#205740).
  * powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991
    ltc#205740).
  * powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
  * powerpc/powernv: Add a null pointer check in opal_event_init()
    (bsc#1065729).
  * powerpc/pseries/lparcfg: drop error message from guest name lookup
    (bsc#1187716 ltc#193451 git-fixes).
  * powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
    (bsc#1220783).
  * powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
  * powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
  * power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
  * ppdev: Add an error check in register_device (git-fixes).
  * printk: Update @console_may_schedule in console_trylock_spinning()
    (bsc#1225616).
  * qibfs: fix dentry leak (git-fixes)
  * RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-
    fixes)
  * RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
  * RDMA/hns: Fix GMV table pagesize (git-fixes)
  * RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
  * RDMA/hns: Fix UAF for cq async event (git-fixes)
  * RDMA/hns: Modify the print level of CQE error (git-fixes)
  * RDMA/hns: Use complete parentheses in macros (git-fixes)
  * RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
  * RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
  * RDMA/mlx5: Fix port number for counter query in multi-port configuration
    (git-fixes)
  * RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
  * RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
  * RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
  * RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)
  * RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
  * RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
  * regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
  * regulator: core: fix debugfs creation regression (git-fixes).
  * regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
  * remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
  * Revert "cifs: reconnect work should have reference on server struct" (git-
    fixes, bsc#1224020).
  * Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).
  * ring-buffer: Fix a race between readers and resize checks (git-fixes).
  * s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
  * s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
  * s390/cpum_cf: make crypto counters upward compatible across machine types
    (bsc#1224346).
  * s390/ipl: Fix incorrect initialization of len fields in nvme reipl block
    (git-fixes bsc#1225139).
  * s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes
    bsc#1225138).
  * sched/topology: Optimize topology_span_sane() (bsc#1225053).
  * scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
  * scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
  * scsi: core: Consult supported VPD page list prior to fetching page (git-
    fixes).
  * scsi: core: Fix unremoved procfs host directory regression (git-fixes).
  * scsi: csiostor: Avoid function pointer casts (git-fixes).
  * scsi: libfc: Do not schedule abort twice (git-fixes).
  * scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
  * scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
  * scsi: lpfc: Change default logging level for unsolicited CT MIB commands
    (bsc#1225842).
  * scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
  * scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading
    (bsc#1225842).
  * scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
  * scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list
    (bsc#1225842).
  * scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
  * scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
  * scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-
    fixes).
  * scsi: mylex: Fix sysfs buffer lengths (git-fixes).
  * scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
  * scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-
    fixes).
  * selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
  * serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
  * serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-
    fixes).
  * serial: max3100: Fix bitwise types (git-fixes).
  * serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-
    fixes).
  * serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-
    fixes).
  * serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler
    (git-fixes).
  * serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
  * smb3: show beginning time for per share stats (bsc#1224020).
  * smb: client: ensure to try all targets when finding nested links
    (bsc#1224020).
  * smb: client: fix mount when dns_resolver key is not available (git-fixes,
    bsc#1224020).
  * smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
  * smb: client: get rid of dfs naming in automount code (bsc#1224020).
  * smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
  * smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
  * smb: client: remove extra @chan_count check in __cifs_put_smb_ses()
    (bsc#1224020).
  * smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
  * soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
  * soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
  * Sort recent BHI patches
  * speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
  * spmi: Add a check for remove callback when removing a SPMI driver (git-
    fixes).
  * spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
  * swiotlb: extend buffer pre-padding to alloc_align_mask if necessary
    (bsc#1224331).
  * swiotlb: Fix alignment checks when both allocation and DMA masks are
    (bsc#1224331)
  * swiotlb: Fix double-allocation of slots due to broken alignment
    (bsc#1224331)
  * swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc()
    (bsc#1224331)
  * sysv: do not call sb_bread() with pointers_lock held (git-fixes).
  * thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
  * tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
  * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer
    (bsc#1225535)
  * tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
    (git-fixes).
  * tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
  * tracing: hide unused ftrace_event_id_fops (git-fixes).
  * tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
  * tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
  * usb: aqc111: stop lying about skb->truesize (git-fixes).
  * USB: core: Add hub_get() and hub_put() routines (git-fixes).
  * USB: core: Fix access violation during port device removal (git-fixes).
  * USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes).
  * usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
  * usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
  * usb: typec: tipd: fix event checking for tps6598x (git-fixes).
  * usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
  * VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
  * VMCI: Fix possible memcpy() run-time warning in
    vmci_datagram_invoke_guest_handler() (stable-fixes).
  * vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-
    fixes).
  * watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-
    fixes).
  * watchdog: ixp4xx: Make sure restart always works (git-fixes).
  * watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin
    (git-fixes).
  * wifi: ar5523: enable proper endpoint verification (git-fixes).
  * wifi: ath10k: Fix an error code problem in
    ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
  * wifi: ath10k: poll service ready message before failing (git-fixes).
  * wifi: ath10k: populate board data for WCN3990 (git-fixes).
  * wifi: ath11k: do not force enable power save on non-running vdevs (git-
    fixes).
  * wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
  * wifi: carl9170: re-fix fortified-memset warning (git-fixes).
  * wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
  * wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
  * wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
  * x86/boot: Ignore NMIs during very early boot (git-fixes).
  * x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
  * x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-
    fixes).
  * x86/bugs: Fix BHI documentation (git-fixes).
  * x86/bugs: Fix BHI handling of RRSBA (git-fixes).
  * x86/bugs: Fix BHI retpoline check (git-fixes).
  * x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
  * x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-
    fixes).
  * x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-
    fixes).
  * x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with
    CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
  * x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
  * x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
  * x86/lib: Fix overflow when counting digits (git-fixes).
  * x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
  * x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
  * x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for
    !SRSO (git-fixes).
  * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-
    fixes).
  * x86/sme: Fix memory encryption setting if enabled by default and not
    overridden (git-fixes).
  * x86/tdx: Preserve shared bit on mprotect() (git-fixes).
  * xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-
    fixes).
  * xfs: Fix false ENOSPC when performing direct write on a delalloc extent in
    cow fork (git-fixes).
  * xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
  * xfs: fix inode reservation space for removing transaction (git-fixes).
  * xfs: shrink failure needs to hold AGI buffer (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * Development Tools Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2190=1

  * Legacy Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-2190=1

  * SUSE Linux Enterprise Live Patching 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2190=1  
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

  * SUSE Linux Enterprise High Availability Extension 15 SP5  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-2190=1

  * SUSE Linux Enterprise Workstation Extension 15 SP5  
    zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-2190=1

  * openSUSE Leap 15.5  
    zypper in -t patch SUSE-2024-2190=1 openSUSE-SLE-15.5-2024-2190=1

  * SUSE Linux Enterprise Micro 5.5  
    zypper in -t patch SUSE-SLE-Micro-5.5-2024-2190=1

