SUSE-SU-2024:3985-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Wed Nov 13 12:42:07 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3985-1  
Release Date: 2024-11-13T10:13:42Z  
Rating: important  
References:

  * bsc#1054914
  * bsc#1065729
  * bsc#1194869
  * bsc#1204171
  * bsc#1205796
  * bsc#1206188
  * bsc#1206344
  * bsc#1209290
  * bsc#1210449
  * bsc#1210627
  * bsc#1213034
  * bsc#1216813
  * bsc#1218562
  * bsc#1223384
  * bsc#1223524
  * bsc#1223824
  * bsc#1225189
  * bsc#1225336
  * bsc#1225611
  * bsc#1225762
  * bsc#1226498
  * bsc#1226631
  * bsc#1226797
  * bsc#1227437
  * bsc#1227885
  * bsc#1228119
  * bsc#1228269
  * bsc#1228709
  * bsc#1228743
  * bsc#1228747
  * bsc#1229005
  * bsc#1229019
  * bsc#1229450
  * bsc#1229454
  * bsc#1229456
  * bsc#1229556
  * bsc#1229769
  * bsc#1229837
  * bsc#1229891
  * bsc#1230055
  * bsc#1230179
  * bsc#1230289
  * bsc#1230405
  * bsc#1230414
  * bsc#1230429
  * bsc#1230456
  * bsc#1230550
  * bsc#1230600
  * bsc#1230620
  * bsc#1230715
  * bsc#1230722
  * bsc#1230763
  * bsc#1230773
  * bsc#1230774
  * bsc#1230801
  * bsc#1230903
  * bsc#1230918
  * bsc#1231016
  * bsc#1231072
  * bsc#1231073
  * bsc#1231084
  * bsc#1231085
  * bsc#1231087
  * bsc#1231094
  * bsc#1231096
  * bsc#1231105
  * bsc#1231114
  * bsc#1231115
  * bsc#1231148
  * bsc#1231179
  * bsc#1231191
  * bsc#1231193
  * bsc#1231195
  * bsc#1231197
  * bsc#1231200
  * bsc#1231203
  * bsc#1231277
  * bsc#1231293
  * bsc#1231327
  * bsc#1231344
  * bsc#1231375
  * bsc#1231383
  * bsc#1231439
  * bsc#1231442
  * bsc#1231496
  * bsc#1231502
  * bsc#1231539
  * bsc#1231540
  * bsc#1231578
  * bsc#1231673
  * bsc#1231857
  * bsc#1231861
  * bsc#1231872
  * bsc#1231883
  * bsc#1231885
  * bsc#1231887
  * bsc#1231888
  * bsc#1231889
  * bsc#1231890
  * bsc#1231892
  * bsc#1231893
  * bsc#1231895
  * bsc#1231896
  * bsc#1231897
  * bsc#1231902
  * bsc#1231903
  * bsc#1231907
  * bsc#1231914
  * bsc#1231929
  * bsc#1231935
  * bsc#1231936
  * bsc#1231937
  * bsc#1231938
  * bsc#1231939
  * bsc#1231940
  * bsc#1231941
  * bsc#1231942
  * bsc#1231944
  * bsc#1231950
  * bsc#1231954
  * bsc#1231958
  * bsc#1231960
  * bsc#1231961
  * bsc#1231962
  * bsc#1231965
  * bsc#1231967
  * bsc#1231968
  * bsc#1231972
  * bsc#1231973
  * bsc#1231976
  * bsc#1231979
  * bsc#1231987
  * bsc#1231988
  * bsc#1231990
  * bsc#1231991
  * bsc#1231992
  * bsc#1231995
  * bsc#1231996
  * bsc#1231997
  * bsc#1231998
  * bsc#1232001
  * bsc#1232004
  * bsc#1232005
  * bsc#1232006
  * bsc#1232007
  * bsc#1232025
  * bsc#1232026
  * bsc#1232033
  * bsc#1232034
  * bsc#1232035
  * bsc#1232036
  * bsc#1232037
  * bsc#1232038
  * bsc#1232039
  * bsc#1232043
  * bsc#1232049
  * bsc#1232067
  * bsc#1232069
  * bsc#1232070
  * bsc#1232071
  * bsc#1232075
  * bsc#1232083
  * bsc#1232084
  * bsc#1232085
  * bsc#1232089
  * bsc#1232097
  * bsc#1232104
  * bsc#1232105
  * bsc#1232108
  * bsc#1232114
  * bsc#1232116
  * bsc#1232119
  * bsc#1232120
  * bsc#1232123
  * bsc#1232124
  * bsc#1232133
  * bsc#1232135
  * bsc#1232136
  * bsc#1232140
  * bsc#1232145
  * bsc#1232149
  * bsc#1232150
  * bsc#1232151
  * bsc#1232154
  * bsc#1232155
  * bsc#1232160
  * bsc#1232163
  * bsc#1232164
  * bsc#1232170
  * bsc#1232172
  * bsc#1232174
  * bsc#1232175
  * bsc#1232191
  * bsc#1232196
  * bsc#1232199
  * bsc#1232200
  * bsc#1232201
  * bsc#1232217
  * bsc#1232220
  * bsc#1232221
  * bsc#1232229
  * bsc#1232233
  * bsc#1232237
  * bsc#1232251
  * bsc#1232253
  * bsc#1232259
  * bsc#1232260
  * bsc#1232262
  * bsc#1232263
  * bsc#1232282
  * bsc#1232285
  * bsc#1232286
  * bsc#1232304
  * bsc#1232305
  * bsc#1232307
  * bsc#1232309
  * bsc#1232310
  * bsc#1232313
  * bsc#1232314
  * bsc#1232316
  * bsc#1232329
  * bsc#1232332
  * bsc#1232335
  * bsc#1232337
  * bsc#1232342
  * bsc#1232345
  * bsc#1232352
  * bsc#1232354
  * bsc#1232355
  * bsc#1232358
  * bsc#1232361
  * bsc#1232366
  * bsc#1232367
  * bsc#1232368
  * bsc#1232369
  * bsc#1232374
  * bsc#1232381
  * bsc#1232383
  * bsc#1232392
  * bsc#1232395
  * bsc#1232418
  * bsc#1232424
  * bsc#1232432
  * bsc#1232435
  * bsc#1232442
  * bsc#1232446
  * bsc#1232501
  * bsc#1232519
  * bsc#1232630
  * bsc#1232631
  * bsc#1232632
  * bsc#1232757

  
Cross-References:

  * CVE-2021-47416
  * CVE-2021-47534
  * CVE-2022-3435
  * CVE-2022-45934
  * CVE-2022-48664
  * CVE-2022-48879
  * CVE-2022-48946
  * CVE-2022-48947
  * CVE-2022-48948
  * CVE-2022-48949
  * CVE-2022-48951
  * CVE-2022-48953
  * CVE-2022-48954
  * CVE-2022-48955
  * CVE-2022-48956
  * CVE-2022-48957
  * CVE-2022-48958
  * CVE-2022-48959
  * CVE-2022-48960
  * CVE-2022-48961
  * CVE-2022-48962
  * CVE-2022-48966
  * CVE-2022-48967
  * CVE-2022-48968
  * CVE-2022-48969
  * CVE-2022-48970
  * CVE-2022-48971
  * CVE-2022-48972
  * CVE-2022-48973
  * CVE-2022-48975
  * CVE-2022-48977
  * CVE-2022-48978
  * CVE-2022-48980
  * CVE-2022-48981
  * CVE-2022-48985
  * CVE-2022-48987
  * CVE-2022-48988
  * CVE-2022-48991
  * CVE-2022-48992
  * CVE-2022-48994
  * CVE-2022-48995
  * CVE-2022-48997
  * CVE-2022-48999
  * CVE-2022-49000
  * CVE-2022-49002
  * CVE-2022-49003
  * CVE-2022-49005
  * CVE-2022-49006
  * CVE-2022-49007
  * CVE-2022-49010
  * CVE-2022-49011
  * CVE-2022-49012
  * CVE-2022-49014
  * CVE-2022-49015
  * CVE-2022-49016
  * CVE-2022-49017
  * CVE-2022-49019
  * CVE-2022-49020
  * CVE-2022-49021
  * CVE-2022-49022
  * CVE-2022-49023
  * CVE-2022-49024
  * CVE-2022-49025
  * CVE-2022-49026
  * CVE-2022-49027
  * CVE-2022-49028
  * CVE-2022-49029
  * CVE-2022-49031
  * CVE-2022-49032
  * CVE-2023-2166
  * CVE-2023-28327
  * CVE-2023-52766
  * CVE-2023-52800
  * CVE-2023-52881
  * CVE-2023-52919
  * CVE-2023-6270
  * CVE-2024-27043
  * CVE-2024-36244
  * CVE-2024-36957
  * CVE-2024-39476
  * CVE-2024-40965
  * CVE-2024-42145
  * CVE-2024-42226
  * CVE-2024-42253
  * CVE-2024-44931
  * CVE-2024-44947
  * CVE-2024-44958
  * CVE-2024-45016
  * CVE-2024-45025
  * CVE-2024-46678
  * CVE-2024-46716
  * CVE-2024-46719
  * CVE-2024-46754
  * CVE-2024-46770
  * CVE-2024-46775
  * CVE-2024-46777
  * CVE-2024-46809
  * CVE-2024-46811
  * CVE-2024-46813
  * CVE-2024-46814
  * CVE-2024-46815
  * CVE-2024-46816
  * CVE-2024-46817
  * CVE-2024-46818
  * CVE-2024-46826
  * CVE-2024-46828
  * CVE-2024-46834
  * CVE-2024-46840
  * CVE-2024-46841
  * CVE-2024-46848
  * CVE-2024-46849
  * CVE-2024-46854
  * CVE-2024-46855
  * CVE-2024-46857
  * CVE-2024-47660
  * CVE-2024-47661
  * CVE-2024-47664
  * CVE-2024-47668
  * CVE-2024-47672
  * CVE-2024-47673
  * CVE-2024-47674
  * CVE-2024-47684
  * CVE-2024-47685
  * CVE-2024-47692
  * CVE-2024-47704
  * CVE-2024-47705
  * CVE-2024-47706
  * CVE-2024-47707
  * CVE-2024-47710
  * CVE-2024-47720
  * CVE-2024-47727
  * CVE-2024-47730
  * CVE-2024-47738
  * CVE-2024-47739
  * CVE-2024-47745
  * CVE-2024-47747
  * CVE-2024-47748
  * CVE-2024-49858
  * CVE-2024-49860
  * CVE-2024-49866
  * CVE-2024-49867
  * CVE-2024-49881
  * CVE-2024-49882
  * CVE-2024-49883
  * CVE-2024-49886
  * CVE-2024-49890
  * CVE-2024-49892
  * CVE-2024-49894
  * CVE-2024-49895
  * CVE-2024-49896
  * CVE-2024-49897
  * CVE-2024-49899
  * CVE-2024-49901
  * CVE-2024-49906
  * CVE-2024-49908
  * CVE-2024-49909
  * CVE-2024-49911
  * CVE-2024-49912
  * CVE-2024-49913
  * CVE-2024-49914
  * CVE-2024-49917
  * CVE-2024-49918
  * CVE-2024-49919
  * CVE-2024-49920
  * CVE-2024-49922
  * CVE-2024-49923
  * CVE-2024-49929
  * CVE-2024-49930
  * CVE-2024-49933
  * CVE-2024-49936
  * CVE-2024-49939
  * CVE-2024-49946
  * CVE-2024-49949
  * CVE-2024-49954
  * CVE-2024-49955
  * CVE-2024-49958
  * CVE-2024-49959
  * CVE-2024-49960
  * CVE-2024-49962
  * CVE-2024-49967
  * CVE-2024-49969
  * CVE-2024-49973
  * CVE-2024-49974
  * CVE-2024-49975
  * CVE-2024-49982
  * CVE-2024-49991
  * CVE-2024-49993
  * CVE-2024-49995
  * CVE-2024-49996
  * CVE-2024-50000
  * CVE-2024-50001
  * CVE-2024-50002
  * CVE-2024-50006
  * CVE-2024-50014
  * CVE-2024-50019
  * CVE-2024-50024
  * CVE-2024-50028
  * CVE-2024-50033
  * CVE-2024-50035
  * CVE-2024-50041
  * CVE-2024-50045
  * CVE-2024-50046
  * CVE-2024-50047
  * CVE-2024-50048
  * CVE-2024-50049
  * CVE-2024-50055
  * CVE-2024-50058
  * CVE-2024-50059
  * CVE-2024-50061
  * CVE-2024-50063
  * CVE-2024-50081

