<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:3561-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2024-10-09T08:45:37Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">bsc#1012628</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1183045">bsc#1183045</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">bsc#1215199</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216223">bsc#1216223</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216776">bsc#1216776</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220382">bsc#1220382</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221527">bsc#1221527</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221610">bsc#1221610</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221650">bsc#1221650</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222629">bsc#1222629</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223600">bsc#1223600</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223848">bsc#1223848</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225487">bsc#1225487</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225812">bsc#1225812</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">bsc#1225903</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226003">bsc#1226003</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226507">bsc#1226507</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226606">bsc#1226606</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226666">bsc#1226666</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226846">bsc#1226846</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226860">bsc#1226860</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">bsc#1227487</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227694">bsc#1227694</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227726">bsc#1227726</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227819">bsc#1227819</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227885">bsc#1227885</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227890">bsc#1227890</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227962">bsc#1227962</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228090">bsc#1228090</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228140">bsc#1228140</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228244">bsc#1228244</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228507">bsc#1228507</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228771">bsc#1228771</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229001">bsc#1229001</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229004">bsc#1229004</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229019">bsc#1229019</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229086">bsc#1229086</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229167">bsc#1229167</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229169">bsc#1229169</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229289">bsc#1229289</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229334">bsc#1229334</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229362">bsc#1229362</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229363">bsc#1229363</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229364">bsc#1229364</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229371">bsc#1229371</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229380">bsc#1229380</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229389">bsc#1229389</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229394">bsc#1229394</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229429">bsc#1229429</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229443">bsc#1229443</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229452">bsc#1229452</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229455">bsc#1229455</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229456">bsc#1229456</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229494">bsc#1229494</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229585">bsc#1229585</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229753">bsc#1229753</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229764">bsc#1229764</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229768">bsc#1229768</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229790">bsc#1229790</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229810">bsc#1229810</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229899">bsc#1229899</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229928">bsc#1229928</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230015">bsc#1230015</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230119">bsc#1230119</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230123">bsc#1230123</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230124">bsc#1230124</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230125">bsc#1230125</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230169">bsc#1230169</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230170">bsc#1230170</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230171">bsc#1230171</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230173">bsc#1230173</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230174">bsc#1230174</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230175">bsc#1230175</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230176">bsc#1230176</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230178">bsc#1230178</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230180">bsc#1230180</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230181">bsc#1230181</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230185">bsc#1230185</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230191">bsc#1230191</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230192">bsc#1230192</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230193">bsc#1230193</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230194">bsc#1230194</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230195">bsc#1230195</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230200">bsc#1230200</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230204">bsc#1230204</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230206">bsc#1230206</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230207">bsc#1230207</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230209">bsc#1230209</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230211">bsc#1230211</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230213">bsc#1230213</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230217">bsc#1230217</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230221">bsc#1230221</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230224">bsc#1230224</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230230">bsc#1230230</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230232">bsc#1230232</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230233">bsc#1230233</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230240">bsc#1230240</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230244">bsc#1230244</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230245">bsc#1230245</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230247">bsc#1230247</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230248">bsc#1230248</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230269">bsc#1230269</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230270">bsc#1230270</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230295">bsc#1230295</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230340">bsc#1230340</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230426">bsc#1230426</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230430">bsc#1230430</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230431">bsc#1230431</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230432">bsc#1230432</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230433">bsc#1230433</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230434">bsc#1230434</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230435">bsc#1230435</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230440">bsc#1230440</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230441">bsc#1230441</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230442">bsc#1230442</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230444">bsc#1230444</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230450">bsc#1230450</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230451">bsc#1230451</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230454">bsc#1230454</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230455">bsc#1230455</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230457">bsc#1230457</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230459">bsc#1230459</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230506">bsc#1230506</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230507">bsc#1230507</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230511">bsc#1230511</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230515">bsc#1230515</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230517">bsc#1230517</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230518">bsc#1230518</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230519">bsc#1230519</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230520">bsc#1230520</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230521">bsc#1230521</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230524">bsc#1230524</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230526">bsc#1230526</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230533">bsc#1230533</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230535">bsc#1230535</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230539">bsc#1230539</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230540">bsc#1230540</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230549">bsc#1230549</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230556">bsc#1230556</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230562">bsc#1230562</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230563">bsc#1230563</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230564">bsc#1230564</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230580">bsc#1230580</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230582">bsc#1230582</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230589">bsc#1230589</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230602">bsc#1230602</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230699">bsc#1230699</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230700">bsc#1230700</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230701">bsc#1230701</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230702">bsc#1230702</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230703">bsc#1230703</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230704">bsc#1230704</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230705">bsc#1230705</