  * Basesystem Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2190=1

## Package List:

  * Development Tools Module 15-SP5 (noarch nosrc)
    * kernel-docs-5.14.21-150500.55.68.1
  * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
    * kernel-syms-5.14.21-150500.55.68.1
    * kernel-obs-build-5.14.21-150500.55.68.1
    * kernel-obs-build-debugsource-5.14.21-150500.55.68.1
  * Development Tools Module 15-SP5 (noarch)
    * kernel-source-5.14.21-150500.55.68.1
  * Legacy Module 15-SP5 (nosrc)
    * kernel-default-5.14.21-150500.55.68.1
  * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
    * reiserfs-kmp-default-5.14.21-150500.55.68.1
    * kernel-default-debugsource-5.14.21-150500.55.68.1
    * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * kernel-default-debuginfo-5.14.21-150500.55.68.1
  * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
    * kernel-default-5.14.21-150500.55.68.1
  * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
    * kernel-livepatch-SLE15-SP5_Update_15-debugsource-1-150500.11.3.1
    * kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
    * kernel-default-livepatch-devel-5.14.21-150500.55.68.1
    * kernel-default-debuginfo-5.14.21-150500.55.68.1
    * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-1-150500.11.3.1
    * kernel-default-debugsource-5.14.21-150500.55.68.1
    * kernel-default-livepatch-5.14.21-150500.55.68.1
  * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
    s390x x86_64)
    * gfs2-kmp-default-5.14.21-150500.55.68.1
    * kernel-default-debuginfo-5.14.21-150500.55.68.1
    * cluster-md-kmp-default-5.14.21-150500.55.68.1
    * ocfs2-kmp-default-5.14.21-150500.55.68.1
    * gfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * dlm-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * kernel-default-debugsource-5.14.21-150500.55.68.1
    * dlm-kmp-default-5.14.21-150500.55.68.1
    * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.68.1
  * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
    * kernel-default-5.14.21-150500.55.68.1
  * SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc)
    * kernel-default-5.14.21-150500.55.68.1
  * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
    * kernel-default-extra-debuginfo-5.14.21-150500.55.68.1
    * kernel-default-debugsource-5.14.21-150500.55.68.1
    * kernel-default-extra-5.14.21-150500.55.68.1
    * kernel-default-debuginfo-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (noarch nosrc)
    * kernel-docs-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (noarch)
    * kernel-macros-5.14.21-150500.55.68.1
    * kernel-docs-html-5.14.21-150500.55.68.1
    * kernel-devel-5.14.21-150500.55.68.1
    * kernel-source-5.14.21-150500.55.68.1
    * kernel-source-vanilla-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (nosrc ppc64le x86_64)
    * kernel-debug-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (ppc64le x86_64)
    * kernel-debug-debugsource-5.14.21-150500.55.68.1
    * kernel-debug-devel-5.14.21-150500.55.68.1
    * kernel-debug-debuginfo-5.14.21-150500.55.68.1
    * kernel-debug-livepatch-devel-5.14.21-150500.55.68.1
    * kernel-debug-devel-debuginfo-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (x86_64)
    * kernel-default-vdso-5.14.21-150500.55.68.1
    * kernel-debug-vdso-debuginfo-5.14.21-150500.55.68.1
    * kernel-debug-vdso-5.14.21-150500.55.68.1
    * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.68.1
    * kernel-kvmsmall-vdso-5.14.21-150500.55.68.1
    * kernel-default-vdso-debuginfo-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
    * kernel-default-base-rebuild-5.14.21-150500.55.68.1.150500.6.31.1
    * kernel-kvmsmall-debuginfo-5.14.21-150500.55.68.1
    * kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.68.1
    * kernel-kvmsmall-debugsource-5.14.21-150500.55.68.1
    * kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
    * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.68.1
    * kernel-kvmsmall-devel-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
    * kernel-default-extra-debuginfo-5.14.21-150500.55.68.1
    * cluster-md-kmp-default-5.14.21-150500.55.68.1
    * kernel-default-devel-5.14.21-150500.55.68.1
    * gfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * kernel-obs-build-5.14.21-150500.55.68.1
    * kernel-default-debugsource-5.14.21-150500.55.68.1
    * kernel-default-livepatch-5.14.21-150500.55.68.1
    * kernel-syms-5.14.21-150500.55.68.1
    * kernel-default-optional-debuginfo-5.14.21-150500.55.68.1
    * kernel-default-debuginfo-5.14.21-150500.55.68.1
    * kernel-default-extra-5.14.21-150500.55.68.1
    * kernel-default-livepatch-devel-5.14.21-150500.55.68.1
    * kselftests-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * kernel-obs-build-debugsource-5.14.21-150500.55.68.1
    * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * kernel-default-devel-debuginfo-5.14.21-150500.55.68.1
    * dlm-kmp-default-5.14.21-150500.55.68.1
    * kselftests-kmp-default-5.14.21-150500.55.68.1
    * kernel-default-optional-5.14.21-150500.55.68.1
    * ocfs2-kmp-default-5.14.21-150500.55.68.1
    * kernel-obs-qa-5.14.21-150500.55.68.1
    * reiserfs-kmp-default-5.14.21-150500.55.68.1
    * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * gfs2-kmp-default-5.14.21-150500.55.68.1
    * dlm-kmp-default-debuginfo-5.14.21-150500.55.68.1
    * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
    * kernel-kvmsmall-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (ppc64le s390x x86_64)
    * kernel-livepatch-SLE15-SP5_Update_15-debugsource-1-150500.11.3.1
    * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-1-150500.11.3.1
    * kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
  * openSUSE Leap 15.5 (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (s390x)
    * kernel-zfcpdump-debuginfo-5.14.21-150500.55.68.1
    * kernel-zfcpdump-debugsource-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (nosrc)
    * dtb-aarch64-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (aarch64)
    * kernel-64kb-optional-debuginfo-5.14.21-150500.55.68.1
    * reiserfs-kmp-64kb-5.14.21-150500.55.68.1
    * kernel-64kb-optional-5.14.21-150500.55.68.1
    * dlm-kmp-64kb-5.14.21-150500.55.68.1
    * dtb-apple-5.14.21-150500.55.68.1
    * dtb-lg-5.14.21-150500.55.68.1
    * dtb-broadcom-5.14.21-150500.55.68.1
    * dtb-amd-5.14.21-150500.55.68.1
    * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
    * dtb-nvidia-5.14.21-150500.55.68.1
    * kernel-64kb-debuginfo-5.14.21-150500.55.68.1
    * dtb-renesas-5.14.21-150500.55.68.1
    * kernel-64kb-devel-debuginfo-5.14.21-150500.55.68.1
    * dtb-sprd-5.14.21-150500.55.68.1
    * dtb-arm-5.14.21-150500.55.68.1
    * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
    * dtb-xilinx-5.14.21-150500.55.68.1
    * dtb-apm-5.14.21-150500.55.68.1
    * dtb-hisilicon-5.14.21-150500.55.68.1
    * gfs2-kmp-64kb-5.14.21-150500.55.68.1
    * dtb-rockchip-5.14.21-150500.55.68.1
    * kselftests-kmp-64kb-5.14.21-150500.55.68.1
    * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
    * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
    * kernel-64kb-extra-5.14.21-150500.55.68.1
    * cluster-md-kmp-64kb-5.14.21-150500.55.68.1
    * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
    * dtb-altera-5.14.21-150500.55.68.1
    * dtb-qcom-5.14.21-150500.55.68.1
    * dtb-socionext-5.14.21-150500.55.68.1
    * kernel-64kb-devel-5.14.21-150500.55.68.1
    * dtb-mediatek-5.14.21-150500.55.68.1
    * dtb-marvell-5.14.21-150500.55.68.1
    * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
    * kernel-64kb-debugsource-5.14.21-150500.55.68.1
    * kernel-64kb-livepatch-devel-5.14.21-150500.55.68.1
    * dtb-allwinner-5.14.21-150500.55.68.1
    * dtb-cavium-5.14.21-150500.55.68.1
    * dtb-amlogic-5.14.21-150500.55.68.1
    * ocfs2-kmp-64kb-5.14.21-150500.55.68.1
    * kernel-64kb-extra-debuginfo-5.14.21-150500.55.68.1
    * dtb-amazon-5.14.21-150500.55.68.1
    * dtb-freescale-5.14.21-150500.55.68.1
    * dtb-exynos-5.14.21-150500.55.68.1
  * openSUSE Leap 15.5 (aarch64 nosrc)
    * kernel-64kb-5.14.21-150500.55.68.1
  * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150500.55.68.1
  * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
  * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150500.55.68.1
    * kernel-default-debuginfo-5.14.21-150500.55.68.1
  * Basesystem Module 15-SP5 (aarch64 nosrc)
    * kernel-64kb-5.14.21-150500.55.68.1
  * Basesystem Module 15-SP5 (aarch64)
    * kernel-64kb-debugsource-5.14.21-150500.55.68.1
    * kernel-64kb-devel-debuginfo-5.14.21-150500.55.68.1
    * kernel-64kb-devel-5.14.21-150500.55.68.1
    * kernel-64kb-debuginfo-5.14.21-150500.55.68.1
  * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-5.14.21-150500.55.68.1
  * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
    * kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
  * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150500.55.68.1
    * kernel-default-debugsource-5.14.21-150500.55.68.1
    * kernel-default-devel-5.14.21-150500.55.68.1
    * kernel-default-debuginfo-5.14.21-150500.55.68.1
  * Basesystem Module 15-SP5 (noarch)
    * kernel-macros-5.14.21-150500.55.68.1
    * kernel-devel-5.14.21-150500.55.68.1
  * Basesystem Module 15-SP5 (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150500.55.68.1
  * Basesystem Module 15-SP5 (s390x)
    * kernel-zfcpdump-debuginfo-5.14.21-150500.55.68.1
    * kernel-zfcpdump-debugsource-5.14.21-150500.55.68.1

## References:

  * https://www.suse.com/security/cve/CVE-2020-36788.html
  * https://www.suse.com/security/cve/CVE-2021-4148.html
  * https://www.suse.com/security/cve/CVE-2021-47358.html
  * https://www.suse.com/security/cve/CVE-2021-47359.html
  * https://www.suse.com/security/cve/CVE-2021-47360.html
  * https://www.suse.com/security/cve/CVE-2021-47361.html
  * https://www.suse.com/security/cve/CVE-2021-47362.html
  * https://www.suse.com/security/cve/CVE-2021-47363.html
  * https://www.suse.com/security/cve/CVE-2021-47364.html
  * https://www.suse.com/security/cve/CVE-2021-47365.html
  * https://www.suse.com/security/cve/CVE-2021-47366.html
  * https://www.suse.com/security/cve/CVE-2021-47367.html
  * https://www.suse.com/security/cve/CVE-2021-47368.html
  * https://www.suse.com/security/cve/CVE-2021-47369.html
  * https://www.suse.com/security/cve/CVE-2021-47370.html
  * https://www.suse.com/security/cve/CVE-2021-47371.html
  * https://www.suse.com/security/cve/CVE-2021-47372.html
  * https://www.suse.com/security/cve/CVE-2021-47373.html