  
CVSS scores:

  * CVE-2021-47416 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47534 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47534 ( NVD ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-3435 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-3435 ( NVD ):  4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2022-45934 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-45934 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48879 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48879 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48946 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48946 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48946 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48947 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48947 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48948 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48948 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48948 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48949 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48949 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48949 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48951 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48951 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48951 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48953 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48953 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48954 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48954 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48954 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48955 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48955 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48956 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48956 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48957 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48957 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48957 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48958 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48959 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48959 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48959 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48960 ( SUSE ):  9.2
    CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48960 ( SUSE ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48960 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48961 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48961 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48961 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48962 ( SUSE ):  7.2
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48962 ( SUSE ):  8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2022-48962 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48966 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48966 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48966 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-48967 ( SUSE ):  7.0
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48967 ( SUSE ):  7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2022-48967 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2022-48968 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48968 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48968 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48969 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48969 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48970 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48971 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48971 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48971 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48972 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48972 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48972 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48973 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48973 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-48973 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48975 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48975 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48977 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48977 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48978 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48978 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-48978 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48980 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48980 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-48980 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48981 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48981 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-48981 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48985 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48987 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48987 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48987 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48988 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48988 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48988 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48991 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48991 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48991 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48992 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48992 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48992 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48994 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-48994 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2022-48994 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48995 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48995 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48995 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48997 ( SUSE ):  1.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-48997 ( SUSE ):  2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
  * CVE-2022-48997 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48999 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48999 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-49000 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49000 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49000 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49002 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49002 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49002 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49003 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49003 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49003 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49005 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-49005 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  * CVE-2022-49005 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49006 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49006 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49006 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49007 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49007 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49010 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49010 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49011 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49011 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49012 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49012 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49014 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49014 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49015 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49015 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49017 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49019 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49020 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49020 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49020 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49021 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49021 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49022 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49022 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49023 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49023 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49024 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49024 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49025 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49025 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49026 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49026 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49027 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49027 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-49028 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49028 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49029 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49029 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49031 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49031 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-49032 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49032 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-2166 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-2166 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-28327 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-28327 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52800 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52881 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52919 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-6270 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6270 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27043 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36244 ( SUSE ):  3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
  * CVE-2024-36957 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-39476 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39476 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40965 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40965 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42145 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42145 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42226 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42226 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42253 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42253 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-42253 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44931 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-44931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44931 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44947 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
  * CVE-2024-44947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44947 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44958 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45016 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-45016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45025 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45025 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46678 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
  * CVE-2024-46678 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46678 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46716 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-46719 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46719 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46754 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46754 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46770 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46770 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46775 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46777 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46809 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46809 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46809 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46811 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46811 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46813 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46813 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46813 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46814 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46814 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46814 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46815 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46815 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46816 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46816 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46817 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46817 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46818 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46818 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46818 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46834 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46834 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46840 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46840 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46841 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46848 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46848 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46849 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46849 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46854 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-46854 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46855 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46857 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47660 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47660 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47660 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47661 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47661 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-47661 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47664 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47664 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47664 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47668 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47668 ( SUSE ):  4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-47668 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47672 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47672 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47673 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47673 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47674 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47674 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47674 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47684 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47684 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47684 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47685 ( SUSE ):  6.3
    CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47685 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  * CVE-2024-47685 ( NVD ):  9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-47692 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47692 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47692 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47704 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47704 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47704 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47705 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47705 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47705 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47706 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47706 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47706 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47707 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47707 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47707 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47710 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47710 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47710 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47720 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47720 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47720 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47727 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47727 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47727 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47730 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47730 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47738 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47738 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47739 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47739 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47745 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47745 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47745 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47747 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47747 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47747 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47748 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47748 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47748 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49858 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49858 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-49858 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49860 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49860 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49860 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49866 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49866 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49867 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49867 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49867 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49881 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49882 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49883 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49883 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49890 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49890 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49890 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49892 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49892 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49892 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49894 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49894 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-49894 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49895 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49895 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-49895 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49896 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49896 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49897 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49897 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49897 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49899 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49899 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49899 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49901 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49901 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49906 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49906 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49906 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49908 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49908 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49908 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49909 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49909 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49909 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49911 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49911 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49911 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49912 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49912 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49913 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49913 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49914 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49914 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49917 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49917 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49918 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49918 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49918 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49919 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49919 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49920 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49920 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49920 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49922 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49922 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49922 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49923 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49923 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49923 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49929 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49929 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49929 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49930 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49930 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49930 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49933 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49933 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49936 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49936 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49936 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49939 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49939 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49946 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49946 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49949 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49949 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49954 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49954 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49955 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49955 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49958 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49959 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49959 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49960 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49960 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49960 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49962 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49962 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49962 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49967 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49969 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49969 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49969 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49973 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49973 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49974 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49974 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49974 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49975 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49975 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49982 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49991 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49991 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49991 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49993 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49993 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49993 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49995 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-49995 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-49995 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49996 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49996 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50000 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50001 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50001 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50002 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50002 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50006 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50006 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50006 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50014 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50014 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50019 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50024 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50024 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50028 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50028 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50033 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50033 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50035 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50035 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50035 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50041 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50041 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50045 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50045 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50046 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50046 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50047 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50047 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50048 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50048 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50049 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50049 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50055 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50055 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50058 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50058 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50059 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50059 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50059 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50061 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50061 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50063 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50063 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50081 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50081 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * openSUSE Leap 15.5
  * openSUSE Leap Micro 5.5
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Live Patching 15-SP5
  * SUSE Linux Enterprise Micro 5.5
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Real Time Module 15-SP5

  
  