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230706">bsc#1230706</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230709">bsc#1230709</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230711">bsc#1230711</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230712">bsc#1230712</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230715">bsc#1230715</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230719">bsc#1230719</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230722">bsc#1230722</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230724">bsc#1230724</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230725">bsc#1230725</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230726">bsc#1230726</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230727">bsc#1230727</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230730">bsc#1230730</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230731">bsc#1230731</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230732">bsc#1230732</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230747">bsc#1230747</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230748">bsc#1230748</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230749">bsc#1230749</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230751">bsc#1230751</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230752">bsc#1230752</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230753">bsc#1230753</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230756">bsc#1230756</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230761">bsc#1230761</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230766">bsc#1230766</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230767">bsc#1230767</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230768">bsc#1230768</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230771">bsc#1230771</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230772">bsc#1230772</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230775">bsc#1230775</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230776">bsc#1230776</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230780">bsc#1230780</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230783">bsc#1230783</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230786">bsc#1230786</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230787">bsc#1230787</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230791">bsc#1230791</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230794">bsc#1230794</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230796">bsc#1230796</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230802">bsc#1230802</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230806">bsc#1230806</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230808">bsc#1230808</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230809">bsc#1230809</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230810">bsc#1230810</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230812">bsc#1230812</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230813">bsc#1230813</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230814">bsc#1230814</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230815">bsc#1230815</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230821">bsc#1230821</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230825">bsc#1230825</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230830">bsc#1230830</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230831">bsc#1230831</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230854">bsc#1230854</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230948">bsc#1230948</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231008">bsc#1231008</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231035">bsc#1231035</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231120">bsc#1231120</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231146">bsc#1231146</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231182">bsc#1231182</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231183">bsc#1231183</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10954">jsc#PED-10954</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-9899">jsc#PED-9899</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52610.html">CVE-2023-52610</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52752.html">CVE-2023-52752</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52915.html">CVE-2023-52915</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52916.html">CVE-2023-52916</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26640.html">CVE-2024-26640</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26759.html">CVE-2024-26759</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26804.html">CVE-2024-26804</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-36953.html">CVE-2024-36953</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38538.html">CVE-2024-38538</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38596.html">CVE-2024-38596</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-38632.html">CVE-2024-38632</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40965.html">CVE-2024-40965</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40973.html">CVE-2024-40973</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-40983.html">CVE-2024-40983</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42154.html">CVE-2024-42154</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42243.html">CVE-2024-42243</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42252.html">CVE-2024-42252</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42265.html">CVE-2024-42265</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42294.html">CVE-2024-42294</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42304.html">CVE-2024-42304</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42305.html">CVE-2024-42305</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-42306.html">CVE-2024-42306</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43828.html">CVE-2024-43828</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43832.html">CVE-2024-43832</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43835.html">CVE-2024-43835</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43845.html">CVE-2024-43845</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43870.html">CVE-2024-43870</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43890.html">CVE-2024-43890</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43898.html">CVE-2024-43898</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43904.html">CVE-2024-43904</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-43914.html">CVE-2024-43914</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44935.html">CVE-2024-44935</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44944.html">CVE-2024-44944</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44946.html">CVE-2024-44946</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44947.html">CVE-2024-44947</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44948.html">CVE-2024-44948</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44950.html">CVE-2024-44950</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44951.html">CVE-2024-44951</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44952.html">CVE-2024-44952</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44954.html">CVE-2024-44954</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44960.html">CVE-2024-44960</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44961.html">CVE-2024-44961</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44962.html">CVE-2024-44962</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44965.html">CVE-2024-44965</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44967.html">CVE-2024-44967</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44969.html">CVE-2024-44969</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44970.html">CVE-2024-44970</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44971.html">CVE-2024-44971</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44977.html">CVE-2024-44977</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44982.html">CVE-2024-44982</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44984.html">CVE-2024-44984</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44985.html">CVE-2024-44985</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44986.html">CVE-2024-44986</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44987.html">CVE-2024-44987</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44988.html">CVE-2024-44988</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44989.html">CVE-2024-44989</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44990.html">CVE-2024-44990</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44991.html">CVE-2024-44991</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44997.html">CVE-2024-44997</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44998.html">CVE-2024-44998</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-44999.html">CVE-2024-44999</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45000.html">CVE-2024-45000</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45001.html">CVE-2024-45001</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45002.html">CVE-2024-45002</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45003.html">CVE-2024-45003</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45005.html">CVE-2024-45005</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45006.html">CVE-2024-45006</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45007.html">CVE-2024-45007</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45008.html">CVE-2024-45008</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45011.html">CVE-2024-45011</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45012.html">CVE-2024-45012</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45013.html">CVE-2024-45013</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45015.html">CVE-2024-45015</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45017.html">CVE-2024-45017</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45018.html">CVE-2024-45018</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45019.html">CVE-2024-45019</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45020.html">CVE-2024-45020</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45021.html">CVE-2024-45021</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45022.html">CVE-2024-45022</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45023.html">CVE-2024-45023</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45026.html">CVE-2024-45026</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45028.html">CVE-2024-45028</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45029.html">CVE-2024-45029</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-45030.html">CVE-2024-45030</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46672.html">CVE-2024-46672</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46673.html">CVE-2024-46673</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46674.html">CVE-2024-46674</