  * https://www.suse.com/security/cve/CVE-2021-47374.html
  * https://www.suse.com/security/cve/CVE-2021-47375.html
  * https://www.suse.com/security/cve/CVE-2021-47376.html
  * https://www.suse.com/security/cve/CVE-2021-47378.html
  * https://www.suse.com/security/cve/CVE-2021-47379.html
  * https://www.suse.com/security/cve/CVE-2021-47380.html
  * https://www.suse.com/security/cve/CVE-2021-47381.html
  * https://www.suse.com/security/cve/CVE-2021-47382.html
  * https://www.suse.com/security/cve/CVE-2021-47383.html
  * https://www.suse.com/security/cve/CVE-2021-47384.html
  * https://www.suse.com/security/cve/CVE-2021-47385.html
  * https://www.suse.com/security/cve/CVE-2021-47386.html
  * https://www.suse.com/security/cve/CVE-2021-47387.html
  * https://www.suse.com/security/cve/CVE-2021-47388.html
  * https://www.suse.com/security/cve/CVE-2021-47389.html
  * https://www.suse.com/security/cve/CVE-2021-47390.html
  * https://www.suse.com/security/cve/CVE-2021-47391.html
  * https://www.suse.com/security/cve/CVE-2021-47392.html
  * https://www.suse.com/security/cve/CVE-2021-47393.html
  * https://www.suse.com/security/cve/CVE-2021-47394.html
  * https://www.suse.com/security/cve/CVE-2021-47395.html
  * https://www.suse.com/security/cve/CVE-2021-47396.html
  * https://www.suse.com/security/cve/CVE-2021-47397.html
  * https://www.suse.com/security/cve/CVE-2021-47398.html
  * https://www.suse.com/security/cve/CVE-2021-47399.html
  * https://www.suse.com/security/cve/CVE-2021-47400.html
  * https://www.suse.com/security/cve/CVE-2021-47401.html
  * https://www.suse.com/security/cve/CVE-2021-47402.html
  * https://www.suse.com/security/cve/CVE-2021-47403.html
  * https://www.suse.com/security/cve/CVE-2021-47404.html
  * https://www.suse.com/security/cve/CVE-2021-47405.html
  * https://www.suse.com/security/cve/CVE-2021-47406.html
  * https://www.suse.com/security/cve/CVE-2021-47407.html
  * https://www.suse.com/security/cve/CVE-2021-47408.html
  * https://www.suse.com/security/cve/CVE-2021-47409.html
  * https://www.suse.com/security/cve/CVE-2021-47410.html
  * https://www.suse.com/security/cve/CVE-2021-47412.html
  * https://www.suse.com/security/cve/CVE-2021-47413.html
  * https://www.suse.com/security/cve/CVE-2021-47414.html
  * https://www.suse.com/security/cve/CVE-2021-47415.html
  * https://www.suse.com/security/cve/CVE-2021-47416.html
  * https://www.suse.com/security/cve/CVE-2021-47417.html
  * https://www.suse.com/security/cve/CVE-2021-47418.html
  * https://www.suse.com/security/cve/CVE-2021-47419.html
  * https://www.suse.com/security/cve/CVE-2021-47420.html
  * https://www.suse.com/security/cve/CVE-2021-47421.html
  * https://www.suse.com/security/cve/CVE-2021-47422.html
  * https://www.suse.com/security/cve/CVE-2021-47423.html
  * https://www.suse.com/security/cve/CVE-2021-47424.html
  * https://www.suse.com/security/cve/CVE-2021-47425.html
  * https://www.suse.com/security/cve/CVE-2021-47426.html
  * https://www.suse.com/security/cve/CVE-2021-47427.html
  * https://www.suse.com/security/cve/CVE-2021-47428.html
  * https://www.suse.com/security/cve/CVE-2021-47429.html
  * https://www.suse.com/security/cve/CVE-2021-47430.html
  * https://www.suse.com/security/cve/CVE-2021-47431.html
  * https://www.suse.com/security/cve/CVE-2021-47433.html
  * https://www.suse.com/security/cve/CVE-2021-47434.html
  * https://www.suse.com/security/cve/CVE-2021-47435.html
  * https://www.suse.com/security/cve/CVE-2021-47436.html
  * https://www.suse.com/security/cve/CVE-2021-47437.html
  * https://www.suse.com/security/cve/CVE-2021-47438.html
  * https://www.suse.com/security/cve/CVE-2021-47439.html
  * https://www.suse.com/security/cve/CVE-2021-47440.html
  * https://www.suse.com/security/cve/CVE-2021-47441.html
  * https://www.suse.com/security/cve/CVE-2021-47442.html
  * https://www.suse.com/security/cve/CVE-2021-47443.html
  * https://www.suse.com/security/cve/CVE-2021-47444.html
  * https://www.suse.com/security/cve/CVE-2021-47445.html
  * https://www.suse.com/security/cve/CVE-2021-47446.html
  * https://www.suse.com/security/cve/CVE-2021-47447.html
  * https://www.suse.com/security/cve/CVE-2021-47448.html
  * https://www.suse.com/security/cve/CVE-2021-47449.html
  * https://www.suse.com/security/cve/CVE-2021-47450.html
  * https://www.suse.com/security/cve/CVE-2021-47451.html
  * https://www.suse.com/security/cve/CVE-2021-47452.html
  * https://www.suse.com/security/cve/CVE-2021-47453.html
  * https://www.suse.com/security/cve/CVE-2021-47454.html
  * https://www.suse.com/security/cve/CVE-2021-47455.html
  * https://www.suse.com/security/cve/CVE-2021-47456.html
  * https://www.suse.com/security/cve/CVE-2021-47457.html
  * https://www.suse.com/security/cve/CVE-2021-47458.html
  * https://www.suse.com/security/cve/CVE-2021-47459.html
  * https://www.suse.com/security/cve/CVE-2021-47460.html
  * https://www.suse.com/security/cve/CVE-2021-47461.html
  * https://www.suse.com/security/cve/CVE-2021-47462.html
  * https://www.suse.com/security/cve/CVE-2021-47463.html
  * https://www.suse.com/security/cve/CVE-2021-47464.html
  * https://www.suse.com/security/cve/CVE-2021-47465.html
  * https://www.suse.com/security/cve/CVE-2021-47466.html
  * https://www.suse.com/security/cve/CVE-2021-47467.html
  * https://www.suse.com/security/cve/CVE-2021-47468.html
  * https://www.suse.com/security/cve/CVE-2021-47469.html
  * https://www.suse.com/security/cve/CVE-2021-47470.html
  * https://www.suse.com/security/cve/CVE-2021-47471.html
  * https://www.suse.com/security/cve/CVE-2021-47472.html
  * https://www.suse.com/security/cve/CVE-2021-47473.html
  * https://www.suse.com/security/cve/CVE-2021-47474.html
  * https://www.suse.com/security/cve/CVE-2021-47475.html
  * https://www.suse.com/security/cve/CVE-2021-47476.html
  * https://www.suse.com/security/cve/CVE-2021-47477.html
  * https://www.suse.com/security/cve/CVE-2021-47478.html
  * https://www.suse.com/security/cve/CVE-2021-47479.html
  * https://www.suse.com/security/cve/CVE-2021-47480.html
  * https://www.suse.com/security/cve/CVE-2021-47481.html
  * https://www.suse.com/security/cve/CVE-2021-47482.html
  * https://www.suse.com/security/cve/CVE-2021-47483.html
  * https://www.suse.com/security/cve/CVE-2021-47484.html
  * https://www.suse.com/security/cve/CVE-2021-47485.html
  * https://www.suse.com/security/cve/CVE-2021-47486.html
  * https://www.suse.com/security/cve/CVE-2021-47488.html
  * https://www.suse.com/security/cve/CVE-2021-47489.html
  * https://www.suse.com/security/cve/CVE-2021-47490.html
  * https://www.suse.com/security/cve/CVE-2021-47491.html
  * https://www.suse.com/security/cve/CVE-2021-47492.html
  * https://www.suse.com/security/cve/CVE-2021-47493.html
  * https://www.suse.com/security/cve/CVE-2021-47494.html
  * https://www.suse.com/security/cve/CVE-2021-47495.html
  * https://www.suse.com/security/cve/CVE-2021-47496.html
  * https://www.suse.com/security/cve/CVE-2021-47497.html
  * https://www.suse.com/security/cve/CVE-2021-47498.html
  * https://www.suse.com/security/cve/CVE-2021-47499.html
  * https://www.suse.com/security/cve/CVE-2021-47500.html
  * https://www.suse.com/security/cve/CVE-2021-47501.html
  * https://www.suse.com/security/cve/CVE-2021-47502.html
  * https://www.suse.com/security/cve/CVE-2021-47503.html
  * https://www.suse.com/security/cve/CVE-2021-47504.html
  * https://www.suse.com/security/cve/CVE-2021-47505.html
  * https://www.suse.com/security/cve/CVE-2021-47506.html
  * https://www.suse.com/security/cve/CVE-2021-47507.html
  * https://www.suse.com/security/cve/CVE-2021-47508.html
  * https://www.suse.com/security/cve/CVE-2021-47509.html
  * https://www.suse.com/security/cve/CVE-2021-47510.html
  * https://www.suse.com/security/cve/CVE-2021-47511.html
  * https://www.suse.com/security/cve/CVE-2021-47512.html
  * https://www.suse.com/security/cve/CVE-2021-47513.html
  * https://www.suse.com/security/cve/CVE-2021-47514.html
  * https://www.suse.com/security/cve/CVE-2021-47516.html
  * https://www.suse.com/security/cve/CVE-2021-47518.html
  * https://www.suse.com/security/cve/CVE-2021-47520.html
  * https://www.suse.com/security/cve/CVE-2021-47521.html
  * https://www.suse.com/security/cve/CVE-2021-47522.html
  * https://www.suse.com/security/cve/CVE-2021-47523.html
  * https://www.suse.com/security/cve/CVE-2021-47524.html
  * https://www.suse.com/security/cve/CVE-2021-47525.html
  * https://www.suse.com/security/cve/CVE-2021-47526.html
  * https://www.suse.com/security/cve/CVE-2021-47527.html
  * https://www.suse.com/security/cve/CVE-2021-47528.html
  * https://www.suse.com/security/cve/CVE-2021-47529.html
  * https://www.suse.com/security/cve/CVE-2021-47530.html
  * https://www.suse.com/security/cve/CVE-2021-47531.html
  * https://www.suse.com/security/cve/CVE-2021-47532.html
  * https://www.suse.com/security/cve/CVE-2021-47533.html
  * https://www.suse.com/security/cve/CVE-2021-47534.html
  * https://www.suse.com/security/cve/CVE-2021-47535.html
  * https://www.suse.com/security/cve/CVE-2021-47536.html
  * https://www.suse.com/security/cve/CVE-2021-47537.html
  * https://www.suse.com/security/cve/CVE-2021-47540.html
  * https://www.suse.com/security/cve/CVE-2021-47541.html
  * https://www.suse.com/security/cve/CVE-2021-47542.html
  * https://www.suse.com/security/cve/CVE-2021-47544.html
  * https://www.suse.com/security/cve/CVE-2021-47548.html
  * https://www.suse.com/security/cve/CVE-2021-47549.html
  * https://www.suse.com/security/cve/CVE-2021-47550.html
  * https://www.suse.com/security/cve/CVE-2021-47551.html
  * https://www.suse.com/security/cve/CVE-2021-47552.html
  * https://www.suse.com/security/cve/CVE-2021-47553.html
  * https://www.suse.com/security/cve/CVE-2021-47554.html
  * https://www.suse.com/security/cve/CVE-2021-47555.html
  * https://www.suse.com/security/cve/CVE-2021-47556.html
  * https://www.suse.com/security/cve/CVE-2021-47557.html
  * https://www.suse.com/security/cve/CVE-2021-47558.html
  * https://www.suse.com/security/cve/CVE-2021-47559.html
  * https://www.suse.com/security/cve/CVE-2021-47560.html
  * https://www.suse.com/security/cve/CVE-2021-47562.html
  * https://www.suse.com/security/cve/CVE-2021-47563.html
  * https://www.suse.com/security/cve/CVE-2021-47564.html
  * https://www.suse.com/security/cve/CVE-2021-47565.html
  * https://www.suse.com/security/cve/CVE-2021-47569.html
  * https://www.suse.com/security/cve/CVE-2022-48633.html
  * https://www.suse.com/security/cve/CVE-2022-48662.html
  * https://www.suse.com/security/cve/CVE-2022-48669.html
  * https://www.suse.com/security/cve/CVE-2022-48689.html