An update that solves 211 vulnerabilities and has 41 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
  * CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
  * CVE-2022-48957: dpaa2-switch: Fix memory leak in
    dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()
    (bsc#1231973).
  * CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in
    greth_init_rings() (bsc#1231889).
  * CVE-2022-48959: net: dsa: sja1105: fix memory leak in
    sja1105_setup_devlink_regions() (bsc#1231976).
  * CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx()
    (bsc#1231979).
  * CVE-2022-48962: net: hisilicon: Fix potential use-after-free in
    hisi_femac_rx() (bsc#1232286).
  * CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
  * CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in
    sja1105_init_l2_policing() (bsc#1232233).
  * CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow
    anon_vma (bsc#1232070).
  * CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
  * CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
  * CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open
    (bsc#1232175).
  * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
    entire cycle too (bsc#1226797).
  * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
    (bsc#1225762).
  * CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to
    clear MD_SB_CHANGE_PENDING (bsc#1227437).
  * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
    (bsc#1227885).
  * CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer
    events without TRB (bsc#1228709).
  * CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
    (bsc#1229005).
  * CVE-2024-44931: gpio: prevent potential speculation leaks in
    gpio_device_get_desc() (bsc#1229837).
  * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
    (bsc#1230179).
  * CVE-2024-45016: netem: fix return value if duplicate enqueue fails
    (bsc#1230429).
  * CVE-2024-45025: fix bitmap corruption on close_range() with
    CLOSE_RANGE_UNSHARE (bsc#1230456).
  * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex
    (bsc#1230550).
  * CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in
    msgdma_free_descriptor (bsc#1230715).
  * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
    (bsc#1230801).
  * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
    (bsc#1230763).
  * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
  * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
  * CVE-2024-46809: drm/amd/display: Check BIOS images before it is used
    (bsc#1231148).
  * CVE-2024-46811: drm/amd/display: Fix index may exceed array range within
    fpu_update_bw_bounding_box (bsc#1231179).
  * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
    (bsc#1231191).
  * CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation
    (bsc#1231193).
  * CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing
    reader_wm_sets (bsc#1231195).
  * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
    greater than max_links (bsc#1231197).
  * CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums
    greater than 6 (bsc#1231200).
  * CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index
    (bsc#1231203).
  * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
    (bsc#1231115).
  * CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma
    (bsc#1231114).
  * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
    indirection tables (bsc#1231096).
  * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
    (bsc#1231105).
  * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
    btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
  * CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
  * CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
  * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
  * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
  * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs
    (bsc#1231087).
  * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
  * CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t
    (bsc#1231496).
  * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
    provided by the firmware (bsc#1231442).
  * CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in
    __genradix_ptr_alloc() (bsc#1231502).
  * CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is
    dead (bsc#1231540).
  * CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
    (bsc#1231539).
  * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
    (bsc#1231673).
  * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
    (bsc#1231987).
  * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
    (bsc#1231998).
  * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
  * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
    using it (bsc#1231944).
  * CVE-2024-47705: block: fix potential invalid pointer dereference in
    blk_add_partition (bsc#1231872).
  * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
    (bsc#1231942).
  * CVE-2024-47707: ipv6: avoid possible NULL deref in
    rt6_uncached_list_flush_dev() (bsc#1231935).
  * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
    (bsc#1232049).
  * CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in
    dcn30_set_output_transfer_func (bsc#1232043).
  * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
  * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
    (bsc#1232075).
  * CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX
    either (bsc#1232114).
  * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
    seq_nr overflow (bsc#1232124).
  * CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
    LSMs in between (bsc#1232135).
  * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
    Due to Race Condition (bsc#1232145).
  * CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly
    (bsc#1232174).
  * CVE-2024-49860: ACPI: sysfs: validate return type of _STR method
    (bsc#1231861).
  * CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing
    (bsc#1232259).
  * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
  * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
    (bsc#1232200).
  * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
    (bsc#1232199).
  * CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds
    bug (bsc#1232196).
  * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
    (bsc#1232217).
  * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
    to 1 (bsc#1232220).
  * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
    format translation (bsc#1232354).
  * CVE-2024-49896: drm/amd/display: Check stream before comparing them
    (bsc#1232221).
  * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
    (bsc#1232355).
  * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
    (bsc#1232358).
  * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
    nullptrs (bsc#1232305).
  * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
    (bsc#1232332).
  * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
    dcn32_set_output_transfer_func (bsc#1232337).
  * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
    dcn20_set_output_transfer_func (bsc#1232366).
  * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
    (bsc#1232369).
  * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
    clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
  * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
    dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
  * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
    dcn201_acquire_free_pipe_for_layer (bsc#1231968).
  * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
    (bsc#1232313).
  * CVE-2024-49922: drm/amd/display: Check null pointers before using them
    (bsc#1232374).
  * CVE-2024-49923: drm/amd/display: Pass non-null to
    dcn20_validate_apply_pipe_split_flags (bsc#1232361).
  * CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference
    (bsc#1232253).
  * CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats
    (bsc#1232260).
  * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
  * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
    (bsc#1232424).
  * CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER
    (bsc#1232381).
  * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
    (bsc#1232164).
  * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
    UFO (bsc#1232160).
  * CVE-2024-49954: static_call: Replace pointless WARN_ON() in
    static_call_module_notify() (bsc#1232155).
  * CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a
    battery hook (bsc#1232154).
  * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
    reflink tree (bsc#1232151).
  * CVE-2024-49959: jbd2: stop waiting for space when
    jbd2_cleanup_journal_tail() returns error (bsc#1232149).
  * CVE-2024-49960: ext4: fix timer use-after-free on failed mount
    (bsc#1232395).
  * CVE-2024-49962: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
    acpi_db_convert_to_package() (bsc#1232314).
  * CVE-2024-49967: ext4: no need to continue when the number of entries is 1
    (bsc#1232140).
  * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
    transformation (bsc#1232519).
  * CVE-2024-49973: r8169: add tally counter fields added with RTL8125
    (bsc#1232105).
  * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
    (bsc#1232383).
  * CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma
    (bsc#1232104).
  * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
    (bsc#1232282).
  * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
    with 0 count (bsc#1232316).
  * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
  * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
    (bsc#1232089).
  * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
    (bsc#1232085).
  * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
    (bsc#1232084).
  * CVE-2024-50002: static_call: Handle module init failure correctly in
    static_call_del_module() (bsc#1232083).
  * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
    (bsc#1232442).
  * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
    (bsc#1232446).
  * CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
  * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
  * CVE-2024-50028: thermal: core: Reference count the zone in
    thermal_zone_get_by_id() (bsc#1231950).
  * CVE-2024-50033: slip: make slhc_remember() more robust against malicious
    packets (bsc#1231914).
  * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
  * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
    mac_filter_hash (bsc#1231907).
  * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
    (bsc#1231903).
  * CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in
    nfs42_complete_copies() (bsc#1231902).
  * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
  * CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs
    (bsc#1232310).
  * CVE-2024-50055: driver core: bus: Fix double free in driver API
    bus_register() (bsc#1232329).
  * CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too
    (bsc#1232285).
  * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
    switchtec_ntb_remove due to race condition (bsc#1232345).
  * CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in
    cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
  * CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
  * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
    (bsc#1232501).

The following non-security bugs were fixed:

  * ACPI: EC: Do not release locks during operation region accesses (stable-
    fixes).
  * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
  * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
  * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-
    fixes).
  * ACPI: battery: Call power_supply_changed() when adding hooks (bsc#1232154)
  * ACPI: battery: Simplify battery hook locking (bsc#1232154)
  * ACPI: resource: Add Asus ExpertBook B2502CVA to
    irq1_level_low_skip_override[] (stable-fixes).
  * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[]
    (stable-fixes).
  * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-
    fixes).
  * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
  * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
  * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
    acpi_db_convert_to_package() (stable-fixes).
  * ACPICA: iasl: handle empty connection_node (stable-fixes).
  * ALSA: asihpi: Fix potential OOB array access (stable-fixes).
  * ALSA: core: add isascii() check to card ID generator (stable-fixes).
  * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
    (git-fixes).
  * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-
    fixes).
  * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
    1000 G2 (git-fixes).
  * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
  * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
  * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).
  * ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
  * ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
  * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
  * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
  * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
  * ALSA: hda/realtek: Update default depop procedure (git-fixes).
  * ALSA: hda: Fix kctl->id initialization (git-fixes).
  * ALSA: hda: cs35l41: fix module autoloading (git-fixes).
  * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
  * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
  * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
  * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
  * ALSA: usb-audio: Add input value sanity checks for standard types (stable-
    fixes).
  * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
  * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
  * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
  * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
  * ASoC: allow module autoloading for table db1200_pids (stable-fixes).
  * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-
    fixes).
  * ASoC: intel: fix module autoloading (stable-fixes).
  * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
    (git-fixes).
  * ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-
    fixes).
  * ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
  * ASoC: tda7419: fix module autoloading (stable-fixes).
  * Bluetooth: Call iso_exit() on module unload (git-fixes).
  * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
  * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-
    fixes).
  * Bluetooth: Remove debugfs directory on module init failure (git-fixes).
  * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
  * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
  * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-
    fixes).
  * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
  * Drop HD-audio conexant patch that caused a regression on Thinkpad
    (bsc#1228269)
  * Drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342)
  * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
  * HID: multitouch: Add support for GT7868Q (stable-fixes).
  * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-
    fixes).
  * HID: plantronics: Workaround for an unexcepted opposite volume key (stable-
    fixes).
  * Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
  * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
  * Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
  * Input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).
  * Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
  * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-
    fixes).
  * KVM: Fix lockdep false negative during host resume (git-fixes).
  * KVM: Grab a reference to KVM for VM and vCPU stats file descriptors (git-
    fixes).
  * KVM: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).
  * KVM: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-
    fixes).
  * KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
  * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
    (git-fixes).
  * KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is
    missing (git-fixes).
  * KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE
    (git-fixes).
  * KVM: Unconditionally get a ref to /dev/kvm module when creating a VM (git-
    fixes).
  * KVM: Write the per-page "segment" when clearing (part of) a guest page (git-
    fixes).
  * KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd
    (git-fixes).
  * KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-
    fixes).
  * KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
  * KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
  * KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
    (git-fixes).
  * KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled
    (git-fixes).
  * KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
    (git-fixes).
  * KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
    (git-fixes).
  * KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
  * KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table()
    (git-fixes).
  * KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-
    fixes).
  * KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
  * KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-
    fixes).
  * KVM: eventfd: Fix false positive RCU usage warning (git-fixes).
  * KVM: fix memoryleak in kvm_init() (git-fixes).
  * KVM: s390: Change virtual to physical address access in diag 0x258 handler
    (git-fixes bsc#1232631).
  * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query
    (git-fixes bsc#1231277).
  * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes
    bsc#1232630).
  * KVM: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).
  * KVM: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).
  * KVM: x86: Use a stable condition around all VT-d PI paths (git-fixes).
  * Makefile.compiler: replace cc-ifversion with compiler-specific macros
    (bsc#1230414 bsc#1229450).
  * NFS: Avoid unnecessary rescanning of the per-server delegation list (git-
    fixes).
  * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
  * NFSD: Mark filecache "down" if init fails (git-fixes).
  * NFSv3: only use NFS timeout for MOUNT when protocols are compatible
    (bsc#1231016).
  * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
  * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
  * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
  * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
  * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
  * RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
  * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
  * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
  * RDMA/bnxt_re: Fix the GID table length (git-fixes)
  * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
  * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
  * RDMA/bnxt_re: Return more meaningful error (git-fixes)
  * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
  * RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
  * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
  * RDMA/hns: Remove unused abnormal interrupt of type RAS (git-fixes)
  * RDMA/irdma: Fix misspelling of "accept*" (git-fixes)
  * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
  * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page
    (git-fixes).
  * RDMA/mana_ib: use the correct page table index based on hardware page size
    (git-fixes).
  * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-
    fixes)
  * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-
    fixes)
  * RDMA/srpt: Make slab cache names unique (git-fixes)
  * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
  * SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
  * SUNRPC: clnt.c: Remove misleading comment (git-fixes).
  * USB: appledisplay: close race between probe and completion handler (stable-
    fixes).
  * USB: misc: cypress_cy7c63: check for short transfer (stable-fixes).
  * USB: misc: yurex: fix race between read and write (stable-fixes).
  * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
  * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
  * USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
  * Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
  * add bug reference for a mana change (bsc#1229769).
  * add bug references to existing mana changes (bsc#1232033, bsc#1232034,
    bsc#1232036).
  * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).
  * arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
  * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399
    Puma (git-fixes).
  * arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
  * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
  * arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
  * arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
  * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
  * block: print symbolic error name instead of error code (bsc#1231872).
  * bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
  * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
  * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
  * bpf, x64: Remove tail call detection (git-fixes).
  * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
  * bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to
    pahole flags for v1.25 (bsc#1230414 bsc#1229450).
  * bpf: Allow helpers to accept pointers with a fixed size (git-fixes).
  * bpf: Check for helper calls in check_subprogs() (git-fixes).
  * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
  * bpf: Fix helper writes to read-only maps (git-fixes).
  * bpf: Fix pointer-leak due to insufficient speculative store bypass
    mitigation (bsc#1231375).
  * bpf: Fix tailcall cases in test_bpf (git-fixes).
  * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
  * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-
    fixes).
  * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
  * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
  * btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).
  * bus: integrator-lm: fix OF node leak in probe() (git-fixes).
  * ceph: fix cap ref leak via netfs init_request (bsc#1231383).
  * char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-
    fixes).
  * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
  * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
    (bsc#1227885).
  * comedi: ni_routing: tools: Check when the file could not be opened (stable-
    fixes).
  * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems
    (git-fixes).
  * crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call
    (bsc#1232075)
  * crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF
    (bsc#1232075)
  * debugfs: fix automount d_fsdata usage (git-fixes).
  * dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown
    (bsc#1216813).
  * drbd: Add NULL check for net_conf to prevent dereference in state validation
    (git-fixes).
  * drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
  * driver core: bus: Return -EIO instead of 0 when show/store invalid bus
    attribute (stable-fixes).
  * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
  * drm/amd/display: Add null check for 'afb' in
    amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).
  * drm/amd/display: Add null check for top_pipe_to_program in
    commit_planes_for_stream (stable-fixes).
  * drm/amd/display: Allow backlight to go below
    `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
  * drm/amd/display: Check link_res->hpo_dp_link_enc before using it
    (bsc#1231944)
  * drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
  * drm/amd/display: Check null pointers before using dc->clk_mgr (stable-
    fixes).
  * drm/amd/display: Check stream before comparing them (stable-fixes).
  * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-
    fixes).
  * drm/amd/display: Fix index out of bounds in DCN30 color transformation
    (stable-fixes).
  * drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format
    translation (stable-fixes).
  * drm/amd/display: Fix index out of bounds in degamma hardware format
    translation (stable-fixes).
  * drm/amd/display: Fix system hang while resume with TBT monitor (stable-
    fixes).
  * drm/amd/display: Handle null 'stream_status' in
    'planes_changed_for_existing_stream' (stable-fixes).
  * drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-
    fixes).
  * drm/amd/display: Round calculated vtotal (stable-fixes).
  * drm/amd/display: Validate backlight caps are sane (stable-fixes).
  * drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).
  * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
  * drm/amdgpu: Replace one-element array with flexible-array member (stable-
    fixes).
  * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
  * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-
    fixes).
  * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
  * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-
    fixes).
  * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
  * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
  * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
  * drm/msm/dpu: do not always program merge_3d block (git-fixes).
  * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
  * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
    (git-fixes).
  * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
  * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
  * drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
  * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-
    fixes).
  * drm/radeon: Fix encoder->possible_clones (git-fixes).
  * drm/radeon: Replace one-element array with flexible-array member (stable-
    fixes).
  * drm/radeon: properly handle vbios fake edid sizing (git-fixes).
  * drm/rockchip: define gamma registers for RK3399 (stable-fixes).
  * drm/rockchip: support gamma control on RK3399 (stable-fixes).
  * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
  * drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
  * drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
  * drm/vmwgfx: Handle surface check failure correctly (git-fixes).
  * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
  * drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
  * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption
    (stable-fixes).
  * erofs: avoid consecutive detection for Highmem memory (git-fixes).
  * erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF
    (git-fixes).
  * erofs: fix pcluster use-after-free on UP platforms (git-fixes).