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46675.html">CVE-2024-46675</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46676.html">CVE-2024-46676</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46677.html">CVE-2024-46677</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46679.html">CVE-2024-46679</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46685.html">CVE-2024-46685</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46686.html">CVE-2024-46686</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46687.html">CVE-2024-46687</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46689.html">CVE-2024-46689</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46691.html">CVE-2024-46691</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46692.html">CVE-2024-46692</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46693.html">CVE-2024-46693</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46694.html">CVE-2024-46694</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46695.html">CVE-2024-46695</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46702.html">CVE-2024-46702</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46706.html">CVE-2024-46706</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46707.html">CVE-2024-46707</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46709.html">CVE-2024-46709</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46710.html">CVE-2024-46710</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46714.html">CVE-2024-46714</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46715.html">CVE-2024-46715</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46716.html">CVE-2024-46716</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46717.html">CVE-2024-46717</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46719.html">CVE-2024-46719</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46720.html">CVE-2024-46720</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46722.html">CVE-2024-46722</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46723.html">CVE-2024-46723</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46724.html">CVE-2024-46724</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46725.html">CVE-2024-46725</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46726.html">CVE-2024-46726</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46728.html">CVE-2024-46728</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46729.html">CVE-2024-46729</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46730.html">CVE-2024-46730</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46731.html">CVE-2024-46731</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46732.html">CVE-2024-46732</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46734.html">CVE-2024-46734</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46735.html">CVE-2024-46735</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46737.html">CVE-2024-46737</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46738.html">CVE-2024-46738</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46739.html">CVE-2024-46739</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46741.html">CVE-2024-46741</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46743.html">CVE-2024-46743</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46744.html">CVE-2024-46744</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46745.html">CVE-2024-46745</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46746.html">CVE-2024-46746</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46747.html">CVE-2024-46747</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46749.html">CVE-2024-46749</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46750.html">CVE-2024-46750</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46751.html">CVE-2024-46751</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46752.html">CVE-2024-46752</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46753.html">CVE-2024-46753</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46755.html">CVE-2024-46755</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46756.html">CVE-2024-46756</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46757.html">CVE-2024-46757</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46758.html">CVE-2024-46758</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46759.html">CVE-2024-46759</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46760.html">CVE-2024-46760</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46761.html">CVE-2024-46761</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46767.html">CVE-2024-46767</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46771.html">CVE-2024-46771</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46772.html">CVE-2024-46772</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46773.html">CVE-2024-46773</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46774.html">CVE-2024-46774</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46776.html">CVE-2024-46776</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46778.html">CVE-2024-46778</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46780.html">CVE-2024-46780</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46781.html">CVE-2024-46781</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46783.html">CVE-2024-46783</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46784.html">CVE-2024-46784</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46786.html">CVE-2024-46786</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46787.html">CVE-2024-46787</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46791.html">CVE-2024-46791</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46794.html">CVE-2024-46794</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46797.html">CVE-2024-46797</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46798.html">CVE-2024-46798</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46822.html">CVE-2024-46822</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52610</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52752</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52752</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52915</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52915</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-52916</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26640</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26759</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26804</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-36953</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38538</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38538</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38596</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38632</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-38632</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40965</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40965</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40973</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40973</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40973</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-40983</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42154</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42154</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42243</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42243</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42243</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42252</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42252</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42252</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42265</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42294</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42294</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42304</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42305</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-42306</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43828</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43828</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43832</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43835</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43845</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43870</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43890</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43890</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43890</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43898</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43898</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43904</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43904</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43904</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43914</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43914</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-43914</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44935</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44935</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44944</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44944</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44944</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44946</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44946</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44947</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44947</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44947</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44948</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44950</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44951</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44952</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44952</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44954</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44960</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">0.0</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44960</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">0.