  * https://www.suse.com/security/cve/CVE-2022-48691.html
  * https://www.suse.com/security/cve/CVE-2022-48699.html
  * https://www.suse.com/security/cve/CVE-2022-48705.html
  * https://www.suse.com/security/cve/CVE-2022-48708.html
  * https://www.suse.com/security/cve/CVE-2022-48709.html
  * https://www.suse.com/security/cve/CVE-2022-48710.html
  * https://www.suse.com/security/cve/CVE-2023-0160.html
  * https://www.suse.com/security/cve/CVE-2023-1829.html
  * https://www.suse.com/security/cve/CVE-2023-42755.html
  * https://www.suse.com/security/cve/CVE-2023-47233.html
  * https://www.suse.com/security/cve/CVE-2023-52586.html
  * https://www.suse.com/security/cve/CVE-2023-52591.html
  * https://www.suse.com/security/cve/CVE-2023-52618.html
  * https://www.suse.com/security/cve/CVE-2023-52642.html
  * https://www.suse.com/security/cve/CVE-2023-52643.html
  * https://www.suse.com/security/cve/CVE-2023-52644.html
  * https://www.suse.com/security/cve/CVE-2023-52646.html
  * https://www.suse.com/security/cve/CVE-2023-52650.html
  * https://www.suse.com/security/cve/CVE-2023-52653.html
  * https://www.suse.com/security/cve/CVE-2023-52654.html
  * https://www.suse.com/security/cve/CVE-2023-52655.html
  * https://www.suse.com/security/cve/CVE-2023-52656.html
  * https://www.suse.com/security/cve/CVE-2023-52657.html
  * https://www.suse.com/security/cve/CVE-2023-52659.html
  * https://www.suse.com/security/cve/CVE-2023-52660.html
  * https://www.suse.com/security/cve/CVE-2023-52661.html
  * https://www.suse.com/security/cve/CVE-2023-52662.html
  * https://www.suse.com/security/cve/CVE-2023-52664.html
  * https://www.suse.com/security/cve/CVE-2023-52669.html
  * https://www.suse.com/security/cve/CVE-2023-52671.html
  * https://www.suse.com/security/cve/CVE-2023-52674.html
  * https://www.suse.com/security/cve/CVE-2023-52676.html
  * https://www.suse.com/security/cve/CVE-2023-52678.html
  * https://www.suse.com/security/cve/CVE-2023-52679.html
  * https://www.suse.com/security/cve/CVE-2023-52680.html
  * https://www.suse.com/security/cve/CVE-2023-52683.html
  * https://www.suse.com/security/cve/CVE-2023-52685.html
  * https://www.suse.com/security/cve/CVE-2023-52686.html
  * https://www.suse.com/security/cve/CVE-2023-52690.html
  * https://www.suse.com/security/cve/CVE-2023-52691.html
  * https://www.suse.com/security/cve/CVE-2023-52692.html
  * https://www.suse.com/security/cve/CVE-2023-52693.html
  * https://www.suse.com/security/cve/CVE-2023-52694.html
  * https://www.suse.com/security/cve/CVE-2023-52696.html
  * https://www.suse.com/security/cve/CVE-2023-52698.html
  * https://www.suse.com/security/cve/CVE-2023-52699.html
  * https://www.suse.com/security/cve/CVE-2023-52702.html
  * https://www.suse.com/security/cve/CVE-2023-52703.html
  * https://www.suse.com/security/cve/CVE-2023-52705.html
  * https://www.suse.com/security/cve/CVE-2023-52707.html
  * https://www.suse.com/security/cve/CVE-2023-52708.html
  * https://www.suse.com/security/cve/CVE-2023-52730.html
  * https://www.suse.com/security/cve/CVE-2023-52731.html
  * https://www.suse.com/security/cve/CVE-2023-52732.html
  * https://www.suse.com/security/cve/CVE-2023-52733.html
  * https://www.suse.com/security/cve/CVE-2023-52736.html
  * https://www.suse.com/security/cve/CVE-2023-52738.html
  * https://www.suse.com/security/cve/CVE-2023-52739.html
  * https://www.suse.com/security/cve/CVE-2023-52740.html
  * https://www.suse.com/security/cve/CVE-2023-52741.html
  * https://www.suse.com/security/cve/CVE-2023-52742.html
  * https://www.suse.com/security/cve/CVE-2023-52743.html
  * https://www.suse.com/security/cve/CVE-2023-52744.html
  * https://www.suse.com/security/cve/CVE-2023-52745.html
  * https://www.suse.com/security/cve/CVE-2023-52746.html
  * https://www.suse.com/security/cve/CVE-2023-52747.html
  * https://www.suse.com/security/cve/CVE-2023-52753.html
  * https://www.suse.com/security/cve/CVE-2023-52754.html
  * https://www.suse.com/security/cve/CVE-2023-52756.html
  * https://www.suse.com/security/cve/CVE-2023-52757.html
  * https://www.suse.com/security/cve/CVE-2023-52759.html
  * https://www.suse.com/security/cve/CVE-2023-52763.html
  * https://www.suse.com/security/cve/CVE-2023-52764.html
  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52773.html
  * https://www.suse.com/security/cve/CVE-2023-52774.html
  * https://www.suse.com/security/cve/CVE-2023-52777.html
  * https://www.suse.com/security/cve/CVE-2023-52781.html
  * https://www.suse.com/security/cve/CVE-2023-52788.html
  * https://www.suse.com/security/cve/CVE-2023-52789.html
  * https://www.suse.com/security/cve/CVE-2023-52791.html
  * https://www.suse.com/security/cve/CVE-2023-52795.html
  * https://www.suse.com/security/cve/CVE-2023-52796.html
  * https://www.suse.com/security/cve/CVE-2023-52798.html
  * https://www.suse.com/security/cve/CVE-2023-52799.html
  * https://www.suse.com/security/cve/CVE-2023-52800.html
  * https://www.suse.com/security/cve/CVE-2023-52803.html
  * https://www.suse.com/security/cve/CVE-2023-52804.html
  * https://www.suse.com/security/cve/CVE-2023-52805.html
  * https://www.suse.com/security/cve/CVE-2023-52806.html
  * https://www.suse.com/security/cve/CVE-2023-52807.html
  * https://www.suse.com/security/cve/CVE-2023-52808.html
  * https://www.suse.com/security/cve/CVE-2023-52809.html
  * https://www.suse.com/security/cve/CVE-2023-52810.html
  * https://www.suse.com/security/cve/CVE-2023-52811.html
  * https://www.suse.com/security/cve/CVE-2023-52814.html
  * https://www.suse.com/security/cve/CVE-2023-52815.html
  * https://www.suse.com/security/cve/CVE-2023-52816.html
  * https://www.suse.com/security/cve/CVE-2023-52817.html
  * https://www.suse.com/security/cve/CVE-2023-52818.html
  * https://www.suse.com/security/cve/CVE-2023-52819.html
  * https://www.suse.com/security/cve/CVE-2023-52821.html
  * https://www.suse.com/security/cve/CVE-2023-52825.html
  * https://www.suse.com/security/cve/CVE-2023-52826.html
  * https://www.suse.com/security/cve/CVE-2023-52832.html
  * https://www.suse.com/security/cve/CVE-2023-52833.html
  * https://www.suse.com/security/cve/CVE-2023-52834.html
  * https://www.suse.com/security/cve/CVE-2023-52838.html
  * https://www.suse.com/security/cve/CVE-2023-52840.html
  * https://www.suse.com/security/cve/CVE-2023-52841.html
  * https://www.suse.com/security/cve/CVE-2023-52844.html
  * https://www.suse.com/security/cve/CVE-2023-52847.html
  * https://www.suse.com/security/cve/CVE-2023-52851.html
  * https://www.suse.com/security/cve/CVE-2023-52853.html
  * https://www.suse.com/security/cve/CVE-2023-52854.html
  * https://www.suse.com/security/cve/CVE-2023-52855.html
  * https://www.suse.com/security/cve/CVE-2023-52856.html
  * https://www.suse.com/security/cve/CVE-2023-52858.html
  * https://www.suse.com/security/cve/CVE-2023-52860.html
  * https://www.suse.com/security/cve/CVE-2023-52861.html
  * https://www.suse.com/security/cve/CVE-2023-52864.html
  * https://www.suse.com/security/cve/CVE-2023-52865.html
  * https://www.suse.com/security/cve/CVE-2023-52867.html
  * https://www.suse.com/security/cve/CVE-2023-52868.html
  * https://www.suse.com/security/cve/CVE-2023-52870.html
  * https://www.suse.com/security/cve/CVE-2023-52871.html
  * https://www.suse.com/security/cve/CVE-2023-52872.html
  * https://www.suse.com/security/cve/CVE-2023-52873.html
  * https://www.suse.com/security/cve/CVE-2023-52875.html
  * https://www.suse.com/security/cve/CVE-2023-52876.html
  * https://www.suse.com/security/cve/CVE-2023-52877.html
  * https://www.suse.com/security/cve/CVE-2023-52878.html
  * https://www.suse.com/security/cve/CVE-2023-52880.html
  * https://www.suse.com/security/cve/CVE-2023-6531.html
  * https://www.suse.com/security/cve/CVE-2024-2201.html
  * https://www.suse.com/security/cve/CVE-2024-26597.html
  * https://www.suse.com/security/cve/CVE-2024-26643.html
  * https://www.suse.com/security/cve/CVE-2024-26679.html
  * https://www.suse.com/security/cve/CVE-2024-26692.html
  * https://www.suse.com/security/cve/CVE-2024-26698.html
  * https://www.suse.com/security/cve/CVE-2024-26700.html
  * https://www.suse.com/security/cve/CVE-2024-26715.html
  * https://www.suse.com/security/cve/CVE-2024-26739.html
  * https://www.suse.com/security/cve/CVE-2024-26742.html
  * https://www.suse.com/security/cve/CVE-2024-26748.html
  * https://www.suse.com/security/cve/CVE-2024-26758.html
  * https://www.suse.com/security/cve/CVE-2024-26764.html
  * https://www.suse.com/security/cve/CVE-2024-26775.html
  * https://www.suse.com/security/cve/CVE-2024-26777.html
  * https://www.suse.com/security/cve/CVE-2024-26778.html
  * https://www.suse.com/security/cve/CVE-2024-26788.html
  * https://www.suse.com/security/cve/CVE-2024-26791.html
  * https://www.suse.com/security/cve/CVE-2024-26801.html
  * https://www.suse.com/security/cve/CVE-2024-26822.html
  * https://www.suse.com/security/cve/CVE-2024-26828.html
  * https://www.suse.com/security/cve/CVE-2024-26829.html
  * https://www.suse.com/security/cve/CVE-2024-26838.html
  * https://www.suse.com/security/cve/CVE-2024-26839.html
  * https://www.suse.com/security/cve/CVE-2024-26840.html
  * https://www.suse.com/security/cve/CVE-2024-26846.html
  * https://www.suse.com/security/cve/CVE-2024-26859.html
  * https://www.suse.com/security/cve/CVE-2024-26870.html
  * https://www.suse.com/security/cve/CVE-2024-26874.html
  * https://www.suse.com/security/cve/CVE-2024-26876.html
  * https://www.suse.com/security/cve/CVE-2024-26877.html
  * https://www.suse.com/security/cve/CVE-2024-26880.html
  * https://www.suse.com/security/cve/CVE-2024-26889.html
  * https://www.suse.com/security/cve/CVE-2024-26894.html
  * https://www.suse.com/security/cve/CVE-2024-26900.html
  * https://www.suse.com/security/cve/CVE-2024-26907.html
  * https://www.suse.com/security/cve/CVE-2024-26915.html
  * https://www.suse.com/security/cve/CVE-2024-26916.html
  * https://www.suse.com/security/cve/CVE-2024-26919.html
  * https://www.suse.com/security/cve/CVE-2024-26920.html
  * https://www.suse.com/security/cve/CVE-2024-26921.html
  * https://www.suse.com/security/cve/CVE-2024-26922.html
  * https://www.suse.com/security/cve/CVE-2024-26925.html
  * https://www.suse.com/security/cve/CVE-2024-26928.html
  * https://www.suse.com/security/cve/CVE-2024-26929.html
  * https://www.suse.com/security/cve/CVE-2024-26930.html
  * https://www.suse.com/security/cve/CVE-2024-26931.html
  * https://www.suse.com/security/cve/CVE-2024-26933.html
  * https://www.suse.com/security/cve/CVE-2024-26934.html
  * https://www.suse.com/security/cve/CVE-2024-26935.html