  * erofs: fix potential overflow calculating xattr_isize (git-fixes).
  * erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-
    fixes).
  * exportfs: use pr_debug for unreachable debug statements (git-fixes).
  * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
  * fat: fix uninitialized variable (git-fixes).
  * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
  * fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
  * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
  * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
  * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-
    fixes).
  * filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
  * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
  * fs/namespace: fnic: Switch to use %ptTd (git-fixes).
  * fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
  * fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).
  * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
  * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
  * gpio: davinci: fix lazy disable (git-fixes).
  * hid: intel-ish-hid: Fix uninitialized variable 'rv' in
    ish_fw_xfer_direct_dma (git-fixes).
  * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
    (git-fixes).
  * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
  * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
  * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
  * i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work
    (bsc#1227885).
  * i2c: imx-lpi2c: use bulk clk API (bsc#1227885).
  * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
    (git-fixes).
  * i2c: xiic: Fix RX IRQ busy check (stable-fixes).
  * i2c: xiic: Fix broken locking on tx_msg (stable-fixes).
  * i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
    fixes).
  * i2c: xiic: Switch from waitqueue to completion (stable-fixes).
  * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
  * i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).
  * i2c: xiic: improve error message when transfer fails to start (stable-
    fixes).
  * i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).
  * ice: Unbind the workqueue (bsc#1231344).
  * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
  * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
  * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-
    fixes).
  * iio: hid-sensors: Fix an error handling path in
    _hid_sensor_set_report_latency() (git-fixes).
  * iio: light: opt3001: add missing full-scale range value (git-fixes).
  * iio: light: veml6030: fix ALS sensor resolution (git-fixes).
  * iio: light: veml6030: fix IIO device retrieval from embedded device (git-
    fixes).
  * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    (git-fixes).
  * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
  * ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
  * ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
  * jfs: Fix sanity check in dbMount (git-fixes).
  * jfs: Fix uaf in dbFreeBits (git-fixes).
  * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
  * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
  * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
  * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
  * kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).
  * kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-
    fixes).
  * kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step
    is enabled (git-fixes).
  * kabi: fix after KVM: arm64: mixed-width check should be skipped for
    uninitialized vCPUs (git-fixes).
  * kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
  * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414
    bsc#1229450).
  * kbuild,bpf: Add module-specific pahole flags for distilled base BTF
    (bsc#1230414 bsc#1229450).
  * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later
    (bsc#1230414 bsc#1229450).
  * kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).
  * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414
    bsc#1229450).
  * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
  * kvm/arm64: rework guest entry logic (git-fixes).
  * kvm: Add support for arch compat vm ioctls (git-fixes).
  * kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
  * media: videobuf2-core: clear memory related fields in
    __vb2_plane_dmabuf_put() (stable-fixes).
  * module: abort module loading when sysfs setup suffer errors (git-fixes).
  * nbd: fix race between timeout and normal completion (bsc#1230918).
  * net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX
    (bsc#1226797)
  * net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
  * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
  * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
  * net: socket: suppress unused warning (git-fixes).
  * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-
    fixes).
  * net: usb: usbnet: fix name regression (git-fixes).
  * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
  * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
  * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
  * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
    (git-fixes).
  * nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
  * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
  * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-
    fixes).
  * nfsd: return -EINVAL when namelen is 0 (git-fixes).
  * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-
    fixes).
  * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-
    fixes).
  * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-
    fixes).
  * ntb: ntb_hw_switchtec: Fix use after free vulnerability in
    switchtec_ntb_remove due to race condition (stable-fixes).
  * nvme-multipath: system fails to create generic nvme device (git-fixes).
  * nvme-pci: qdepth 1 quirk (git-fixes).
  * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
  * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
  * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
  * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
  * parport: Proper fix for array out-of-bounds access (git-fixes).
  * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3
    (stable-fixes).
  * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
  * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-
    fixes).
  * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
  * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
  * powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
  * powerpc/code-patching: Add generic memory patching (bsc#1194869).
  * powerpc/code-patching: Consolidate and cache per-cpu patching context
    (bsc#1194869).
  * powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without
    CONFIG_MODULES (bsc#1194869).
  * powerpc/code-patching: Fix error handling in do_patch_instruction()
    (bsc#1194869).
  * powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).
  * powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).
  * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of
    failure (bsc#1194869).
  * powerpc/code-patching: Pre-map patch area (bsc#1194869).
  * powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).
  * powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check()
    (bsc#1194869).
  * powerpc/code-patching: Reorganise do_patch_instruction() to ease error
    handling (bsc#1194869).
  * powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).
  * powerpc/code-patching: Use WARN_ON and fix check in poking_init
    (bsc#1194869).
  * powerpc/code-patching: Use jump_label to check if poking_init() is done
    (bsc#1194869).
  * powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).
  * powerpc/code-patching: introduce patch_instructions() (bsc#1194869).
  * powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).
  * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-
    fixes).
  * powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-
    fixes).
  * powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).
  * powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).
  * powerpc/tlb: Add local flush for page given mm_struct and psize
    (bsc#1194869).
  * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace
    (bsc#1194869).
  * powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).
  * powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files
    (bsc#1194869).
  * powerpc/vdso: augment VDSO32 functions to support 64 bits build
    (bsc#1194869).
  * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu
    (bsc#1194869).
  * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
  * powerpc: Allow clearing and restoring registers independent of saved
    breakpoint state (bsc#1194869).
  * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
    (bsc#1226631).
  * rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)
  * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
  * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes
    bsc#1232632).
  * sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)
  * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
  * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
  * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
  * scsi: core: Handle devices which return an unusually large VPD page count
    (git-fixes).
  * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
  * scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()
    (git-fixes).
  * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
  * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
  * scsi: libsas: Fix exp-attached device scan after probe failure scanned in
    again after probe failed (git-fixes).
  * scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
    fixes).
  * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in
    lpfc_els_flush_cmd() (bsc#1232757).
  * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV
    instance (bsc#1232757).
  * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler
    (bsc#1232757).
  * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
  * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).
  * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to
    KERN_WARNING (bsc#1232757).
  * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
  * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
  * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE
    (bsc#1232757).
  * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
  * scsi: mac_scsi: Refactor polling loop (git-fixes).
  * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
  * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
  * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
  * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
  * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
  * scsi: smartpqi: correct stream detection (git-fixes).
  * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
    fixes).
  * scsi: spi: Fix sshdr use (git-fixes).
  * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
  * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
  * selftests/bpf: Add a test case to write strtol result into .rodata (git-
    fixes).
  * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
  * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
  * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-
    fixes).
  * spi: bcm63xx: Enable module autoloading (stable-fixes).
  * spi: bcm63xx: Fix module autoloading (git-fixes).
  * spi: lpspi: Silence error message upon deferred probe (stable-fixes).
  * spi: lpspi: Simplify some error message (git-fixes).
  * spi: lpspi: release requested DMA channels (stable-fixes).
  * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
  * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
  * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
  * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
  * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
    fixes).
  * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
  * static_call: Do not make __static_call_return0 static (git-fixes).
  * tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
  * tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).
  * tracing: Consider the NULL character when validating the event length (git-
    fixes).
  * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
  * uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
  * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
  * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the
    Crashkernel Scenario (stable-fixes).
  * usb: dwc3: core: Stop processing of pending events if controller is halted
    (git-fixes).
  * usb: gadget: core: force synchronous registration (git-fixes).
  * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip
    (stable-fixes).
  * usb: typec: altmode should keep reference to parent (git-fixes).
  * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
  * usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).
  * usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-
    fixes).
  * usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).
  * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
  * vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
  * virtio-net: synchronize probe with ndo_set_features (git-fixes).
  * virtio_console: fix misc probe bugs (git-fixes).
  * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
  * vmxnet3: add command to allow disabling of offloads (bsc#1226498).
  * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
  * vmxnet3: prepare for version 9 changes (bsc#1226498).
  * vmxnet3: update to version 9 (bsc#1226498).
  * vsock/virtio: fix packet delivery to tap device (git-fixes).
  * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
  * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
  * wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).
  * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-
    fixes).
  * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
    (stable-fixes).
  * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).
  * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
  * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
  * wifi: mwifiex: Fix memcpy() field-spanning write warning in
    mwifiex_cmd_802_11_scan_ext() (stable-fixes).
  * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
  * workqueue: Avoid using isolated cpus' timers on (bsc#1231327)
  * workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)
  * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
  * x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
  * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
  * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
  * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
  * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency
    (git-fixes).
  * x86/kaslr: Expose and use the end of the physical memory address space
    (bsc#1230405).
  * xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown
    (bsc#1216813).
  * xhci: Fix incorrect stream context type macro (git-fixes).
  * xhci: Mitigate failed set dequeue pointer commands (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Real Time Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-3985=1