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44960</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44961</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44961</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44961</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44962</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44962</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44962</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44965</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44965</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44967</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44967</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44969</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44969</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44970</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44970</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44971</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44971</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44977</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.9</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44977</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44982</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44984</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44985</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44985</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44986</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44986</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44987</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44987</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44988</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44989</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44989</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44990</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44990</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44991</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44997</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44997</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44998</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44998</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44999</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-44999</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45000</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45000</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45001</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45002</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45002</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45003</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45005</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45006</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45006</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45007</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45008</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45011</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45011</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45012</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45012</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45013</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45013</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45015</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45015</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45017</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45017</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45018</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45018</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45019</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45019</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45020</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45020</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45021</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45021</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45022</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45022</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45023</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45023</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45026</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45026</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45028</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45028</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45029</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45029</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45030</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-45030</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46672</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46672</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46673</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46673</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46674</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46674</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46675</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46675</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46675</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46676</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.4</span>
<span class="cvss-vector">CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46676</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.3</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46676</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46677</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46677</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46677</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46679</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46679</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46679</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46685</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46685</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46686</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46686</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46687</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46687</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46689</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46689</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46691</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46691</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46692</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46692</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46693</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46693</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46694</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46694</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46695</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46695</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46702</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46702</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46702</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46706</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.0</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46706</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46707</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46707</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46707</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46709</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46709</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46710</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46710</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46714</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46714</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46715</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46716</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46717</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46719</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46719</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46720</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46720</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46722</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46722</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46723</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46723</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46724</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46724</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46724</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46725</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46725</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46726</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46726</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46728</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46728</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46729</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46730</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46730</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46731</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46731</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46732</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46732</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46734</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46734</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46735</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46735</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46735</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46737</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46737</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46737</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46738</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46738</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46738</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46739</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.2</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46739</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46739</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46741</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46741</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46741</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46743</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46743</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46743</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46744</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46744</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46744</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46745</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46746</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46746</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46746</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46747</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46747</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46747</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46749</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46749</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46749</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46750</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46750</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46750</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46751</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46751</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46751</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46752</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46752</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46753</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46753</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46755</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46755</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46755</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46756</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">1.