  * https://www.suse.com/security/cve/CVE-2024-26937.html
  * https://www.suse.com/security/cve/CVE-2024-26938.html
  * https://www.suse.com/security/cve/CVE-2024-26939.html
  * https://www.suse.com/security/cve/CVE-2024-26940.html
  * https://www.suse.com/security/cve/CVE-2024-26943.html
  * https://www.suse.com/security/cve/CVE-2024-26957.html
  * https://www.suse.com/security/cve/CVE-2024-26958.html
  * https://www.suse.com/security/cve/CVE-2024-26964.html
  * https://www.suse.com/security/cve/CVE-2024-26974.html
  * https://www.suse.com/security/cve/CVE-2024-26977.html
  * https://www.suse.com/security/cve/CVE-2024-26979.html
  * https://www.suse.com/security/cve/CVE-2024-26984.html
  * https://www.suse.com/security/cve/CVE-2024-26988.html
  * https://www.suse.com/security/cve/CVE-2024-26989.html
  * https://www.suse.com/security/cve/CVE-2024-26994.html
  * https://www.suse.com/security/cve/CVE-2024-26996.html
  * https://www.suse.com/security/cve/CVE-2024-26997.html
  * https://www.suse.com/security/cve/CVE-2024-26999.html
  * https://www.suse.com/security/cve/CVE-2024-27000.html
  * https://www.suse.com/security/cve/CVE-2024-27001.html
  * https://www.suse.com/security/cve/CVE-2024-27004.html
  * https://www.suse.com/security/cve/CVE-2024-27008.html
  * https://www.suse.com/security/cve/CVE-2024-27028.html
  * https://www.suse.com/security/cve/CVE-2024-27037.html
  * https://www.suse.com/security/cve/CVE-2024-27042.html
  * https://www.suse.com/security/cve/CVE-2024-27045.html
  * https://www.suse.com/security/cve/CVE-2024-27047.html
  * https://www.suse.com/security/cve/CVE-2024-27051.html
  * https://www.suse.com/security/cve/CVE-2024-27052.html
  * https://www.suse.com/security/cve/CVE-2024-27053.html
  * https://www.suse.com/security/cve/CVE-2024-27054.html
  * https://www.suse.com/security/cve/CVE-2024-27059.html
  * https://www.suse.com/security/cve/CVE-2024-27072.html
  * https://www.suse.com/security/cve/CVE-2024-27073.html
  * https://www.suse.com/security/cve/CVE-2024-27074.html
  * https://www.suse.com/security/cve/CVE-2024-27075.html
  * https://www.suse.com/security/cve/CVE-2024-27076.html
  * https://www.suse.com/security/cve/CVE-2024-27077.html
  * https://www.suse.com/security/cve/CVE-2024-27078.html
  * https://www.suse.com/security/cve/CVE-2024-27388.html
  * https://www.suse.com/security/cve/CVE-2024-27393.html
  * https://www.suse.com/security/cve/CVE-2024-27395.html
  * https://www.suse.com/security/cve/CVE-2024-27396.html
  * https://www.suse.com/security/cve/CVE-2024-27398.html
  * https://www.suse.com/security/cve/CVE-2024-27399.html
  * https://www.suse.com/security/cve/CVE-2024-27400.html
  * https://www.suse.com/security/cve/CVE-2024-27401.html
  * https://www.suse.com/security/cve/CVE-2024-27405.html
  * https://www.suse.com/security/cve/CVE-2024-27410.html
  * https://www.suse.com/security/cve/CVE-2024-27412.html
  * https://www.suse.com/security/cve/CVE-2024-27413.html
  * https://www.suse.com/security/cve/CVE-2024-27416.html
  * https://www.suse.com/security/cve/CVE-2024-27417.html
  * https://www.suse.com/security/cve/CVE-2024-27419.html
  * https://www.suse.com/security/cve/CVE-2024-27431.html
  * https://www.suse.com/security/cve/CVE-2024-27435.html
  * https://www.suse.com/security/cve/CVE-2024-27436.html
  * https://www.suse.com/security/cve/CVE-2024-35789.html
  * https://www.suse.com/security/cve/CVE-2024-35791.html
  * https://www.suse.com/security/cve/CVE-2024-35796.html
  * https://www.suse.com/security/cve/CVE-2024-35799.html
  * https://www.suse.com/security/cve/CVE-2024-35801.html
  * https://www.suse.com/security/cve/CVE-2024-35804.html
  * https://www.suse.com/security/cve/CVE-2024-35806.html
  * https://www.suse.com/security/cve/CVE-2024-35809.html
  * https://www.suse.com/security/cve/CVE-2024-35811.html
  * https://www.suse.com/security/cve/CVE-2024-35812.html
  * https://www.suse.com/security/cve/CVE-2024-35813.html
  * https://www.suse.com/security/cve/CVE-2024-35815.html
  * https://www.suse.com/security/cve/CVE-2024-35817.html
  * https://www.suse.com/security/cve/CVE-2024-35821.html
  * https://www.suse.com/security/cve/CVE-2024-35822.html
  * https://www.suse.com/security/cve/CVE-2024-35823.html
  * https://www.suse.com/security/cve/CVE-2024-35825.html
  * https://www.suse.com/security/cve/CVE-2024-35828.html
  * https://www.suse.com/security/cve/CVE-2024-35829.html
  * https://www.suse.com/security/cve/CVE-2024-35830.html
  * https://www.suse.com/security/cve/CVE-2024-35833.html
  * https://www.suse.com/security/cve/CVE-2024-35845.html
  * https://www.suse.com/security/cve/CVE-2024-35847.html
  * https://www.suse.com/security/cve/CVE-2024-35849.html
  * https://www.suse.com/security/cve/CVE-2024-35851.html
  * https://www.suse.com/security/cve/CVE-2024-35852.html
  * https://www.suse.com/security/cve/CVE-2024-35854.html
  * https://www.suse.com/security/cve/CVE-2024-35860.html
  * https://www.suse.com/security/cve/CVE-2024-35861.html
  * https://www.suse.com/security/cve/CVE-2024-35862.html
  * https://www.suse.com/security/cve/CVE-2024-35863.html
  * https://www.suse.com/security/cve/CVE-2024-35864.html
  * https://www.suse.com/security/cve/CVE-2024-35865.html
  * https://www.suse.com/security/cve/CVE-2024-35866.html
  * https://www.suse.com/security/cve/CVE-2024-35867.html
  * https://www.suse.com/security/cve/CVE-2024-35868.html
  * https://www.suse.com/security/cve/CVE-2024-35869.html
  * https://www.suse.com/security/cve/CVE-2024-35870.html
  * https://www.suse.com/security/cve/CVE-2024-35872.html
  * https://www.suse.com/security/cve/CVE-2024-35875.html
  * https://www.suse.com/security/cve/CVE-2024-35877.html
  * https://www.suse.com/security/cve/CVE-2024-35878.html
  * https://www.suse.com/security/cve/CVE-2024-35879.html
  * https://www.suse.com/security/cve/CVE-2024-35885.html
  * https://www.suse.com/security/cve/CVE-2024-35887.html
  * https://www.suse.com/security/cve/CVE-2024-35895.html
  * https://www.suse.com/security/cve/CVE-2024-35901.html
  * https://www.suse.com/security/cve/CVE-2024-35904.html
  * https://www.suse.com/security/cve/CVE-2024-35905.html
  * https://www.suse.com/security/cve/CVE-2024-35907.html
  * https://www.suse.com/security/cve/CVE-2024-35912.html
  * https://www.suse.com/security/cve/CVE-2024-35914.html
  * https://www.suse.com/security/cve/CVE-2024-35915.html
  * https://www.suse.com/security/cve/CVE-2024-35922.html
  * https://www.suse.com/security/cve/CVE-2024-35924.html
  * https://www.suse.com/security/cve/CVE-2024-35930.html
  * https://www.suse.com/security/cve/CVE-2024-35932.html
  * https://www.suse.com/security/cve/CVE-2024-35933.html
  * https://www.suse.com/security/cve/CVE-2024-35935.html
  * https://www.suse.com/security/cve/CVE-2024-35936.html
  * https://www.suse.com/security/cve/CVE-2024-35938.html
  * https://www.suse.com/security/cve/CVE-2024-35939.html
  * https://www.suse.com/security/cve/CVE-2024-35940.html
  * https://www.suse.com/security/cve/CVE-2024-35943.html
  * https://www.suse.com/security/cve/CVE-2024-35944.html
  * https://www.suse.com/security/cve/CVE-2024-35947.html
  * https://www.suse.com/security/cve/CVE-2024-35950.html
  * https://www.suse.com/security/cve/CVE-2024-35951.html
  * https://www.suse.com/security/cve/CVE-2024-35952.html
  * https://www.suse.com/security/cve/CVE-2024-35955.html
  * https://www.suse.com/security/cve/CVE-2024-35959.html
  * https://www.suse.com/security/cve/CVE-2024-35963.html
  * https://www.suse.com/security/cve/CVE-2024-35964.html
  * https://www.suse.com/security/cve/CVE-2024-35965.html
  * https://www.suse.com/security/cve/CVE-2024-35966.html
  * https://www.suse.com/security/cve/CVE-2024-35967.html
  * https://www.suse.com/security/cve/CVE-2024-35969.html
  * https://www.suse.com/security/cve/CVE-2024-35973.html
  * https://www.suse.com/security/cve/CVE-2024-35976.html
  * https://www.suse.com/security/cve/CVE-2024-35978.html
  * https://www.suse.com/security/cve/CVE-2024-35982.html
  * https://www.suse.com/security/cve/CVE-2024-35984.html
  * https://www.suse.com/security/cve/CVE-2024-35989.html
  * https://www.suse.com/security/cve/CVE-2024-35990.html
  * https://www.suse.com/security/cve/CVE-2024-35998.html
  * https://www.suse.com/security/cve/CVE-2024-35999.html
  * https://www.suse.com/security/cve/CVE-2024-36006.html
  * https://www.suse.com/security/cve/CVE-2024-36007.html
  * https://www.suse.com/security/cve/CVE-2024-36012.html
  * https://www.suse.com/security/cve/CVE-2024-36014.html
  * https://www.suse.com/security/cve/CVE-2024-36015.html
  * https://www.suse.com/security/cve/CVE-2024-36016.html
  * https://www.suse.com/security/cve/CVE-2024-36026.html
  * https://www.suse.com/security/cve/CVE-2024-36029.html
  * https://www.suse.com/security/cve/CVE-2024-36032.html
  * https://www.suse.com/security/cve/CVE-2024-36880.html
  * https://www.suse.com/security/cve/CVE-2024-36893.html
  * https://www.suse.com/security/cve/CVE-2024-36896.html
  * https://www.suse.com/security/cve/CVE-2024-36897.html
  * https://www.suse.com/security/cve/CVE-2024-36906.html
  * https://www.suse.com/security/cve/CVE-2024-36918.html
  * https://www.suse.com/security/cve/CVE-2024-36924.html
  * https://www.suse.com/security/cve/CVE-2024-36926.html
  * https://www.suse.com/security/cve/CVE-2024-36928.html
  * https://www.suse.com/security/cve/CVE-2024-36931.html
  * https://www.suse.com/security/cve/CVE-2024-36938.html
  * https://www.suse.com/security/cve/CVE-2024-36940.html
  * https://www.suse.com/security/cve/CVE-2024-36941.html
  * https://www.suse.com/security/cve/CVE-2024-36942.html
  * https://www.suse.com/security/cve/CVE-2024-36944.html
  * https://www.suse.com/security/cve/CVE-2024-36947.html
  * https://www.suse.com/security/cve/CVE-2024-36950.html
  * https://www.suse.com/security/cve/CVE-2024-36952.html
  * https://www.suse.com/security/cve/CVE-2024-36955.html
  * https://www.suse.com/security/cve/CVE-2024-36959.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1141539
  * https://bugzilla.suse.com/show_bug.cgi?id=1174585
  * https://bugzilla.suse.com/show_bug.cgi?id=1181674
  * https://bugzilla.suse.com/show_bug.cgi?id=1187716
  * https://bugzilla.suse.com/show_bug.cgi?id=1190569
  * https://bugzilla.suse.com/show_bug.cgi?id=1191949
  * https://bugzilla.suse.com/show_bug.cgi?id=1192107
  * https://bugzilla.suse.com/show_bug.cgi?id=1193983
  * https://bugzilla.suse.com/show_bug.cgi?id=1194288
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1196956
  * https://bugzilla.suse.com/show_bug.cgi?id=1197915