  * openSUSE Leap 15.5  
    zypper in -t patch SUSE-2024-3985=1 openSUSE-SLE-15.5-2024-3985=1

  * openSUSE Leap Micro 5.5  
    zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3985=1

  * SUSE Linux Enterprise Micro 5.5  
    zypper in -t patch SUSE-SLE-Micro-5.5-2024-3985=1

  * SUSE Linux Enterprise Live Patching 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3985=1

## Package List:

  * SUSE Real Time Module 15-SP5 (x86_64)
    * kernel-rt_debug-debugsource-5.14.21-150500.13.76.1
    * dlm-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt_debug-devel-5.14.21-150500.13.76.1
    * kernel-rt_debug-vdso-5.14.21-150500.13.76.1
    * dlm-kmp-rt-5.14.21-150500.13.76.1
    * ocfs2-kmp-rt-5.14.21-150500.13.76.1
    * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-vdso-5.14.21-150500.13.76.1
    * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt_debug-debuginfo-5.14.21-150500.13.76.1
    * cluster-md-kmp-rt-5.14.21-150500.13.76.1
    * kernel-syms-rt-5.14.21-150500.13.76.1
    * kernel-rt-vdso-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-debugsource-5.14.21-150500.13.76.1
    * kernel-rt-devel-5.14.21-150500.13.76.1
    * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-devel-debuginfo-5.14.21-150500.13.76.1
    * gfs2-kmp-rt-5.14.21-150500.13.76.1
  * SUSE Real Time Module 15-SP5 (noarch)
    * kernel-source-rt-5.14.21-150500.13.76.1
    * kernel-devel-rt-5.14.21-150500.13.76.1
  * SUSE Real Time Module 15-SP5 (nosrc x86_64)
    * kernel-rt_debug-5.14.21-150500.13.76.1
    * kernel-rt-5.14.21-150500.13.76.1
  * openSUSE Leap 15.5 (noarch)
    * kernel-source-rt-5.14.21-150500.13.76.1
    * kernel-devel-rt-5.14.21-150500.13.76.1
  * openSUSE Leap 15.5 (x86_64)
    * kernel-rt_debug-debugsource-5.14.21-150500.13.76.1
    * reiserfs-kmp-rt-5.14.21-150500.13.76.1
    * dlm-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * kselftests-kmp-rt-5.14.21-150500.13.76.1
    * kernel-livepatch-SLE15-SP5-RT_Update_22-debugsource-1-150500.11.3.1
    * kernel-rt_debug-livepatch-devel-5.14.21-150500.13.76.1
    * kernel-rt-optional-5.14.21-150500.13.76.1
    * kernel-rt-livepatch-devel-5.14.21-150500.13.76.1
    * kernel-rt_debug-devel-5.14.21-150500.13.76.1
    * kernel-rt_debug-vdso-5.14.21-150500.13.76.1
    * dlm-kmp-rt-5.14.21-150500.13.76.1
    * kernel-livepatch-5_14_21-150500_13_76-rt-1-150500.11.3.1
    * ocfs2-kmp-rt-5.14.21-150500.13.76.1
    * kernel-rt-extra-5.14.21-150500.13.76.1
    * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-vdso-5.14.21-150500.13.76.1
    * kernel-rt-optional-debuginfo-5.14.21-150500.13.76.1
    * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt_debug-debuginfo-5.14.21-150500.13.76.1
    * cluster-md-kmp-rt-5.14.21-150500.13.76.1
    * kernel-syms-rt-5.14.21-150500.13.76.1
    * kernel-rt-extra-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-vdso-debuginfo-5.14.21-150500.13.76.1
    * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-debugsource-5.14.21-150500.13.76.1
    * kernel-rt-devel-5.14.21-150500.13.76.1
    * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-debuginfo-5.14.21-150500.13.76.1
    * kernel-livepatch-5_14_21-150500_13_76-rt-debuginfo-1-150500.11.3.1
    * kernel-rt-devel-debuginfo-5.14.21-150500.13.76.1
    * kernel-rt-livepatch-5.14.21-150500.13.76.1
    * gfs2-kmp-rt-5.14.21-150500.13.76.1
  * openSUSE Leap 15.5 (nosrc x86_64)
    * kernel-rt_debug-5.14.21-150500.13.76.1
    * kernel-rt-5.14.21-150500.13.76.1
  * openSUSE Leap Micro 5.5 (nosrc x86_64)
    * kernel-rt-5.14.21-150500.13.76.1
  * openSUSE Leap Micro 5.5 (x86_64)
    * kernel-rt-debugsource-5.14.21-150500.13.76.1
    * kernel-rt-debuginfo-5.14.21-150500.13.76.1
  * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
    * kernel-rt-5.14.21-150500.13.76.1
  * SUSE Linux Enterprise Micro 5.5 (x86_64)
    * kernel-rt-debugsource-5.14.21-150500.13.76.1
    * kernel-rt-debuginfo-5.14.21-150500.13.76.1
  * SUSE Linux Enterprise Micro 5.5 (noarch)
    * kernel-source-rt-5.14.21-150500.13.76.1
  * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
    * kernel-livepatch-5_14_21-150500_13_76-rt-1-150500.11.3.1
    * kernel-livepatch-5_14_21-150500_13_76-rt-debuginfo-1-150500.11.3.1
    * kernel-livepatch-SLE15-SP5-RT_Update_22-debugsource-1-150500.11.3.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-47416.html
  * https://www.suse.com/security/cve/CVE-2021-47534.html
  * https://www.suse.com/security/cve/CVE-2022-3435.html
  * https://www.suse.com/security/cve/CVE-2022-45934.html
  * https://www.suse.com/security/cve/CVE-2022-48664.html
  * https://www.suse.com/security/cve/CVE-2022-48879.html
  * https://www.suse.com/security/cve/CVE-2022-48946.html
  * https://www.suse.com/security/cve/CVE-2022-48947.html
  * https://www.suse.com/security/cve/CVE-2022-48948.html
  * https://www.suse.com/security/cve/CVE-2022-48949.html
  * https://www.suse.com/security/cve/CVE-2022-48951.html
  * https://www.suse.com/security/cve/CVE-2022-48953.html
  * https://www.suse.com/security/cve/CVE-2022-48954.html
  * https://www.suse.com/security/cve/CVE-2022-48955.html
  * https://www.suse.com/security/cve/CVE-2022-48956.html
  * https://www.suse.com/security/cve/CVE-2022-48957.html
  * https://www.suse.com/security/cve/CVE-2022-48958.html
  * https://www.suse.com/security/cve/CVE-2022-48959.html
  * https://www.suse.com/security/cve/CVE-2022-48960.html
  * https://www.suse.com/security/cve/CVE-2022-48961.html
  * https://www.suse.com/security/cve/CVE-2022-48962.html
  * https://www.suse.com/security/cve/CVE-2022-48966.html
  * https://www.suse.com/security/cve/CVE-2022-48967.html
  * https://www.suse.com/security/cve/CVE-2022-48968.html
  * https://www.suse.com/security/cve/CVE-2022-48969.html
  * https://www.suse.com/security/cve/CVE-2022-48970.html
  * https://www.suse.com/security/cve/CVE-2022-48971.html
  * https://www.suse.com/security/cve/CVE-2022-48972.html
  * https://www.suse.com/security/cve/CVE-2022-48973.html
  * https://www.suse.com/security/cve/CVE-2022-48975.html
  * https://www.suse.com/security/cve/CVE-2022-48977.html
  * https://www.suse.com/security/cve/CVE-2022-48978.html
  * https://www.suse.com/security/cve/CVE-2022-48980.html
  * https://www.suse.com/security/cve/CVE-2022-48981.html
  * https://www.suse.com/security/cve/CVE-2022-48985.html
  * https://www.suse.com/security/cve/CVE-2022-48987.html
  * https://www.suse.com/security/cve/CVE-2022-48988.html
  * https://www.suse.com/security/cve/CVE-2022-48991.html
  * https://www.suse.com/security/cve/CVE-2022-48992.html
  * https://www.suse.com/security/cve/CVE-2022-48994.html
  * https://www.suse.com/security/cve/CVE-2022-48995.html
  * https://www.suse.com/security/cve/CVE-2022-48997.html
  * https://www.suse.com/security/cve/CVE-2022-48999.html
  * https://www.suse.com/security/cve/CVE-2022-49000.html
  * https://www.suse.com/security/cve/CVE-2022-49002.html
  * https://www.suse.com/security/cve/CVE-2022-49003.html
  * https://www.suse.com/security/cve/CVE-2022-49005.html
  * https://www.suse.com/security/cve/CVE-2022-49006.html
  * https://www.suse.com/security/cve/CVE-2022-49007.html
  * https://www.suse.com/security/cve/CVE-2022-49010.html
  * https://www.suse.com/security/cve/CVE-2022-49011.html
  * https://www.suse.com/security/cve/CVE-2022-49012.html
  * https://www.suse.com/security/cve/CVE-2022-49014.html
  * https://www.suse.com/security/cve/CVE-2022-49015.html
  * https://www.suse.com/security/cve/CVE-2022-49016.html
  * https://www.suse.com/security/cve/CVE-2022-49017.html
  * https://www.suse.com/security/cve/CVE-2022-49019.html
  * https://www.suse.com/security/cve/CVE-2022-49020.html
  * https://www.suse.com/security/cve/CVE-2022-49021.html
  * https://www.suse.com/security/cve/CVE-2022-49022.html
  * https://www.suse.com/security/cve/CVE-2022-49023.html
  * https://www.suse.com/security/cve/CVE-2022-49024.html
  * https://www.suse.com/security/cve/CVE-2022-49025.html
  * https://www.suse.com/security/cve/CVE-2022-49026.html
  * https://www.suse.com/security/cve/CVE-2022-49027.html
  * https://www.suse.com/security/cve/CVE-2022-49028.html
  * https://www.suse.com/security/cve/CVE-2022-49029.html
  * https://www.suse.com/security/cve/CVE-2022-49031.html
  * https://www.suse.com/security/cve/CVE-2022-49032.html
  * https://www.suse.com/security/cve/CVE-2023-2166.html
  * https://www.suse.com/security/cve/CVE-2023-28327.html
  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52800.html
  * https://www.suse.com/security/cve/CVE-2023-52881.html
  * https://www.suse.com/security/cve/CVE-2023-52919.html
  * https://www.suse.com/security/cve/CVE-2023-6270.html
  * https://www.suse.com/security/cve/CVE-2024-27043.html
  * https://www.suse.com/security/cve/CVE-2024-36244.html
  * https://www.suse.com/security/cve/CVE-2024-36957.html
  * https://www.suse.com/security/cve/CVE-2024-39476.html
  * https://www.suse.com/security/cve/CVE-2024-40965.html
  * https://www.suse.com/security/cve/CVE-2024-42145.html
  * https://www.suse.com/security/cve/CVE-2024-42226.html
  * https://www.suse.com/security/cve/CVE-2024-42253.html
  * https://www.suse.com/security/cve/CVE-2024-44931.html
  * https://www.suse.com/security/cve/CVE-2024-44947.html
  * https://www.suse.com/security/cve/CVE-2024-44958.html
  * https://www.suse.com/security/cve/CVE-2024-45016.html
  * https://www.suse.com/security/cve/CVE-2024-45025.html
  * https://www.suse.com/security/cve/CVE-2024-46678.html
  * https://www.suse.com/security/cve/CVE-2024-46716.html
  * https://www.suse.com/security/cve/CVE-2024-46719.html
  * https://www.suse.com/security/cve/CVE-2024-46754.html
  * https://www.suse.com/security/cve/CVE-2024-46770.html
  * https://www.suse.com/security/cve/CVE-2024-46775.html
  * https://www.suse.com/security/cve/CVE-2024-46777.html
  * https://www.suse.com/security/cve/CVE-2024-46809.html
  * https://www.suse.com/security/cve/CVE-2024-46811.html
  * https://www.suse.com/security/cve/CVE-2024-46813.html
  * https://www.suse.com/security/cve/CVE-2024-46814.html