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46756</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46756</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46757</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">1.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46757</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46757</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46758</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">1.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46758</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46758</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46759</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">1.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46759</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46759</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46760</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46760</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46760</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46761</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46761</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46761</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46767</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46767</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46771</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46772</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46772</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46773</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46773</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46773</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46774</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46776</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46778</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46780</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46780</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46781</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46781</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46783</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46783</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46784</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46784</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46786</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46786</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46786</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46787</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46787</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46791</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46791</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46791</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46794</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.0</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46794</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46797</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46797</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46797</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46798</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.8</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46798</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46798</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46822</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-46822</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">Basesystem Module 15-SP6</li>
<li class="list-group-item">Development Tools Module 15-SP6</li>
<li class="list-group-item">Legacy Module 15-SP6</li>
<li class="list-group-item">openSUSE Leap 15.6</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Workstation Extension 15 SP6</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 162 vulnerabilities, contains two features and has 48 security fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610).</li>
<li>CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).</li>
<li>CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269).</li>
<li>CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).</li>
<li>CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).</li>
<li>CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).</li>
<li>CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).</li>
<li>CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846).</li>
<li>CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).</li>
<li>CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890).</li>
<li>CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819).</li>
<li>CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).</li>
<li>CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001).</li>
<li>CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004).</li>
<li>CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).</li>
<li>CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371).</li>
<li>CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364).</li>
<li>CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363).</li>
<li>CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362).</li>
<li>CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394).</li>
<li>CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380).</li>
<li>CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389).</li>
<li>CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).</li>
<li>CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753).</li>
<li>CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).</li>
<li>CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810).</li>
<li>CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899).</li>
<li>CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).</li>
<li>CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180).</li>
<li>CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181).</li>
<li>CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209).</li>
<li>CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211).</li>
<li>CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240).</li>
<li>CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206).</li>
<li>CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).</li>
<li>CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).</li>
<li>CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193).</li>
<li>CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194).</li>
<li>CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195).</li>
<li>CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171).</li>
<li>CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).</li>
<li>CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169).</li>
<li>CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).</li>
<li>CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).</li>
<li>CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430).</li>
<li>CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431).</li>
<li>CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432).</li>
<li>CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).</li>
<li>CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435).</li>
<li>CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455).</li>
<li>CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451).</li>
<li>CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457).</li>
<li>CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).</li>
<li>CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).</li>
<li>CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).</li>
<li>CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).</li>
<li>CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518).</li>
<li>CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526).</li>
<li>CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520).</li>
<li>CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521).</li>
<li>CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540).</li>
<li>CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).</li>
<li>CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704).</li>
<li>CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727).</li>
<li>CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).</li>
<li>CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786).</li>
<li>CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794).</li>
<li>CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).</li>
<li>CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772).</li>
<li>CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).</li>
<li>CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).</li>
<li>CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).</li>
<li>CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ABI: testing: fix admv8818 attr description (git-fixes).</li>
<li>ACPI: CPPC: Add helper to get the highest performance value (stable-fixes).</li>
<li>ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).</li>
<li>ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-fixes).</li>
<li>ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-fixes).</li>
<li>ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes).</li>
<li>ACPI: sysfs: validate return type of _STR method (git-fixes).</li>
<li>ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes).</li>
<li>ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes).</li>
<li>ALSA: control: Apply sanity check of input values for user elements (stable-fixes).</li>
<li>ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes).</li>
<li>ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15 X1504VAP (stable-fixes).</li>
<li>ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes).</li>
<li>ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).</li>
<li>ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes).</li>
<li>ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes).</li>
<li>ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes).</li>
<li>ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes).</li>
<li>ALSA: hda: cs35l41: fix module autoloading (git-fixes).</li>
<li>ARM: 9406/1: Fix callchain_trace() return value (git-fixes).</li>
<li>ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes).</li>
<li>ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes).</li>
<li>ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git-fixes).</li>
<li>ASoC: cs42l42: Convert comma to semicolon (git-fixes).</li>
<li>ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).</li>
<li>ASoC: intel: fix module autoloading (stable-fixes).</li>
<li>ASoC: meson: Remove unused declartion in header file (git-fixes).</li>
<li>ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).</li>
<li>ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes).</li>
<li>ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes).</li>
<li>ASoC: soc-ac97: Fix the incorrect description (git-fixes).</li>
<li>ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).</li>
<li>ASoC: tas2781-i2c: Get the right GPIO line (git-fixes).</li>
<li>ASoC: tda7419: fix module autoloading (stable-fixes).</li>
<li>ASoC: tegra: Fix CBB error during probe() (git-fixes).</li>