  * https://bugzilla.suse.com/show_bug.cgi?id=1200465
  * https://bugzilla.suse.com/show_bug.cgi?id=1205205
  * https://bugzilla.suse.com/show_bug.cgi?id=1207284
  * https://bugzilla.suse.com/show_bug.cgi?id=1207361
  * https://bugzilla.suse.com/show_bug.cgi?id=1207948
  * https://bugzilla.suse.com/show_bug.cgi?id=1208149
  * https://bugzilla.suse.com/show_bug.cgi?id=1209657
  * https://bugzilla.suse.com/show_bug.cgi?id=1209799
  * https://bugzilla.suse.com/show_bug.cgi?id=1209834
  * https://bugzilla.suse.com/show_bug.cgi?id=1209980
  * https://bugzilla.suse.com/show_bug.cgi?id=1210335
  * https://bugzilla.suse.com/show_bug.cgi?id=1213863
  * https://bugzilla.suse.com/show_bug.cgi?id=1214852
  * https://bugzilla.suse.com/show_bug.cgi?id=1215322
  * https://bugzilla.suse.com/show_bug.cgi?id=1215702
  * https://bugzilla.suse.com/show_bug.cgi?id=1216358
  * https://bugzilla.suse.com/show_bug.cgi?id=1216702
  * https://bugzilla.suse.com/show_bug.cgi?id=1217169
  * https://bugzilla.suse.com/show_bug.cgi?id=1217339
  * https://bugzilla.suse.com/show_bug.cgi?id=1217515
  * https://bugzilla.suse.com/show_bug.cgi?id=1218447
  * https://bugzilla.suse.com/show_bug.cgi?id=1220021
  * https://bugzilla.suse.com/show_bug.cgi?id=1220267
  * https://bugzilla.suse.com/show_bug.cgi?id=1220363
  * https://bugzilla.suse.com/show_bug.cgi?id=1220783
  * https://bugzilla.suse.com/show_bug.cgi?id=1221044
  * https://bugzilla.suse.com/show_bug.cgi?id=1221081
  * https://bugzilla.suse.com/show_bug.cgi?id=1221615
  * https://bugzilla.suse.com/show_bug.cgi?id=1221777
  * https://bugzilla.suse.com/show_bug.cgi?id=1221816
  * https://bugzilla.suse.com/show_bug.cgi?id=1221829
  * https://bugzilla.suse.com/show_bug.cgi?id=1222011
  * https://bugzilla.suse.com/show_bug.cgi?id=1222374
  * https://bugzilla.suse.com/show_bug.cgi?id=1222385
  * https://bugzilla.suse.com/show_bug.cgi?id=1222413
  * https://bugzilla.suse.com/show_bug.cgi?id=1222464
  * https://bugzilla.suse.com/show_bug.cgi?id=1222513
  * https://bugzilla.suse.com/show_bug.cgi?id=1222559
  * https://bugzilla.suse.com/show_bug.cgi?id=1222561
  * https://bugzilla.suse.com/show_bug.cgi?id=1222608
  * https://bugzilla.suse.com/show_bug.cgi?id=1222619
  * https://bugzilla.suse.com/show_bug.cgi?id=1222627
  * https://bugzilla.suse.com/show_bug.cgi?id=1222721
  * https://bugzilla.suse.com/show_bug.cgi?id=1222765
  * https://bugzilla.suse.com/show_bug.cgi?id=1222770
  * https://bugzilla.suse.com/show_bug.cgi?id=1222783
  * https://bugzilla.suse.com/show_bug.cgi?id=1222793
  * https://bugzilla.suse.com/show_bug.cgi?id=1222870
  * https://bugzilla.suse.com/show_bug.cgi?id=1222893
  * https://bugzilla.suse.com/show_bug.cgi?id=1222960
  * https://bugzilla.suse.com/show_bug.cgi?id=1222961
  * https://bugzilla.suse.com/show_bug.cgi?id=1222974
  * https://bugzilla.suse.com/show_bug.cgi?id=1222975
  * https://bugzilla.suse.com/show_bug.cgi?id=1222976
  * https://bugzilla.suse.com/show_bug.cgi?id=1223011
  * https://bugzilla.suse.com/show_bug.cgi?id=1223023
  * https://bugzilla.suse.com/show_bug.cgi?id=1223027
  * https://bugzilla.suse.com/show_bug.cgi?id=1223031
  * https://bugzilla.suse.com/show_bug.cgi?id=1223043
  * https://bugzilla.suse.com/show_bug.cgi?id=1223046
  * https://bugzilla.suse.com/show_bug.cgi?id=1223048
  * https://bugzilla.suse.com/show_bug.cgi?id=1223049
  * https://bugzilla.suse.com/show_bug.cgi?id=1223084
  * https://bugzilla.suse.com/show_bug.cgi?id=1223113
  * https://bugzilla.suse.com/show_bug.cgi?id=1223119
  * https://bugzilla.suse.com/show_bug.cgi?id=1223137
  * https://bugzilla.suse.com/show_bug.cgi?id=1223138
  * https://bugzilla.suse.com/show_bug.cgi?id=1223140
  * https://bugzilla.suse.com/show_bug.cgi?id=1223188
  * https://bugzilla.suse.com/show_bug.cgi?id=1223203
  * https://bugzilla.suse.com/show_bug.cgi?id=1223207
  * https://bugzilla.suse.com/show_bug.cgi?id=1223315
  * https://bugzilla.suse.com/show_bug.cgi?id=1223360
  * https://bugzilla.suse.com/show_bug.cgi?id=1223384
  * https://bugzilla.suse.com/show_bug.cgi?id=1223390
  * https://bugzilla.suse.com/show_bug.cgi?id=1223432
  * https://bugzilla.suse.com/show_bug.cgi?id=1223489
  * https://bugzilla.suse.com/show_bug.cgi?id=1223505
  * https://bugzilla.suse.com/show_bug.cgi?id=1223532
  * https://bugzilla.suse.com/show_bug.cgi?id=1223575
  * https://bugzilla.suse.com/show_bug.cgi?id=1223595
  * https://bugzilla.suse.com/show_bug.cgi?id=1223626
  * https://bugzilla.suse.com/show_bug.cgi?id=1223627
  * https://bugzilla.suse.com/show_bug.cgi?id=1223628
  * https://bugzilla.suse.com/show_bug.cgi?id=1223631
  * https://bugzilla.suse.com/show_bug.cgi?id=1223633
  * https://bugzilla.suse.com/show_bug.cgi?id=1223638
  * https://bugzilla.suse.com/show_bug.cgi?id=1223650
  * https://bugzilla.suse.com/show_bug.cgi?id=1223653
  * https://bugzilla.suse.com/show_bug.cgi?id=1223666
  * https://bugzilla.suse.com/show_bug.cgi?id=1223670
  * https://bugzilla.suse.com/show_bug.cgi?id=1223671
  * https://bugzilla.suse.com/show_bug.cgi?id=1223675
  * https://bugzilla.suse.com/show_bug.cgi?id=1223677
  * https://bugzilla.suse.com/show_bug.cgi?id=1223678
  * https://bugzilla.suse.com/show_bug.cgi?id=1223679
  * https://bugzilla.suse.com/show_bug.cgi?id=1223698
  * https://bugzilla.suse.com/show_bug.cgi?id=1223712
  * https://bugzilla.suse.com/show_bug.cgi?id=1223715
  * https://bugzilla.suse.com/show_bug.cgi?id=1223717
  * https://bugzilla.suse.com/show_bug.cgi?id=1223718
  * https://bugzilla.suse.com/show_bug.cgi?id=1223737
  * https://bugzilla.suse.com/show_bug.cgi?id=1223738
  * https://bugzilla.suse.com/show_bug.cgi?id=1223741
  * https://bugzilla.suse.com/show_bug.cgi?id=1223744
  * https://bugzilla.suse.com/show_bug.cgi?id=1223747
  * https://bugzilla.suse.com/show_bug.cgi?id=1223748
  * https://bugzilla.suse.com/show_bug.cgi?id=1223750
  * https://bugzilla.suse.com/show_bug.cgi?id=1223752
  * https://bugzilla.suse.com/show_bug.cgi?id=1223754
  * https://bugzilla.suse.com/show_bug.cgi?id=1223756
  * https://bugzilla.suse.com/show_bug.cgi?id=1223757
  * https://bugzilla.suse.com/show_bug.cgi?id=1223762
  * https://bugzilla.suse.com/show_bug.cgi?id=1223769
  * https://bugzilla.suse.com/show_bug.cgi?id=1223770
  * https://bugzilla.suse.com/show_bug.cgi?id=1223779
  * https://bugzilla.suse.com/show_bug.cgi?id=1223780
  * https://bugzilla.suse.com/show_bug.cgi?id=1223781
  * https://bugzilla.suse.com/show_bug.cgi?id=1223788
  * https://bugzilla.suse.com/show_bug.cgi?id=1223802
  * https://bugzilla.suse.com/show_bug.cgi?id=1223819
  * https://bugzilla.suse.com/show_bug.cgi?id=1223823
  * https://bugzilla.suse.com/show_bug.cgi?id=1223826
  * https://bugzilla.suse.com/show_bug.cgi?id=1223828
  * https://bugzilla.suse.com/show_bug.cgi?id=1223829
  * https://bugzilla.suse.com/show_bug.cgi?id=1223837
  * https://bugzilla.suse.com/show_bug.cgi?id=1223842
  * https://bugzilla.suse.com/show_bug.cgi?id=1223843
  * https://bugzilla.suse.com/show_bug.cgi?id=1223844
  * https://bugzilla.suse.com/show_bug.cgi?id=1223847
  * https://bugzilla.suse.com/show_bug.cgi?id=1223858
  * https://bugzilla.suse.com/show_bug.cgi?id=1223875
  * https://bugzilla.suse.com/show_bug.cgi?id=1223879
  * https://bugzilla.suse.com/show_bug.cgi?id=1223895
  * https://bugzilla.suse.com/show_bug.cgi?id=1223959
  * https://bugzilla.suse.com/show_bug.cgi?id=1223961
  * https://bugzilla.suse.com/show_bug.cgi?id=1223991
  * https://bugzilla.suse.com/show_bug.cgi?id=1223996
  * https://bugzilla.suse.com/show_bug.cgi?id=1224020
  * https://bugzilla.suse.com/show_bug.cgi?id=1224076
  * https://bugzilla.suse.com/show_bug.cgi?id=1224096
  * https://bugzilla.suse.com/show_bug.cgi?id=1224098
  * https://bugzilla.suse.com/show_bug.cgi?id=1224099
  * https://bugzilla.suse.com/show_bug.cgi?id=1224137
  * https://bugzilla.suse.com/show_bug.cgi?id=1224166
  * https://bugzilla.suse.com/show_bug.cgi?id=1224174
  * https://bugzilla.suse.com/show_bug.cgi?id=1224177
  * https://bugzilla.suse.com/show_bug.cgi?id=1224180
  * https://bugzilla.suse.com/show_bug.cgi?id=1224181
  * https://bugzilla.suse.com/show_bug.cgi?id=1224187
  * https://bugzilla.suse.com/show_bug.cgi?id=1224331
  * https://bugzilla.suse.com/show_bug.cgi?id=1224346
  * https://bugzilla.suse.com/show_bug.cgi?id=1224423
  * https://bugzilla.suse.com/show_bug.cgi?id=1224432
  * https://bugzilla.suse.com/show_bug.cgi?id=1224437
  * https://bugzilla.suse.com/show_bug.cgi?id=1224438
  * https://bugzilla.suse.com/show_bug.cgi?id=1224442
  * https://bugzilla.suse.com/show_bug.cgi?id=1224443
  * https://bugzilla.suse.com/show_bug.cgi?id=1224445
  * https://bugzilla.suse.com/show_bug.cgi?id=1224449
  * https://bugzilla.suse.com/show_bug.cgi?id=1224479
  * https://bugzilla.suse.com/show_bug.cgi?id=1224482
  * https://bugzilla.suse.com/show_bug.cgi?id=1224487
  * https://bugzilla.suse.com/show_bug.cgi?id=1224488
  * https://bugzilla.suse.com/show_bug.cgi?id=1224492
  * https://bugzilla.suse.com/show_bug.cgi?id=1224494
  * https://bugzilla.suse.com/show_bug.cgi?id=1224495
  * https://bugzilla.suse.com/show_bug.cgi?id=1224502
  * https://bugzilla.suse.com/show_bug.cgi?id=1224508
  * https://bugzilla.suse.com/show_bug.cgi?id=1224509
  * https://bugzilla.suse.com/show_bug.cgi?id=1224511
  * https://bugzilla.suse.com/show_bug.cgi?id=1224519
  * https://bugzilla.suse.com/show_bug.cgi?id=1224524
  * https://bugzilla.suse.com/show_bug.cgi?id=1224525
  * https://bugzilla.suse.com/show_bug.cgi?id=1224530
  * https://bugzilla.suse.com/show_bug.cgi?id=1224531
  * https://bugzilla.suse.com/show_bug.cgi?id=1224534
  * https://bugzilla.suse.com/show_bug.cgi?id=1224535
  * https://bugzilla.suse.com/show_bug.cgi?id=1224537
  * https://bugzilla.suse.com/show_bug.cgi?id=1224541
  * https://bugzilla.suse.com/show_bug.cgi?id=1224543
  * https://bugzilla.suse.com/show_bug.cgi?id=1224549
  * https://bugzilla.suse.com/show_bug.cgi?id=1224550
  * https://bugzilla.suse.com/show_bug.cgi?id=1224558
  * https://bugzilla.suse.com/show_bug.cgi?id=1224559
  * https://bugzilla.suse.com/show_bug.cgi?id=1224566
  * https://bugzilla.suse.com/show_bug.cgi?id=1224567
  * https://bugzilla.suse.com/show_bug.cgi?id=1224571
  * https://bugzilla.suse.com/show_bug.cgi?id=1224575
  * https://bugzilla.suse.com/show_bug.cgi?id=1224576
  * https://bugzilla.suse.com/show_bug.cgi?id=1224579
  * https://bugzilla.suse.com/show_bug.cgi?id=1224580
  * https://bugzilla.suse.com/show_bug.cgi?id=1224581
  * https://bugzilla.suse.com/show_bug.cgi?id=1224582
  * https://bugzilla.suse.com/show_bug.cgi?id=1224586
  * https://bugzilla.suse.com/show_bug.cgi?id=1224587
  * https://bugzilla.suse.com/show_bug.cgi?id=1224592