  * https://www.suse.com/security/cve/CVE-2024-46815.html
  * https://www.suse.com/security/cve/CVE-2024-46816.html
  * https://www.suse.com/security/cve/CVE-2024-46817.html
  * https://www.suse.com/security/cve/CVE-2024-46818.html
  * https://www.suse.com/security/cve/CVE-2024-46826.html
  * https://www.suse.com/security/cve/CVE-2024-46828.html
  * https://www.suse.com/security/cve/CVE-2024-46834.html
  * https://www.suse.com/security/cve/CVE-2024-46840.html
  * https://www.suse.com/security/cve/CVE-2024-46841.html
  * https://www.suse.com/security/cve/CVE-2024-46848.html
  * https://www.suse.com/security/cve/CVE-2024-46849.html
  * https://www.suse.com/security/cve/CVE-2024-46854.html
  * https://www.suse.com/security/cve/CVE-2024-46855.html
  * https://www.suse.com/security/cve/CVE-2024-46857.html
  * https://www.suse.com/security/cve/CVE-2024-47660.html
  * https://www.suse.com/security/cve/CVE-2024-47661.html
  * https://www.suse.com/security/cve/CVE-2024-47664.html
  * https://www.suse.com/security/cve/CVE-2024-47668.html
  * https://www.suse.com/security/cve/CVE-2024-47672.html
  * https://www.suse.com/security/cve/CVE-2024-47673.html
  * https://www.suse.com/security/cve/CVE-2024-47674.html
  * https://www.suse.com/security/cve/CVE-2024-47684.html
  * https://www.suse.com/security/cve/CVE-2024-47685.html
  * https://www.suse.com/security/cve/CVE-2024-47692.html
  * https://www.suse.com/security/cve/CVE-2024-47704.html
  * https://www.suse.com/security/cve/CVE-2024-47705.html
  * https://www.suse.com/security/cve/CVE-2024-47706.html
  * https://www.suse.com/security/cve/CVE-2024-47707.html
  * https://www.suse.com/security/cve/CVE-2024-47710.html
  * https://www.suse.com/security/cve/CVE-2024-47720.html
  * https://www.suse.com/security/cve/CVE-2024-47727.html
  * https://www.suse.com/security/cve/CVE-2024-47730.html
  * https://www.suse.com/security/cve/CVE-2024-47738.html
  * https://www.suse.com/security/cve/CVE-2024-47739.html
  * https://www.suse.com/security/cve/CVE-2024-47745.html
  * https://www.suse.com/security/cve/CVE-2024-47747.html
  * https://www.suse.com/security/cve/CVE-2024-47748.html
  * https://www.suse.com/security/cve/CVE-2024-49858.html
  * https://www.suse.com/security/cve/CVE-2024-49860.html
  * https://www.suse.com/security/cve/CVE-2024-49866.html
  * https://www.suse.com/security/cve/CVE-2024-49867.html
  * https://www.suse.com/security/cve/CVE-2024-49881.html
  * https://www.suse.com/security/cve/CVE-2024-49882.html
  * https://www.suse.com/security/cve/CVE-2024-49883.html
  * https://www.suse.com/security/cve/CVE-2024-49886.html
  * https://www.suse.com/security/cve/CVE-2024-49890.html
  * https://www.suse.com/security/cve/CVE-2024-49892.html
  * https://www.suse.com/security/cve/CVE-2024-49894.html
  * https://www.suse.com/security/cve/CVE-2024-49895.html
  * https://www.suse.com/security/cve/CVE-2024-49896.html
  * https://www.suse.com/security/cve/CVE-2024-49897.html
  * https://www.suse.com/security/cve/CVE-2024-49899.html
  * https://www.suse.com/security/cve/CVE-2024-49901.html
  * https://www.suse.com/security/cve/CVE-2024-49906.html
  * https://www.suse.com/security/cve/CVE-2024-49908.html
  * https://www.suse.com/security/cve/CVE-2024-49909.html
  * https://www.suse.com/security/cve/CVE-2024-49911.html
  * https://www.suse.com/security/cve/CVE-2024-49912.html
  * https://www.suse.com/security/cve/CVE-2024-49913.html
  * https://www.suse.com/security/cve/CVE-2024-49914.html
  * https://www.suse.com/security/cve/CVE-2024-49917.html
  * https://www.suse.com/security/cve/CVE-2024-49918.html
  * https://www.suse.com/security/cve/CVE-2024-49919.html
  * https://www.suse.com/security/cve/CVE-2024-49920.html
  * https://www.suse.com/security/cve/CVE-2024-49922.html
  * https://www.suse.com/security/cve/CVE-2024-49923.html
  * https://www.suse.com/security/cve/CVE-2024-49929.html
  * https://www.suse.com/security/cve/CVE-2024-49930.html
  * https://www.suse.com/security/cve/CVE-2024-49933.html
  * https://www.suse.com/security/cve/CVE-2024-49936.html
  * https://www.suse.com/security/cve/CVE-2024-49939.html
  * https://www.suse.com/security/cve/CVE-2024-49946.html
  * https://www.suse.com/security/cve/CVE-2024-49949.html
  * https://www.suse.com/security/cve/CVE-2024-49954.html
  * https://www.suse.com/security/cve/CVE-2024-49955.html
  * https://www.suse.com/security/cve/CVE-2024-49958.html
  * https://www.suse.com/security/cve/CVE-2024-49959.html
  * https://www.suse.com/security/cve/CVE-2024-49960.html
  * https://www.suse.com/security/cve/CVE-2024-49962.html
  * https://www.suse.com/security/cve/CVE-2024-49967.html
  * https://www.suse.com/security/cve/CVE-2024-49969.html
  * https://www.suse.com/security/cve/CVE-2024-49973.html
  * https://www.suse.com/security/cve/CVE-2024-49974.html
  * https://www.suse.com/security/cve/CVE-2024-49975.html
  * https://www.suse.com/security/cve/CVE-2024-49982.html
  * https://www.suse.com/security/cve/CVE-2024-49991.html
  * https://www.suse.com/security/cve/CVE-2024-49993.html
  * https://www.suse.com/security/cve/CVE-2024-49995.html
  * https://www.suse.com/security/cve/CVE-2024-49996.html
  * https://www.suse.com/security/cve/CVE-2024-50000.html
  * https://www.suse.com/security/cve/CVE-2024-50001.html
  * https://www.suse.com/security/cve/CVE-2024-50002.html
  * https://www.suse.com/security/cve/CVE-2024-50006.html
  * https://www.suse.com/security/cve/CVE-2024-50014.html
  * https://www.suse.com/security/cve/CVE-2024-50019.html
  * https://www.suse.com/security/cve/CVE-2024-50024.html
  * https://www.suse.com/security/cve/CVE-2024-50028.html
  * https://www.suse.com/security/cve/CVE-2024-50033.html
  * https://www.suse.com/security/cve/CVE-2024-50035.html
  * https://www.suse.com/security/cve/CVE-2024-50041.html
  * https://www.suse.com/security/cve/CVE-2024-50045.html
  * https://www.suse.com/security/cve/CVE-2024-50046.html
  * https://www.suse.com/security/cve/CVE-2024-50047.html
  * https://www.suse.com/security/cve/CVE-2024-50048.html
  * https://www.suse.com/security/cve/CVE-2024-50049.html
  * https://www.suse.com/security/cve/CVE-2024-50055.html
  * https://www.suse.com/security/cve/CVE-2024-50058.html
  * https://www.suse.com/security/cve/CVE-2024-50059.html
  * https://www.suse.com/security/cve/CVE-2024-50061.html
  * https://www.suse.com/security/cve/CVE-2024-50063.html
  * https://www.suse.com/security/cve/CVE-2024-50081.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1054914
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1204171
  * https://bugzilla.suse.com/show_bug.cgi?id=1205796
  * https://bugzilla.suse.com/show_bug.cgi?id=1206188
  * https://bugzilla.suse.com/show_bug.cgi?id=1206344
  * https://bugzilla.suse.com/show_bug.cgi?id=1209290
  * https://bugzilla.suse.com/show_bug.cgi?id=1210449
  * https://bugzilla.suse.com/show_bug.cgi?id=1210627
  * https://bugzilla.suse.com/show_bug.cgi?id=1213034
  * https://bugzilla.suse.com/show_bug.cgi?id=1216813
  * https://bugzilla.suse.com/show_bug.cgi?id=1218562
  * https://bugzilla.suse.com/show_bug.cgi?id=1223384
  * https://bugzilla.suse.com/show_bug.cgi?id=1223524
  * https://bugzilla.suse.com/show_bug.cgi?id=1223824
  * https://bugzilla.suse.com/show_bug.cgi?id=1225189
  * https://bugzilla.suse.com/show_bug.cgi?id=1225336
  * https://bugzilla.suse.com/show_bug.cgi?id=1225611
  * https://bugzilla.suse.com/show_bug.cgi?id=1225762
  * https://bugzilla.suse.com/show_bug.cgi?id=1226498
  * https://bugzilla.suse.com/show_bug.cgi?id=1226631
  * https://bugzilla.suse.com/show_bug.cgi?id=1226797
  * https://bugzilla.suse.com/show_bug.cgi?id=1227437
  * https://bugzilla.suse.com/show_bug.cgi?id=1227885
  * https://bugzilla.suse.com/show_bug.cgi?id=1228119
  * https://bugzilla.suse.com/show_bug.cgi?id=1228269
  * https://bugzilla.suse.com/show_bug.cgi?id=1228709
  * https://bugzilla.suse.com/show_bug.cgi?id=1228743
  * https://bugzilla.suse.com/show_bug.cgi?id=1228747
  * https://bugzilla.suse.com/show_bug.cgi?id=1229005
  * https://bugzilla.suse.com/show_bug.cgi?id=1229019
  * https://bugzilla.suse.com/show_bug.cgi?id=1229450
  * https://bugzilla.suse.com/show_bug.cgi?id=1229454
  * https://bugzilla.suse.com/show_bug.cgi?id=1229456
  * https://bugzilla.suse.com/show_bug.cgi?id=1229556
  * https://bugzilla.suse.com/show_bug.cgi?id=1229769
  * https://bugzilla.suse.com/show_bug.cgi?id=1229837
  * https://bugzilla.suse.com/show_bug.cgi?id=1229891
  * https://bugzilla.suse.com/show_bug.cgi?id=1230055
  * https://bugzilla.suse.com/show_bug.cgi?id=1230179
  * https://bugzilla.suse.com/show_bug.cgi?id=1230289
  * https://bugzilla.suse.com/show_bug.cgi?id=1230405
  * https://bugzilla.suse.com/show_bug.cgi?id=1230414
  * https://bugzilla.suse.com/show_bug.cgi?id=1230429
  * https://bugzilla.suse.com/show_bug.cgi?id=1230456
  * https://bugzilla.suse.com/show_bug.cgi?id=1230550
  * https://bugzilla.suse.com/show_bug.cgi?id=1230600
  * https://bugzilla.suse.com/show_bug.cgi?id=1230620
  * https://bugzilla.suse.com/show_bug.cgi?id=1230715
  * https://bugzilla.suse.com/show_bug.cgi?id=1230722
  * https://bugzilla.suse.com/show_bug.cgi?id=1230763
  * https://bugzilla.suse.com/show_bug.cgi?id=1230773
  * https://bugzilla.suse.com/show_bug.cgi?id=1230774
  * https://bugzilla.suse.com/show_bug.cgi?id=1230801
  * https://bugzilla.suse.com/show_bug.cgi?id=1230903
  * https://bugzilla.suse.com/show_bug.cgi?id=1230918
  * https://bugzilla.suse.com/show_bug.cgi?id=1231016
  * https://bugzilla.suse.com/show_bug.cgi?id=1231072
  * https://bugzilla.suse.com/show_bug.cgi?id=1231073
  * https://bugzilla.suse.com/show_bug.cgi?id=1231084
  * https://bugzilla.suse.com/show_bug.cgi?id=1231085
  * https://bugzilla.suse.com/show_bug.cgi?id=1231087
  * https://bugzilla.suse.com/show_bug.cgi?id=1231094
  * https://bugzilla.suse.com/show_bug.cgi?id=1231096
  * https://bugzilla.suse.com/show_bug.cgi?id=1231105
  * https://bugzilla.suse.com/show_bug.cgi?id=1231114
  * https://bugzilla.suse.com/show_bug.cgi?id=1231115
  * https://bugzilla.suse.com/show_bug.cgi?id=1231148