<li>ASoC: topology: Properly initialize soc_enum values (stable-fixes).</li>
<li>ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).</li>
<li>ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially broken alignment (stable-fixes).</li>
<li>Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).</li>
<li>Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() (stable-fixes).</li>
<li>Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).</li>
<li>Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).</li>
<li>Bluetooth: hci_event: Use HCI error defines instead of magic values (stable-fixes).</li>
<li>Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue (stable-fixes).</li>
<li>Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-fixes).</li>
<li>Detect memory allocation failure in annotated_source__alloc_histograms (bsc#1227962).</li>
<li>Documentation: ioctl: document 0x07 ioctl code (git-fixes).</li>
<li>Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).</li>
<li>Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).</li>
<li>HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).</li>
<li>HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-fixes).</li>
<li>HID: multitouch: Add support for GT7868Q (stable-fixes).</li>
<li>HID: wacom: Do not warn about dropped packets for first packet (git-fixes).</li>
<li>HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes).</li>
<li>IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)</li>
<li>Input: adp5588-keys - fix check on return code (git-fixes).</li>
<li>Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).</li>
<li>Input: ili210x - use kvmalloc() to allocate buffer for firmware update (stable-fixes).</li>
<li>Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).</li>
<li>Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).</li>
<li>Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).</li>
<li>Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes).</li>
<li>Input: tsc2004/5 - fix reset handling on probe (git-fixes).</li>
<li>Input: tsc2004/5 - use device core to create driver-specific device attributes (git-fixes).</li>
<li>Input: uinput - reject requests with unreasonable number of slots (stable-fixes).</li>
<li>KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes).</li>
<li>KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes).</li>
<li>KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes).</li>
<li>KVM: arm64: Block unsafe FF-A calls from the host (git-fixes).</li>
<li>KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging (git-fixes).</li>
<li>KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git-fixes).</li>
<li>KVM: arm64: Do not re-initialize the KVM lock (git-fixes).</li>
<li>KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes).</li>
<li>KVM: arm64: Make ICC_<em>SGI</em>_EL1 undef in the absence of a vGICv3 (git-fixes).</li>
<li>KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes).</li>
<li>KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes).</li>
<li>KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-fixes).</li>
<li>KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes).</li>
<li>Move fixes into sorted section (bsc#1230119)</li>
<li>NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).</li>
<li>NFSD: Fix frame size warning in svc_export_parse() (git-fixes).</li>
<li>NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).</li>
<li>NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes).</li>
<li>PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).</li>
<li>PCI: Wait for Link before restoring Downstream Buses (git-fixes).</li>
<li>PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes).</li>
<li>PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).</li>
<li>PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git-fixes).</li>
<li>PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).</li>
<li>PCI: imx6: Fix missing call to phy_power_off() in error handling (git-fixes).</li>
<li>PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-fixes).</li>
<li>PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).</li>
<li>PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes).</li>
<li>PCI: qcom-ep: Enable controller resources like PHY only after refclk is available (git-fixes).</li>
<li>PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).</li>
<li>PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).</li>
<li>PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).</li>
<li>RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)</li>
<li>RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)</li>
<li>RDMA/efa: Properly handle unexpected AQ completions (git-fixes)</li>
<li>RDMA/erdma: Return QP state in erdma_query_qp (git-fixes)</li>
<li>RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)</li>
<li>RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes)</li>
<li>RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes)</li>
<li>RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-fixes)</li>
<li>RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes)</li>
<li>RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes)</li>
<li>RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)</li>
<li>RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)</li>
<li>RDMA/hns: Optimize hem allocation performance (git-fixes)</li>
<li>RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)</li>
<li>RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-fixes)</li>
<li>RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes)</li>
<li>RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes)</li>
<li>RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes)</li>
<li>RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes)</li>
<li>RDMA/mlx5: Obtain upper net device only when needed (git-fixes)</li>
<li>RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)</li>
<li>RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-fixes)</li>
<li>Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).</li>
<li>Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" (git-fixes).</li>
<li>Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019)</li>
<li>Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable-fixes).</li>
<li>Revert "media: tuners: fix error return code of hybrid_tuner_request_state()" (git-fixes).</li>
<li>Revert "mm, kmsan: fix infinite recursion due to RCU critical section"</li>
<li>Revert "mm/sparsemem: fix race in accessing memory_section->usage"</li>
<li>Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"</li>
<li>Squashfs: sanity check symbolic link size (git-fixes).</li>
<li>USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).</li>
<li>USB: serial: kobil_sct: restore initial terminal settings (git-fixes).</li>
<li>USB: serial: option: add MeiG Smart SRM825L (git-fixes).</li>
<li>USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).</li>
<li>USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).</li>
<li>VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes).</li>
<li>afs: Do not cross .backup mountpoint from backup volume (git-fixes).</li>
<li>afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).</li>
<li>arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)</li>
<li>arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)</li>
<li>arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).</li>
<li>arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes).</li>
<li>arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git-fixes).</li>
<li>arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes).</li>
<li>arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-fixes).</li>
<li>arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git-fixes).</li>
<li>arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes).</li>
<li>arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-fixes).</li>
<li>arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on RK3399 Puma (git-fixes).</li>
<li>arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes).</li>
<li>arm64: signal: Fix some under-bracketed UAPI macros (git-fixes).</li>
<li>arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)</li>
<li>arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)</li>
<li>arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)</li>
<li>ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes).</li>
<li>ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git-fixes).</li>
<li>ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).</li>
<li>ata: pata_macio: Use WARN instead of BUG (stable-fixes).</li>
<li>blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).</li>
<li>blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).</li>
<li>bpf, events: Use prog to emit ksymbol event for main program (git-fixes).</li>
<li>bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes).</li>
<li>btrfs: fix race between direct IO write and fsync when using same fd (git-fixes).</li>
<li>btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1230854).</li>
<li>bus: integrator-lm: fix OF node leak in probe() (git-fixes).</li>
<li>cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231008).</li>
<li>cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183).</li>
<li>can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes).</li>
<li>can: bcm: Remove proc entry when dev is unregistered (git-fixes).</li>
<li>can: j1939: use correct function name in comment (git-fixes).</li>
<li>can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes).</li>
<li>can: m_can: Release irq on error in m_can_open (git-fixes).</li>
<li>can: m_can: enable NAPI before enabling interrupts (git-fixes).</li>
<li>can: m_can: m_can_close(): stop clocks after device has been shut down (git-fixes).</li>
<li>can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-fixes).</li>
<li>can: mcp251xfd: clarify the meaning of timestamp (stable-fixes).</li>
<li>can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD mode (git-fixes).</li>
<li>can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate function (stable-fixes).</li>
<li>can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration (stable-fixes).</li>
<li>can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into mcp251xfd_chip_start/stop() (stable-fixes).</li>
<li>can: mcp251xfd: properly indent labels (stable-fixes).</li>
<li>can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes).</li>
<li>can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum (stable-fixes).</li>
<li>cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).</li>
<li>cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable-fixes).</li>
<li>ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182).</li>
<li>clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).</li>
<li>clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885).</li>
<li>clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-fixes).</li>
<li>clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes).</li>
<li>clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes).</li>
<li>clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git-fixes).</li>
<li>clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes).</li>
<li>clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes).</li>
<li>clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes).</li>