  * https://bugzilla.suse.com/show_bug.cgi?id=1224598
  * https://bugzilla.suse.com/show_bug.cgi?id=1224601
  * https://bugzilla.suse.com/show_bug.cgi?id=1224607
  * https://bugzilla.suse.com/show_bug.cgi?id=1224608
  * https://bugzilla.suse.com/show_bug.cgi?id=1224611
  * https://bugzilla.suse.com/show_bug.cgi?id=1224615
  * https://bugzilla.suse.com/show_bug.cgi?id=1224617
  * https://bugzilla.suse.com/show_bug.cgi?id=1224618
  * https://bugzilla.suse.com/show_bug.cgi?id=1224621
  * https://bugzilla.suse.com/show_bug.cgi?id=1224622
  * https://bugzilla.suse.com/show_bug.cgi?id=1224624
  * https://bugzilla.suse.com/show_bug.cgi?id=1224627
  * https://bugzilla.suse.com/show_bug.cgi?id=1224628
  * https://bugzilla.suse.com/show_bug.cgi?id=1224629
  * https://bugzilla.suse.com/show_bug.cgi?id=1224632
  * https://bugzilla.suse.com/show_bug.cgi?id=1224636
  * https://bugzilla.suse.com/show_bug.cgi?id=1224637
  * https://bugzilla.suse.com/show_bug.cgi?id=1224638
  * https://bugzilla.suse.com/show_bug.cgi?id=1224640
  * https://bugzilla.suse.com/show_bug.cgi?id=1224643
  * https://bugzilla.suse.com/show_bug.cgi?id=1224644
  * https://bugzilla.suse.com/show_bug.cgi?id=1224645
  * https://bugzilla.suse.com/show_bug.cgi?id=1224647
  * https://bugzilla.suse.com/show_bug.cgi?id=1224648
  * https://bugzilla.suse.com/show_bug.cgi?id=1224649
  * https://bugzilla.suse.com/show_bug.cgi?id=1224650
  * https://bugzilla.suse.com/show_bug.cgi?id=1224651
  * https://bugzilla.suse.com/show_bug.cgi?id=1224657
  * https://bugzilla.suse.com/show_bug.cgi?id=1224659
  * https://bugzilla.suse.com/show_bug.cgi?id=1224660
  * https://bugzilla.suse.com/show_bug.cgi?id=1224663
  * https://bugzilla.suse.com/show_bug.cgi?id=1224664
  * https://bugzilla.suse.com/show_bug.cgi?id=1224665
  * https://bugzilla.suse.com/show_bug.cgi?id=1224666
  * https://bugzilla.suse.com/show_bug.cgi?id=1224667
  * https://bugzilla.suse.com/show_bug.cgi?id=1224668
  * https://bugzilla.suse.com/show_bug.cgi?id=1224671
  * https://bugzilla.suse.com/show_bug.cgi?id=1224672
  * https://bugzilla.suse.com/show_bug.cgi?id=1224676
  * https://bugzilla.suse.com/show_bug.cgi?id=1224678
  * https://bugzilla.suse.com/show_bug.cgi?id=1224679
  * https://bugzilla.suse.com/show_bug.cgi?id=1224680
  * https://bugzilla.suse.com/show_bug.cgi?id=1224681
  * https://bugzilla.suse.com/show_bug.cgi?id=1224682
  * https://bugzilla.suse.com/show_bug.cgi?id=1224685
  * https://bugzilla.suse.com/show_bug.cgi?id=1224686
  * https://bugzilla.suse.com/show_bug.cgi?id=1224692
  * https://bugzilla.suse.com/show_bug.cgi?id=1224697
  * https://bugzilla.suse.com/show_bug.cgi?id=1224699
  * https://bugzilla.suse.com/show_bug.cgi?id=1224701
  * https://bugzilla.suse.com/show_bug.cgi?id=1224703
  * https://bugzilla.suse.com/show_bug.cgi?id=1224705
  * https://bugzilla.suse.com/show_bug.cgi?id=1224707
  * https://bugzilla.suse.com/show_bug.cgi?id=1224717
  * https://bugzilla.suse.com/show_bug.cgi?id=1224718
  * https://bugzilla.suse.com/show_bug.cgi?id=1224721
  * https://bugzilla.suse.com/show_bug.cgi?id=1224722
  * https://bugzilla.suse.com/show_bug.cgi?id=1224723
  * https://bugzilla.suse.com/show_bug.cgi?id=1224725
  * https://bugzilla.suse.com/show_bug.cgi?id=1224727
  * https://bugzilla.suse.com/show_bug.cgi?id=1224728
  * https://bugzilla.suse.com/show_bug.cgi?id=1224729
  * https://bugzilla.suse.com/show_bug.cgi?id=1224730
  * https://bugzilla.suse.com/show_bug.cgi?id=1224731
  * https://bugzilla.suse.com/show_bug.cgi?id=1224732
  * https://bugzilla.suse.com/show_bug.cgi?id=1224733
  * https://bugzilla.suse.com/show_bug.cgi?id=1224736
  * https://bugzilla.suse.com/show_bug.cgi?id=1224738
  * https://bugzilla.suse.com/show_bug.cgi?id=1224739
  * https://bugzilla.suse.com/show_bug.cgi?id=1224740
  * https://bugzilla.suse.com/show_bug.cgi?id=1224747
  * https://bugzilla.suse.com/show_bug.cgi?id=1224749
  * https://bugzilla.suse.com/show_bug.cgi?id=1224759
  * https://bugzilla.suse.com/show_bug.cgi?id=1224763
  * https://bugzilla.suse.com/show_bug.cgi?id=1224764
  * https://bugzilla.suse.com/show_bug.cgi?id=1224765
  * https://bugzilla.suse.com/show_bug.cgi?id=1224766
  * https://bugzilla.suse.com/show_bug.cgi?id=1224794
  * https://bugzilla.suse.com/show_bug.cgi?id=1224795
  * https://bugzilla.suse.com/show_bug.cgi?id=1224796
  * https://bugzilla.suse.com/show_bug.cgi?id=1224803
  * https://bugzilla.suse.com/show_bug.cgi?id=1224816
  * https://bugzilla.suse.com/show_bug.cgi?id=1224895
  * https://bugzilla.suse.com/show_bug.cgi?id=1224898
  * https://bugzilla.suse.com/show_bug.cgi?id=1224900
  * https://bugzilla.suse.com/show_bug.cgi?id=1224901
  * https://bugzilla.suse.com/show_bug.cgi?id=1224902
  * https://bugzilla.suse.com/show_bug.cgi?id=1224903
  * https://bugzilla.suse.com/show_bug.cgi?id=1224904
  * https://bugzilla.suse.com/show_bug.cgi?id=1224905
  * https://bugzilla.suse.com/show_bug.cgi?id=1224907
  * https://bugzilla.suse.com/show_bug.cgi?id=1224909
  * https://bugzilla.suse.com/show_bug.cgi?id=1224910
  * https://bugzilla.suse.com/show_bug.cgi?id=1224911
  * https://bugzilla.suse.com/show_bug.cgi?id=1224912
  * https://bugzilla.suse.com/show_bug.cgi?id=1224913
  * https://bugzilla.suse.com/show_bug.cgi?id=1224914
  * https://bugzilla.suse.com/show_bug.cgi?id=1224915
  * https://bugzilla.suse.com/show_bug.cgi?id=1224920
  * https://bugzilla.suse.com/show_bug.cgi?id=1224928
  * https://bugzilla.suse.com/show_bug.cgi?id=1224929
  * https://bugzilla.suse.com/show_bug.cgi?id=1224930
  * https://bugzilla.suse.com/show_bug.cgi?id=1224931
  * https://bugzilla.suse.com/show_bug.cgi?id=1224932
  * https://bugzilla.suse.com/show_bug.cgi?id=1224936
  * https://bugzilla.suse.com/show_bug.cgi?id=1224937
  * https://bugzilla.suse.com/show_bug.cgi?id=1224941
  * https://bugzilla.suse.com/show_bug.cgi?id=1224942
  * https://bugzilla.suse.com/show_bug.cgi?id=1224944
  * https://bugzilla.suse.com/show_bug.cgi?id=1224945
  * https://bugzilla.suse.com/show_bug.cgi?id=1224947
  * https://bugzilla.suse.com/show_bug.cgi?id=1224956
  * https://bugzilla.suse.com/show_bug.cgi?id=1224988
  * https://bugzilla.suse.com/show_bug.cgi?id=1224992
  * https://bugzilla.suse.com/show_bug.cgi?id=1225000
  * https://bugzilla.suse.com/show_bug.cgi?id=1225003
  * https://bugzilla.suse.com/show_bug.cgi?id=1225005
  * https://bugzilla.suse.com/show_bug.cgi?id=1225008
  * https://bugzilla.suse.com/show_bug.cgi?id=1225009
  * https://bugzilla.suse.com/show_bug.cgi?id=1225022
  * https://bugzilla.suse.com/show_bug.cgi?id=1225031
  * https://bugzilla.suse.com/show_bug.cgi?id=1225032
  * https://bugzilla.suse.com/show_bug.cgi?id=1225036
  * https://bugzilla.suse.com/show_bug.cgi?id=1225041
  * https://bugzilla.suse.com/show_bug.cgi?id=1225044
  * https://bugzilla.suse.com/show_bug.cgi?id=1225053
  * https://bugzilla.suse.com/show_bug.cgi?id=1225076
  * https://bugzilla.suse.com/show_bug.cgi?id=1225077
  * https://bugzilla.suse.com/show_bug.cgi?id=1225082
  * https://bugzilla.suse.com/show_bug.cgi?id=1225085
  * https://bugzilla.suse.com/show_bug.cgi?id=1225086
  * https://bugzilla.suse.com/show_bug.cgi?id=1225092
  * https://bugzilla.suse.com/show_bug.cgi?id=1225095
  * https://bugzilla.suse.com/show_bug.cgi?id=1225096
  * https://bugzilla.suse.com/show_bug.cgi?id=1225097
  * https://bugzilla.suse.com/show_bug.cgi?id=1225106
  * https://bugzilla.suse.com/show_bug.cgi?id=1225108
  * https://bugzilla.suse.com/show_bug.cgi?id=1225109
  * https://bugzilla.suse.com/show_bug.cgi?id=1225114
  * https://bugzilla.suse.com/show_bug.cgi?id=1225118
  * https://bugzilla.suse.com/show_bug.cgi?id=1225121
  * https://bugzilla.suse.com/show_bug.cgi?id=1225122
  * https://bugzilla.suse.com/show_bug.cgi?id=1225123
  * https://bugzilla.suse.com/show_bug.cgi?id=1225125
  * https://bugzilla.suse.com/show_bug.cgi?id=1225126
  * https://bugzilla.suse.com/show_bug.cgi?id=1225127
  * https://bugzilla.suse.com/show_bug.cgi?id=1225129
  * https://bugzilla.suse.com/show_bug.cgi?id=1225131
  * https://bugzilla.suse.com/show_bug.cgi?id=1225132
  * https://bugzilla.suse.com/show_bug.cgi?id=1225138
  * https://bugzilla.suse.com/show_bug.cgi?id=1225139
  * https://bugzilla.suse.com/show_bug.cgi?id=1225145
  * https://bugzilla.suse.com/show_bug.cgi?id=1225151
  * https://bugzilla.suse.com/show_bug.cgi?id=1225153
  * https://bugzilla.suse.com/show_bug.cgi?id=1225156
  * https://bugzilla.suse.com/show_bug.cgi?id=1225158
  * https://bugzilla.suse.com/show_bug.cgi?id=1225160
  * https://bugzilla.suse.com/show_bug.cgi?id=1225161
  * https://bugzilla.suse.com/show_bug.cgi?id=1225164
  * https://bugzilla.suse.com/show_bug.cgi?id=1225167
  * https://bugzilla.suse.com/show_bug.cgi?id=1225180
  * https://bugzilla.suse.com/show_bug.cgi?id=1225183
  * https://bugzilla.suse.com/show_bug.cgi?id=1225184
  * https://bugzilla.suse.com/show_bug.cgi?id=1225186
  * https://bugzilla.suse.com/show_bug.cgi?id=1225187
  * https://bugzilla.suse.com/show_bug.cgi?id=1225189
  * https://bugzilla.suse.com/show_bug.cgi?id=1225190
  * https://bugzilla.suse.com/show_bug.cgi?id=1225191
  * https://bugzilla.suse.com/show_bug.cgi?id=1225192
  * https://bugzilla.suse.com/show_bug.cgi?id=1225193
  * https://bugzilla.suse.com/show_bug.cgi?id=1225195
  * https://bugzilla.suse.com/show_bug.cgi?id=1225198
  * https://bugzilla.suse.com/show_bug.cgi?id=1225201
  * https://bugzilla.suse.com/show_bug.cgi?id=1225203
  * https://bugzilla.suse.com/show_bug.cgi?id=1225205
  * https://bugzilla.suse.com/show_bug.cgi?id=1225206
  * https://bugzilla.suse.com/show_bug.cgi?id=1225207
  * https://bugzilla.suse.com/show_bug.cgi?id=1225208
  * https://bugzilla.suse.com/show_bug.cgi?id=1225209
  * https://bugzilla.suse.com/show_bug.cgi?id=1225210
  * https://bugzilla.suse.com/show_bug.cgi?id=1225214
  * https://bugzilla.suse.com/show_bug.cgi?id=1225222
  * https://bugzilla.suse.com/show_bug.cgi?id=1225223
  * https://bugzilla.suse.com/show_bug.cgi?id=1225224
  * https://bugzilla.suse.com/show_bug.cgi?id=1225225
  * https://bugzilla.suse.com/show_bug.cgi?id=1225227
  * https://bugzilla.suse.com/show_bug.cgi?id=1225228
  * https://bugzilla.suse.com/show_bug.cgi?id=1225229
  * https://bugzilla.suse.com/show_bug.cgi?id=1225230
  * https://bugzilla.suse.com/show_bug.cgi?id=1225232
  * https://bugzilla.suse.com/show_bug.cgi?id=1225233
  * https://bugzilla.suse.com/show_bug.cgi?id=1225235
  * https://bugzilla.suse.com/show_bug.cgi?id=1225236
  * https://bugzilla.suse.com/show_bug.cgi?id=1225237
  * https://bugzilla.suse.com/show_bug.cgi?id=1225238
  * https://bugzilla.suse.com/show_bug.cgi?id=1225239
  * https://bugzilla.suse.com/show_bug.cgi?id=1225240