  * https://bugzilla.suse.com/show_bug.cgi?id=1231179
  * https://bugzilla.suse.com/show_bug.cgi?id=1231191
  * https://bugzilla.suse.com/show_bug.cgi?id=1231193
  * https://bugzilla.suse.com/show_bug.cgi?id=1231195
  * https://bugzilla.suse.com/show_bug.cgi?id=1231197
  * https://bugzilla.suse.com/show_bug.cgi?id=1231200
  * https://bugzilla.suse.com/show_bug.cgi?id=1231203
  * https://bugzilla.suse.com/show_bug.cgi?id=1231277
  * https://bugzilla.suse.com/show_bug.cgi?id=1231293
  * https://bugzilla.suse.com/show_bug.cgi?id=1231327
  * https://bugzilla.suse.com/show_bug.cgi?id=1231344
  * https://bugzilla.suse.com/show_bug.cgi?id=1231375
  * https://bugzilla.suse.com/show_bug.cgi?id=1231383
  * https://bugzilla.suse.com/show_bug.cgi?id=1231439
  * https://bugzilla.suse.com/show_bug.cgi?id=1231442
  * https://bugzilla.suse.com/show_bug.cgi?id=1231496
  * https://bugzilla.suse.com/show_bug.cgi?id=1231502
  * https://bugzilla.suse.com/show_bug.cgi?id=1231539
  * https://bugzilla.suse.com/show_bug.cgi?id=1231540
  * https://bugzilla.suse.com/show_bug.cgi?id=1231578
  * https://bugzilla.suse.com/show_bug.cgi?id=1231673
  * https://bugzilla.suse.com/show_bug.cgi?id=1231857
  * https://bugzilla.suse.com/show_bug.cgi?id=1231861
  * https://bugzilla.suse.com/show_bug.cgi?id=1231872
  * https://bugzilla.suse.com/show_bug.cgi?id=1231883
  * https://bugzilla.suse.com/show_bug.cgi?id=1231885
  * https://bugzilla.suse.com/show_bug.cgi?id=1231887
  * https://bugzilla.suse.com/show_bug.cgi?id=1231888
  * https://bugzilla.suse.com/show_bug.cgi?id=1231889
  * https://bugzilla.suse.com/show_bug.cgi?id=1231890
  * https://bugzilla.suse.com/show_bug.cgi?id=1231892
  * https://bugzilla.suse.com/show_bug.cgi?id=1231893
  * https://bugzilla.suse.com/show_bug.cgi?id=1231895
  * https://bugzilla.suse.com/show_bug.cgi?id=1231896
  * https://bugzilla.suse.com/show_bug.cgi?id=1231897
  * https://bugzilla.suse.com/show_bug.cgi?id=1231902
  * https://bugzilla.suse.com/show_bug.cgi?id=1231903
  * https://bugzilla.suse.com/show_bug.cgi?id=1231907
  * https://bugzilla.suse.com/show_bug.cgi?id=1231914
  * https://bugzilla.suse.com/show_bug.cgi?id=1231929
  * https://bugzilla.suse.com/show_bug.cgi?id=1231935
  * https://bugzilla.suse.com/show_bug.cgi?id=1231936
  * https://bugzilla.suse.com/show_bug.cgi?id=1231937
  * https://bugzilla.suse.com/show_bug.cgi?id=1231938
  * https://bugzilla.suse.com/show_bug.cgi?id=1231939
  * https://bugzilla.suse.com/show_bug.cgi?id=1231940
  * https://bugzilla.suse.com/show_bug.cgi?id=1231941
  * https://bugzilla.suse.com/show_bug.cgi?id=1231942
  * https://bugzilla.suse.com/show_bug.cgi?id=1231944
  * https://bugzilla.suse.com/show_bug.cgi?id=1231950
  * https://bugzilla.suse.com/show_bug.cgi?id=1231954
  * https://bugzilla.suse.com/show_bug.cgi?id=1231958
  * https://bugzilla.suse.com/show_bug.cgi?id=1231960
  * https://bugzilla.suse.com/show_bug.cgi?id=1231961
  * https://bugzilla.suse.com/show_bug.cgi?id=1231962
  * https://bugzilla.suse.com/show_bug.cgi?id=1231965
  * https://bugzilla.suse.com/show_bug.cgi?id=1231967
  * https://bugzilla.suse.com/show_bug.cgi?id=1231968
  * https://bugzilla.suse.com/show_bug.cgi?id=1231972
  * https://bugzilla.suse.com/show_bug.cgi?id=1231973
  * https://bugzilla.suse.com/show_bug.cgi?id=1231976
  * https://bugzilla.suse.com/show_bug.cgi?id=1231979
  * https://bugzilla.suse.com/show_bug.cgi?id=1231987
  * https://bugzilla.suse.com/show_bug.cgi?id=1231988
  * https://bugzilla.suse.com/show_bug.cgi?id=1231990
  * https://bugzilla.suse.com/show_bug.cgi?id=1231991
  * https://bugzilla.suse.com/show_bug.cgi?id=1231992
  * https://bugzilla.suse.com/show_bug.cgi?id=1231995
  * https://bugzilla.suse.com/show_bug.cgi?id=1231996
  * https://bugzilla.suse.com/show_bug.cgi?id=1231997
  * https://bugzilla.suse.com/show_bug.cgi?id=1231998
  * https://bugzilla.suse.com/show_bug.cgi?id=1232001
  * https://bugzilla.suse.com/show_bug.cgi?id=1232004
  * https://bugzilla.suse.com/show_bug.cgi?id=1232005
  * https://bugzilla.suse.com/show_bug.cgi?id=1232006
  * https://bugzilla.suse.com/show_bug.cgi?id=1232007
  * https://bugzilla.suse.com/show_bug.cgi?id=1232025
  * https://bugzilla.suse.com/show_bug.cgi?id=1232026
  * https://bugzilla.suse.com/show_bug.cgi?id=1232033
  * https://bugzilla.suse.com/show_bug.cgi?id=1232034
  * https://bugzilla.suse.com/show_bug.cgi?id=1232035
  * https://bugzilla.suse.com/show_bug.cgi?id=1232036
  * https://bugzilla.suse.com/show_bug.cgi?id=1232037
  * https://bugzilla.suse.com/show_bug.cgi?id=1232038
  * https://bugzilla.suse.com/show_bug.cgi?id=1232039
  * https://bugzilla.suse.com/show_bug.cgi?id=1232043
  * https://bugzilla.suse.com/show_bug.cgi?id=1232049
  * https://bugzilla.suse.com/show_bug.cgi?id=1232067
  * https://bugzilla.suse.com/show_bug.cgi?id=1232069
  * https://bugzilla.suse.com/show_bug.cgi?id=1232070
  * https://bugzilla.suse.com/show_bug.cgi?id=1232071
  * https://bugzilla.suse.com/show_bug.cgi?id=1232075
  * https://bugzilla.suse.com/show_bug.cgi?id=1232083
  * https://bugzilla.suse.com/show_bug.cgi?id=1232084
  * https://bugzilla.suse.com/show_bug.cgi?id=1232085
  * https://bugzilla.suse.com/show_bug.cgi?id=1232089
  * https://bugzilla.suse.com/show_bug.cgi?id=1232097
  * https://bugzilla.suse.com/show_bug.cgi?id=1232104
  * https://bugzilla.suse.com/show_bug.cgi?id=1232105
  * https://bugzilla.suse.com/show_bug.cgi?id=1232108
  * https://bugzilla.suse.com/show_bug.cgi?id=1232114
  * https://bugzilla.suse.com/show_bug.cgi?id=1232116
  * https://bugzilla.suse.com/show_bug.cgi?id=1232119
  * https://bugzilla.suse.com/show_bug.cgi?id=1232120
  * https://bugzilla.suse.com/show_bug.cgi?id=1232123
  * https://bugzilla.suse.com/show_bug.cgi?id=1232124
  * https://bugzilla.suse.com/show_bug.cgi?id=1232133
  * https://bugzilla.suse.com/show_bug.cgi?id=1232135
  * https://bugzilla.suse.com/show_bug.cgi?id=1232136
  * https://bugzilla.suse.com/show_bug.cgi?id=1232140
  * https://bugzilla.suse.com/show_bug.cgi?id=1232145
  * https://bugzilla.suse.com/show_bug.cgi?id=1232149
  * https://bugzilla.suse.com/show_bug.cgi?id=1232150
  * https://bugzilla.suse.com/show_bug.cgi?id=1232151
  * https://bugzilla.suse.com/show_bug.cgi?id=1232154
  * https://bugzilla.suse.com/show_bug.cgi?id=1232155
  * https://bugzilla.suse.com/show_bug.cgi?id=1232160
  * https://bugzilla.suse.com/show_bug.cgi?id=1232163
  * https://bugzilla.suse.com/show_bug.cgi?id=1232164
  * https://bugzilla.suse.com/show_bug.cgi?id=1232170
  * https://bugzilla.suse.com/show_bug.cgi?id=1232172
  * https://bugzilla.suse.com/show_bug.cgi?id=1232174
  * https://bugzilla.suse.com/show_bug.cgi?id=1232175
  * https://bugzilla.suse.com/show_bug.cgi?id=1232191
  * https://bugzilla.suse.com/show_bug.cgi?id=1232196
  * https://bugzilla.suse.com/show_bug.cgi?id=1232199
  * https://bugzilla.suse.com/show_bug.cgi?id=1232200
  * https://bugzilla.suse.com/show_bug.cgi?id=1232201
  * https://bugzilla.suse.com/show_bug.cgi?id=1232217
  * https://bugzilla.suse.com/show_bug.cgi?id=1232220
  * https://bugzilla.suse.com/show_bug.cgi?id=1232221
  * https://bugzilla.suse.com/show_bug.cgi?id=1232229
  * https://bugzilla.suse.com/show_bug.cgi?id=1232233
  * https://bugzilla.suse.com/show_bug.cgi?id=1232237
  * https://bugzilla.suse.com/show_bug.cgi?id=1232251
  * https://bugzilla.suse.com/show_bug.cgi?id=1232253
  * https://bugzilla.suse.com/show_bug.cgi?id=1232259
  * https://bugzilla.suse.com/show_bug.cgi?id=1232260
  * https://bugzilla.suse.com/show_bug.cgi?id=1232262
  * https://bugzilla.suse.com/show_bug.cgi?id=1232263
  * https://bugzilla.suse.com/show_bug.cgi?id=1232282
  * https://bugzilla.suse.com/show_bug.cgi?id=1232285
  * https://bugzilla.suse.com/show_bug.cgi?id=1232286
  * https://bugzilla.suse.com/show_bug.cgi?id=1232304
  * https://bugzilla.suse.com/show_bug.cgi?id=1232305
  * https://bugzilla.suse.com/show_bug.cgi?id=1232307
  * https://bugzilla.suse.com/show_bug.cgi?id=1232309
  * https://bugzilla.suse.com/show_bug.cgi?id=1232310
  * https://bugzilla.suse.com/show_bug.cgi?id=1232313
  * https://bugzilla.suse.com/show_bug.cgi?id=1232314
  * https://bugzilla.suse.com/show_bug.cgi?id=1232316
  * https://bugzilla.suse.com/show_bug.cgi?id=1232329
  * https://bugzilla.suse.com/show_bug.cgi?id=1232332
  * https://bugzilla.suse.com/show_bug.cgi?id=1232335
  * https://bugzilla.suse.com/show_bug.cgi?id=1232337
  * https://bugzilla.suse.com/show_bug.cgi?id=1232342
  * https://bugzilla.suse.com/show_bug.cgi?id=1232345
  * https://bugzilla.suse.com/show_bug.cgi?id=1232352
  * https://bugzilla.suse.com/show_bug.cgi?id=1232354
  * https://bugzilla.suse.com/show_bug.cgi?id=1232355
  * https://bugzilla.suse.com/show_bug.cgi?id=1232358
  * https://bugzilla.suse.com/show_bug.cgi?id=1232361
  * https://bugzilla.suse.com/show_bug.cgi?id=1232366
  * https://bugzilla.suse.com/show_bug.cgi?id=1232367
  * https://bugzilla.suse.com/show_bug.cgi?id=1232368
  * https://bugzilla.suse.com/show_bug.cgi?id=1232369
  * https://bugzilla.suse.com/show_bug.cgi?id=1232374
  * https://bugzilla.suse.com/show_bug.cgi?id=1232381
  * https://bugzilla.suse.com/show_bug.cgi?id=1232383
  * https://bugzilla.suse.com/show_bug.cgi?id=1232392
  * https://bugzilla.suse.com/show_bug.cgi?id=1232395
  * https://bugzilla.suse.com/show_bug.cgi?id=1232418
  * https://bugzilla.suse.com/show_bug.cgi?id=1232424
  * https://bugzilla.suse.com/show_bug.cgi?id=1232432
  * https://bugzilla.suse.com/show_bug.cgi?id=1232435
  * https://bugzilla.suse.com/show_bug.cgi?id=1232442
  * https://bugzilla.suse.com/show_bug.cgi?id=1232446
  * https://bugzilla.suse.com/show_bug.cgi?id=1232501
  * https://bugzilla.suse.com/show_bug.cgi?id=1232519
  * https://bugzilla.suse.com/show_bug.cgi?id=1232630
  * https://bugzilla.suse.com/show_bug.cgi?id=1232631
  * https://bugzilla.suse.com/show_bug.cgi?id=1232632
  * https://bugzilla.suse.com/show_bug.cgi?id=1232757

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20241113/feb3af33/attachment-0001.htm>


More information about the sle-updates mailing list