<li>clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git-fixes).</li>
<li>clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX (git-fixes).</li>
<li>clocksource/drivers/qcom: Add missing iounmap() on errors in msm_dt_timer_init() (git-fixes).</li>
<li>cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable-fixes).</li>
<li>cpufreq: amd-pstate: fix the highest frequency issue which limits performance (git-fixes).</li>
<li>cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes).</li>
<li>cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes).</li>
<li>crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes).</li>
<li>crypto: ccp - do not request interrupt on cmd completion when irqs disabled (git-fixes).</li>
<li>crypto: iaa - Fix potential use after free bug (git-fixes).</li>
<li>crypto: qat - fix unintentional re-enabling of error interrupts (stable-fixes).</li>
<li>crypto: xor - fix template benchmarking (git-fixes).</li>
<li>cxl/core: Fix incorrect vendor debug UUID define (git-fixes).</li>
<li>cxl/pci: Fix to record only non-zero ranges (git-fixes).</li>
<li>devres: Initialize an uninitialized struct member (stable-fixes).</li>
<li>dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes).</li>
<li>dma-debug: avoid deadlock between dma debug vs printk and netconsole (stable-fixes).</li>
<li>dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (stable-fixes).</li>
<li>dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking callbacks (stable-fixes).</li>
<li>driver core: Fix a potential null-ptr-deref in module_add_driver() (git-fixes).</li>
<li>driver core: Fix error handling in driver API device_rename() (git-fixes).</li>
<li>driver: iio: add missing checks on iio_info's callback access (stable-fixes).</li>
<li>drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes).</li>
<li>drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes).</li>
<li>drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).</li>
<li>drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).</li>
<li>drm/amd/amdgpu: Properly tune the size of struct (git-fixes).</li>
<li>drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).</li>
<li>drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (git-fixes).</li>
<li>drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing (stable-fixes).</li>
<li>drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).</li>
<li>drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes).</li>
<li>drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() (git-fixes).</li>
<li>drm/amd/display: Check BIOS images before it is used (stable-fixes).</li>
<li>drm/amd/display: Check HDCP returned status (stable-fixes).</li>
<li>drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes).</li>
<li>drm/amd/display: Check denominator pbn_div before used (stable-fixes).</li>
<li>drm/amd/display: Check gpio_id before used as array index (stable-fixes).</li>
<li>drm/amd/display: Check index for aux_rd_interval before using (stable-fixes).</li>
<li>drm/amd/display: Check msg_id before processing transcation (stable-fixes).</li>
<li>drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes).</li>
<li>drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes).</li>
<li>drm/amd/display: Defer handling mst up request in resume (stable-fixes).</li>
<li>drm/amd/display: Disable error correction if it's not supported (stable-fixes).</li>
<li>drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay (stable-fixes).</li>
<li>drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes).</li>
<li>drm/amd/display: Ensure index calculation will not overflow (stable-fixes).</li>
<li>drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes).</li>
<li>drm/amd/display: Fix Coverity INTEGER_OVERFLOW within decide_fallback_link_setting_max_bw_policy (stable-fixes).</li>
<li>drm/amd/display: Fix Coverity INTERGER_OVERFLOW within construct_integrated_info (stable-fixes).</li>
<li>drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes).</li>
<li>drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (stable-fixes).</li>
<li>drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35 (stable-fixes).</li>
<li>drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes).</li>
<li>drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection (stable-fixes).</li>
<li>drm/amd/display: Replace dm_execute_dmub_cmd with dc_wake_and_execute_dmub_cmd (git-fixes).</li>
<li>drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes).</li>
<li>drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes).</li>
<li>drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-fixes).</li>
<li>drm/amd/display: Solve mst monitors blank out problem after resume (git-fixes).</li>
<li>drm/amd/display: Spinlock before reading event (stable-fixes).</li>
<li>drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes).</li>
<li>drm/amd/display: Wake DMCUB before sending a command for replay feature (stable-fixes).</li>
<li>drm/amd/display: added NULL check at start of dc_validate_stream (stable-fixes).</li>
<li>drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git-fixes).</li>
<li>drm/amd/display: use preferred link settings for dp signal only (stable-fixes).</li>
<li>drm/amd/pm: Fix negative array index read (stable-fixes).</li>
<li>drm/amd/pm: check negtive return for table entries (stable-fixes).</li>
<li>drm/amd/pm: check specific index for aldebaran (stable-fixes).</li>
<li>drm/amd/pm: check specific index for smu13 (stable-fixes).</li>
<li>drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).</li>
<li>drm/amd/pm: fix uninitialized variable warning (stable-fixes).</li>
<li>drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-fixes).</li>
<li>drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-fixes).</li>
<li>drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-fixes).</li>
<li>drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-fixes).</li>
<li>drm/amd: Add gfx12 swizzle mode defs (stable-fixes).</li>
<li>drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).</li>
<li>drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported (stable-fixes).</li>
<li>drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes).</li>
<li>drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-fixes).</li>
<li>drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).</li>
<li>drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).</li>
<li>drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes).</li>
<li>drm/amdgpu: Fix get each xcp macro (git-fixes).</li>
<li>drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).</li>
<li>drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).</li>
<li>drm/amdgpu: Fix smatch static checker warning (stable-fixes).</li>
<li>drm/amdgpu: Fix the uninitialized variable warning (stable-fixes).</li>
<li>drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes).</li>
<li>drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-fixes).</li>
<li>drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable-fixes).</li>
<li>drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes).</li>
<li>drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).</li>
<li>drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes).</li>
<li>drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes).</li>
<li>drm/amdgpu: add missing error handling in function amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes).</li>
<li>drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes).</li>
<li>drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes).</li>
<li>drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).</li>
<li>drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes).</li>
<li>drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).</li>
<li>drm/amdgpu: fix a possible null pointer dereference (git-fixes).</li>
<li>drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes).</li>
<li>drm/amdgpu: fix dereference after null check (stable-fixes).</li>
<li>drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).</li>
<li>drm/amdgpu: fix overflowed array index read warning (stable-fixes).</li>
<li>drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating() (stable-fixes).</li>
<li>drm/amdgpu: fix the waring dereferencing hive (stable-fixes).</li>
<li>drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).</li>
<li>drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).</li>
<li>drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes).</li>
<li>drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).</li>
<li>drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes).</li>
<li>drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).</li>
<li>drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-fixes).</li>
<li>drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes).</li>
<li>drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes).</li>
<li>drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes).</li>
<li>drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes).</li>
<li>drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes).</li>
<li>drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes).</li>
<li>drm/fb-helper: Do not schedule_work() to flush frame buffer during panic() (stable-fixes).</li>
<li>drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes).</li>
<li>drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).</li>
<li>drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-fixes).</li>
<li>drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).</li>
<li>drm/i915: Do not attempt to load the GSC multiple times (git-fixes).</li>
<li>drm/kfd: Correct pinned buffer handling at kfd restore and validate process (stable-fixes).</li>
<li>drm/mediatek: Set sensible cursor width/height values to fix crash (stable-fixes).</li>
<li>drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes).</li>
<li>drm/meson: plane: Add error handling (stable-fixes).</li>
<li>drm/msm/a5xx: disable preemption in submits by default (git-fixes).</li>
<li>drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).</li>
<li>drm/msm/a5xx: properly clear preemption records on resume (git-fixes).</li>
<li>drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).</li>
<li>drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).</li>
<li>drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes).</li>
<li>drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).</li>
<li>drm/msm: fix %s null argument error (git-fixes).</li>
<li>drm/nouveau/fb: restore init() for ramgp102 (git-fixes).</li>
<li>drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-fixes).</li>
<li>drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-fixes).</li>
<li>drm/radeon: properly handle vbios fake edid sizing (git-fixes).</li>
<li>drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-fixes).</li>
<li>drm/rockchip: vop: Allow 4096px width scaling (git-fixes).</li>
<li>drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes).</li>
<li>drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes).</li>
<li>drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes).</li>
<li>drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).</li>
<li>drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes).</li>
<li>drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes).</li>
<li>drm: komeda: Fix an issue related to normalized zpos (stable-fixes).</li>