  * https://bugzilla.suse.com/show_bug.cgi?id=1225241
  * https://bugzilla.suse.com/show_bug.cgi?id=1225242
  * https://bugzilla.suse.com/show_bug.cgi?id=1225243
  * https://bugzilla.suse.com/show_bug.cgi?id=1225244
  * https://bugzilla.suse.com/show_bug.cgi?id=1225245
  * https://bugzilla.suse.com/show_bug.cgi?id=1225246
  * https://bugzilla.suse.com/show_bug.cgi?id=1225247
  * https://bugzilla.suse.com/show_bug.cgi?id=1225248
  * https://bugzilla.suse.com/show_bug.cgi?id=1225249
  * https://bugzilla.suse.com/show_bug.cgi?id=1225250
  * https://bugzilla.suse.com/show_bug.cgi?id=1225251
  * https://bugzilla.suse.com/show_bug.cgi?id=1225252
  * https://bugzilla.suse.com/show_bug.cgi?id=1225253
  * https://bugzilla.suse.com/show_bug.cgi?id=1225254
  * https://bugzilla.suse.com/show_bug.cgi?id=1225255
  * https://bugzilla.suse.com/show_bug.cgi?id=1225256
  * https://bugzilla.suse.com/show_bug.cgi?id=1225257
  * https://bugzilla.suse.com/show_bug.cgi?id=1225258
  * https://bugzilla.suse.com/show_bug.cgi?id=1225259
  * https://bugzilla.suse.com/show_bug.cgi?id=1225260
  * https://bugzilla.suse.com/show_bug.cgi?id=1225261
  * https://bugzilla.suse.com/show_bug.cgi?id=1225262
  * https://bugzilla.suse.com/show_bug.cgi?id=1225263
  * https://bugzilla.suse.com/show_bug.cgi?id=1225268
  * https://bugzilla.suse.com/show_bug.cgi?id=1225301
  * https://bugzilla.suse.com/show_bug.cgi?id=1225303
  * https://bugzilla.suse.com/show_bug.cgi?id=1225304
  * https://bugzilla.suse.com/show_bug.cgi?id=1225306
  * https://bugzilla.suse.com/show_bug.cgi?id=1225316
  * https://bugzilla.suse.com/show_bug.cgi?id=1225318
  * https://bugzilla.suse.com/show_bug.cgi?id=1225320
  * https://bugzilla.suse.com/show_bug.cgi?id=1225321
  * https://bugzilla.suse.com/show_bug.cgi?id=1225322
  * https://bugzilla.suse.com/show_bug.cgi?id=1225323
  * https://bugzilla.suse.com/show_bug.cgi?id=1225326
  * https://bugzilla.suse.com/show_bug.cgi?id=1225327
  * https://bugzilla.suse.com/show_bug.cgi?id=1225328
  * https://bugzilla.suse.com/show_bug.cgi?id=1225329
  * https://bugzilla.suse.com/show_bug.cgi?id=1225330
  * https://bugzilla.suse.com/show_bug.cgi?id=1225331
  * https://bugzilla.suse.com/show_bug.cgi?id=1225332
  * https://bugzilla.suse.com/show_bug.cgi?id=1225333
  * https://bugzilla.suse.com/show_bug.cgi?id=1225334
  * https://bugzilla.suse.com/show_bug.cgi?id=1225335
  * https://bugzilla.suse.com/show_bug.cgi?id=1225336
  * https://bugzilla.suse.com/show_bug.cgi?id=1225337
  * https://bugzilla.suse.com/show_bug.cgi?id=1225338
  * https://bugzilla.suse.com/show_bug.cgi?id=1225339
  * https://bugzilla.suse.com/show_bug.cgi?id=1225341
  * https://bugzilla.suse.com/show_bug.cgi?id=1225342
  * https://bugzilla.suse.com/show_bug.cgi?id=1225344
  * https://bugzilla.suse.com/show_bug.cgi?id=1225346
  * https://bugzilla.suse.com/show_bug.cgi?id=1225347
  * https://bugzilla.suse.com/show_bug.cgi?id=1225351
  * https://bugzilla.suse.com/show_bug.cgi?id=1225353
  * https://bugzilla.suse.com/show_bug.cgi?id=1225354
  * https://bugzilla.suse.com/show_bug.cgi?id=1225355
  * https://bugzilla.suse.com/show_bug.cgi?id=1225357
  * https://bugzilla.suse.com/show_bug.cgi?id=1225358
  * https://bugzilla.suse.com/show_bug.cgi?id=1225360
  * https://bugzilla.suse.com/show_bug.cgi?id=1225361
  * https://bugzilla.suse.com/show_bug.cgi?id=1225366
  * https://bugzilla.suse.com/show_bug.cgi?id=1225367
  * https://bugzilla.suse.com/show_bug.cgi?id=1225368
  * https://bugzilla.suse.com/show_bug.cgi?id=1225369
  * https://bugzilla.suse.com/show_bug.cgi?id=1225370
  * https://bugzilla.suse.com/show_bug.cgi?id=1225372
  * https://bugzilla.suse.com/show_bug.cgi?id=1225373
  * https://bugzilla.suse.com/show_bug.cgi?id=1225374
  * https://bugzilla.suse.com/show_bug.cgi?id=1225375
  * https://bugzilla.suse.com/show_bug.cgi?id=1225376
  * https://bugzilla.suse.com/show_bug.cgi?id=1225377
  * https://bugzilla.suse.com/show_bug.cgi?id=1225379
  * https://bugzilla.suse.com/show_bug.cgi?id=1225380
  * https://bugzilla.suse.com/show_bug.cgi?id=1225382
  * https://bugzilla.suse.com/show_bug.cgi?id=1225383
  * https://bugzilla.suse.com/show_bug.cgi?id=1225384
  * https://bugzilla.suse.com/show_bug.cgi?id=1225386
  * https://bugzilla.suse.com/show_bug.cgi?id=1225387
  * https://bugzilla.suse.com/show_bug.cgi?id=1225388
  * https://bugzilla.suse.com/show_bug.cgi?id=1225390
  * https://bugzilla.suse.com/show_bug.cgi?id=1225392
  * https://bugzilla.suse.com/show_bug.cgi?id=1225393
  * https://bugzilla.suse.com/show_bug.cgi?id=1225396
  * https://bugzilla.suse.com/show_bug.cgi?id=1225400
  * https://bugzilla.suse.com/show_bug.cgi?id=1225404
  * https://bugzilla.suse.com/show_bug.cgi?id=1225405
  * https://bugzilla.suse.com/show_bug.cgi?id=1225408
  * https://bugzilla.suse.com/show_bug.cgi?id=1225409
  * https://bugzilla.suse.com/show_bug.cgi?id=1225410
  * https://bugzilla.suse.com/show_bug.cgi?id=1225411
  * https://bugzilla.suse.com/show_bug.cgi?id=1225424
  * https://bugzilla.suse.com/show_bug.cgi?id=1225425
  * https://bugzilla.suse.com/show_bug.cgi?id=1225427
  * https://bugzilla.suse.com/show_bug.cgi?id=1225431
  * https://bugzilla.suse.com/show_bug.cgi?id=1225435
  * https://bugzilla.suse.com/show_bug.cgi?id=1225436
  * https://bugzilla.suse.com/show_bug.cgi?id=1225437
  * https://bugzilla.suse.com/show_bug.cgi?id=1225438
  * https://bugzilla.suse.com/show_bug.cgi?id=1225439
  * https://bugzilla.suse.com/show_bug.cgi?id=1225441
  * https://bugzilla.suse.com/show_bug.cgi?id=1225442
  * https://bugzilla.suse.com/show_bug.cgi?id=1225443
  * https://bugzilla.suse.com/show_bug.cgi?id=1225444
  * https://bugzilla.suse.com/show_bug.cgi?id=1225445
  * https://bugzilla.suse.com/show_bug.cgi?id=1225446
  * https://bugzilla.suse.com/show_bug.cgi?id=1225447
  * https://bugzilla.suse.com/show_bug.cgi?id=1225450
  * https://bugzilla.suse.com/show_bug.cgi?id=1225453
  * https://bugzilla.suse.com/show_bug.cgi?id=1225455
  * https://bugzilla.suse.com/show_bug.cgi?id=1225461
  * https://bugzilla.suse.com/show_bug.cgi?id=1225463
  * https://bugzilla.suse.com/show_bug.cgi?id=1225464
  * https://bugzilla.suse.com/show_bug.cgi?id=1225466
  * https://bugzilla.suse.com/show_bug.cgi?id=1225467
  * https://bugzilla.suse.com/show_bug.cgi?id=1225468
  * https://bugzilla.suse.com/show_bug.cgi?id=1225471
  * https://bugzilla.suse.com/show_bug.cgi?id=1225472
  * https://bugzilla.suse.com/show_bug.cgi?id=1225478
  * https://bugzilla.suse.com/show_bug.cgi?id=1225479
  * https://bugzilla.suse.com/show_bug.cgi?id=1225480
  * https://bugzilla.suse.com/show_bug.cgi?id=1225482
  * https://bugzilla.suse.com/show_bug.cgi?id=1225483
  * https://bugzilla.suse.com/show_bug.cgi?id=1225486
  * https://bugzilla.suse.com/show_bug.cgi?id=1225488
  * https://bugzilla.suse.com/show_bug.cgi?id=1225490
  * https://bugzilla.suse.com/show_bug.cgi?id=1225492
  * https://bugzilla.suse.com/show_bug.cgi?id=1225495
  * https://bugzilla.suse.com/show_bug.cgi?id=1225499
  * https://bugzilla.suse.com/show_bug.cgi?id=1225500
  * https://bugzilla.suse.com/show_bug.cgi?id=1225501
  * https://bugzilla.suse.com/show_bug.cgi?id=1225502
  * https://bugzilla.suse.com/show_bug.cgi?id=1225506
  * https://bugzilla.suse.com/show_bug.cgi?id=1225508
  * https://bugzilla.suse.com/show_bug.cgi?id=1225510
  * https://bugzilla.suse.com/show_bug.cgi?id=1225513
  * https://bugzilla.suse.com/show_bug.cgi?id=1225515
  * https://bugzilla.suse.com/show_bug.cgi?id=1225529
  * https://bugzilla.suse.com/show_bug.cgi?id=1225530
  * https://bugzilla.suse.com/show_bug.cgi?id=1225532
  * https://bugzilla.suse.com/show_bug.cgi?id=1225534
  * https://bugzilla.suse.com/show_bug.cgi?id=1225535
  * https://bugzilla.suse.com/show_bug.cgi?id=1225548
  * https://bugzilla.suse.com/show_bug.cgi?id=1225549
  * https://bugzilla.suse.com/show_bug.cgi?id=1225550
  * https://bugzilla.suse.com/show_bug.cgi?id=1225553
  * https://bugzilla.suse.com/show_bug.cgi?id=1225554
  * https://bugzilla.suse.com/show_bug.cgi?id=1225555
  * https://bugzilla.suse.com/show_bug.cgi?id=1225556
  * https://bugzilla.suse.com/show_bug.cgi?id=1225557
  * https://bugzilla.suse.com/show_bug.cgi?id=1225559
  * https://bugzilla.suse.com/show_bug.cgi?id=1225560
  * https://bugzilla.suse.com/show_bug.cgi?id=1225565
  * https://bugzilla.suse.com/show_bug.cgi?id=1225566
  * https://bugzilla.suse.com/show_bug.cgi?id=1225568
  * https://bugzilla.suse.com/show_bug.cgi?id=1225569
  * https://bugzilla.suse.com/show_bug.cgi?id=1225570
  * https://bugzilla.suse.com/show_bug.cgi?id=1225571
  * https://bugzilla.suse.com/show_bug.cgi?id=1225572
  * https://bugzilla.suse.com/show_bug.cgi?id=1225577
  * https://bugzilla.suse.com/show_bug.cgi?id=1225583
  * https://bugzilla.suse.com/show_bug.cgi?id=1225584
  * https://bugzilla.suse.com/show_bug.cgi?id=1225587
  * https://bugzilla.suse.com/show_bug.cgi?id=1225588
  * https://bugzilla.suse.com/show_bug.cgi?id=1225589
  * https://bugzilla.suse.com/show_bug.cgi?id=1225590
  * https://bugzilla.suse.com/show_bug.cgi?id=1225591
  * https://bugzilla.suse.com/show_bug.cgi?id=1225592
  * https://bugzilla.suse.com/show_bug.cgi?id=1225593
  * https://bugzilla.suse.com/show_bug.cgi?id=1225595
  * https://bugzilla.suse.com/show_bug.cgi?id=1225599
  * https://bugzilla.suse.com/show_bug.cgi?id=1225616
  * https://bugzilla.suse.com/show_bug.cgi?id=1225640
  * https://bugzilla.suse.com/show_bug.cgi?id=1225642
  * https://bugzilla.suse.com/show_bug.cgi?id=1225705
  * https://bugzilla.suse.com/show_bug.cgi?id=1225708
  * https://bugzilla.suse.com/show_bug.cgi?id=1225715
  * https://bugzilla.suse.com/show_bug.cgi?id=1225720
  * https://bugzilla.suse.com/show_bug.cgi?id=1225722
  * https://bugzilla.suse.com/show_bug.cgi?id=1225734
  * https://bugzilla.suse.com/show_bug.cgi?id=1225735
  * https://bugzilla.suse.com/show_bug.cgi?id=1225747
  * https://bugzilla.suse.com/show_bug.cgi?id=1225748
  * https://bugzilla.suse.com/show_bug.cgi?id=1225756
  * https://bugzilla.suse.com/show_bug.cgi?id=1225761
  * https://bugzilla.suse.com/show_bug.cgi?id=1225766
  * https://bugzilla.suse.com/show_bug.cgi?id=1225775
  * https://bugzilla.suse.com/show_bug.cgi?id=1225810
  * https://bugzilla.suse.com/show_bug.cgi?id=1225820
  * https://bugzilla.suse.com/show_bug.cgi?id=1225829
  * https://bugzilla.suse.com/show_bug.cgi?id=1225835
  * https://bugzilla.suse.com/show_bug.cgi?id=1225842
  * https://jira.suse.com/browse/PED-3259
  * https://jira.suse.com/browse/PED-7167

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240625/73c823e8/attachment.htm>


More information about the sle-updates mailing list