<li>drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).</li>
<li>ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes).</li>
<li>erofs: fix incorrect symlink detection in fast symlink (git-fixes).</li>
<li>exfat: fix memory leak in exfat_load_bitmap() (git-fixes).</li>
<li>fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).</li>
<li>firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes).</li>
<li>firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).</li>
<li>firmware_loader: Block path traversal (git-fixes).</li>
<li>fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230602).</li>
<li>fuse: fix memory leak in fuse_create_open (bsc#1230124).</li>
<li>fuse: update stats for pages in dropped aux writeback list (bsc#1230125).</li>
<li>fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230123).</li>
<li>gpio: modepin: Enable module autoloading (git-fixes).</li>
<li>gpio: rockchip: fix OF node leak in probe() (git-fixes).</li>
<li>hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes).</li>
<li>hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes).</li>
<li>hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes).</li>
<li>hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-fixes).</li>
<li>hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).</li>
<li>hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (stable-fixes).</li>
<li>hwmon: (ntc_thermistor) fix module autoloading (git-fixes).</li>
<li>hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >= 1.2 (git-fixes).</li>
<li>hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes).</li>
<li>hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-fixes).</li>
<li>hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-fixes).</li>
<li>hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).</li>
<li>i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-fixes).</li>
<li>i2c: designware: fix controller is holding SCL low while ENABLE bit is disabled (git-fixes).</li>
<li>i2c: isch: Add missed 'else' (git-fixes).</li>
<li>i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).</li>
<li>i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).</li>
<li>i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition (git-fixes).</li>
<li>i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-fixes).</li>
<li>iio: adc: ad7124: fix chip ID mismatch (git-fixes).</li>
<li>iio: adc: ad7124: fix config comparison (git-fixes).</li>
<li>iio: adc: ad7606: fix oversampling gpio array (git-fixes).</li>
<li>iio: adc: ad7606: fix standby gpio state to match the documentation (git-fixes).</li>
<li>iio: adc: ad7606: remove frstdata check for serial mode (git-fixes).</li>
<li>iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).</li>
<li>iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-fixes).</li>
<li>iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-fixes).</li>
<li>iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).</li>
<li>ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).</li>
<li>ipmi:ssif: Improve detecting during probing (bsc#1228771)</li>
<li>ipmi:ssif: Improve detecting during probing (bsc#1228771)</li>
<li>ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206)</li>
<li>jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).</li>
<li>kABI workaround for cros_ec stuff (git-fixes).</li>
<li>kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776).</li>
<li>kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable-fixes).</li>
<li>kthread: Fix task state in kthread worker if being frozen (bsc#1231146).</li>
<li>leds: spi-byte: Call of_node_put() on error path (stable-fixes).</li>
<li>lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable-fixes).</li>
<li>lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).</li>
<li>mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).</li>
<li>mailbox: rockchip: fix a typo in module autoloading (git-fixes).</li>
<li>media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes).</li>
<li>media: ov5675: Fix power on/off delay timings (git-fixes).</li>
<li>media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE (git-fixes).</li>
<li>media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).</li>
<li>media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes).</li>
<li>media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).</li>
<li>media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).</li>
<li>media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).</li>
<li>media: venus: fix use after free bug in venus_remove due to race condition (git-fixes).</li>
<li>media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).</li>
<li>media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes).</li>
<li>media: vivid: fix wrong sizeimage value for mplane (stable-fixes).</li>
<li>memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes).</li>
<li>memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes).</li>
<li>minmax: reduce min/max macro expansion in atomisp driver (git-fixes).</li>
<li>misc: fastrpc: Fix double free of 'buf' in error path (git-fixes).</li>
<li>mmc: core: apply SD quirks earlier during probe (git-fixes).</li>
<li>mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).</li>
<li>mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).</li>
<li>mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).</li>
<li>module: Fix KCOV-ignored file name (git-fixes).</li>
<li>mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).</li>
<li>mtd: slram: insert break after errors in parsing the map (git-fixes).</li>
<li>net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-fixes).</li>
<li>net: phy: Fix missing of_node_put() for leds (git-fixes).</li>
<li>net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes).</li>
<li>net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).</li>
<li>net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes).</li>
<li>nfsd: Do not leave work of closing files to a work queue (bsc#1228140).</li>
<li>nilfs2: determine empty node blocks as corrupted (git-fixes).</li>
<li>nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).</li>
<li>nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).</li>
<li>nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).</li>
<li>nilfs2: fix state management in error path of log writing function (git-fixes).</li>
<li>nilfs2: protect references to superblock parameters exposed in sysfs (git-fixes).</li>
<li>nouveau: fix the fwsec sb verification register (git-fixes).</li>
<li>nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244).</li>
<li>nvme-multipath: system fails to create generic nvme device (bsc#1228244).</li>
<li>nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).</li>
<li>nvme-pci: allocate tagset on reset if necessary (git-fixes).</li>
<li>nvme-tcp: fix link failure for TCP auth (git-fixes).</li>
<li>nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).</li>
<li>nvme: clear caller pointer on identify failure (git-fixes).</li>
<li>nvme: fix namespace removal list (git-fixes).</li>
<li>nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).</li>
<li>nvmet-tcp: do not continue for invalid icreq (git-fixes).</li>
<li>nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).</li>
<li>nvmet-trace: avoid dereferencing pointer too early (git-fixes).</li>
<li>nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes).</li>
<li>ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).</li>
<li>ocfs2: fix null-ptr-deref when journal load failed (git-fixes).</li>
<li>ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).</li>
<li>ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).</li>
<li>pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).</li>
<li>pcmcia: Use resource_size function on resource object (stable-fixes).</li>
<li>perf annotate: Introduce global annotation_options (git-fixes).</li>
<li>perf annotate: Split branch stack cycles information out of 'struct annotation_line' (git-fixes).</li>
<li>perf annotate: Use global annotation_options (git-fixes).</li>
<li>perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes).</li>
<li>perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes).</li>
<li>perf intel-pt: Fix exclude_guest setting (git-fixes).</li>
<li>perf machine thread: Remove exited threads by default (git-fixes).</li>
<li>perf maps: Move symbol maps functions to maps.c (git-fixes).</li>
<li>perf pmu: Assume sysfs events are always the same case (git-fixes).</li>
<li>perf pmus: Fixes always false when compare duplicates aliases (git-fixes).</li>
<li>perf record: Lazy load kernel symbols (git-fixes).</li>
<li>perf report: Convert to the global annotation_options (git-fixes).</li>
<li>perf report: Fix condition in sort__sym_cmp() (git-fixes).</li>
<li>perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes).</li>
<li>perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes).</li>
<li>perf tool: fix dereferencing NULL al->maps (git-fixes).</li>
<li>perf tools: Add/use PMU reverse lookup from config to name (git-fixes).</li>
<li>perf tools: Use pmus to describe type from attribute (git-fixes).</li>
<li>perf top: Convert to the global annotation_options (git-fixes).</li>
<li>perf/core: Fix missing wakeup when waiting for context reference (git-fixes).</li>
<li>perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git-fixes).</li>
<li>perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes).</li>
<li>perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes).</li>
<li>perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes).</li>
<li>perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git-fixes).</li>
<li>perf/x86/intel/pt: Fix topa_entry base length (git-fixes).</li>
<li>perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git-fixes).</li>
<li>perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119).</li>
<li>perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes).</li>
<li>perf/x86/intel: Factor out the initialization code for SPR (git fixes).</li>
<li>perf/x86/intel: Limit the period on Haswell (git-fixes).</li>
<li>perf/x86/intel: Use the common uarch name for the shared functions (git fixes).</li>
<li>perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (bsc#1230119).</li>
<li>perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (bsc#1230119).</li>
<li>perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (bsc#1230119).</li>
<li>perf/x86/uncore: Cleanup unused unit structure (bsc#1230119).</li>
<li>perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (bsc#1230119).</li>
<li>perf/x86/uncore: Save the unit control address of all units (bsc#1230119).</li>
<li>perf/x86/uncore: Support per PMU cpumask (bsc#1230119).</li>
<li>perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes).</li>
<li>perf/x86: Serialize set_attr_rdpmc() (git-fixes).</li>
<li>perf: Fix default aux_watermark calculation (git-fixes).</li>
<li>perf: Fix event leak upon exit (git-fixes).</li>
<li>perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes).</li>
<li>perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes).</li>
<li>perf: script: add raw|disasm arguments to --insn-trace option (git-fixes).</li>
<li>phy: zynqmp: Take the phy mutex in xlate (stable-fixes).</li>
<li>pinctrl: at91: make it work with current gpiolib (stable-fixes).</li>
<li>pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes).</li>
<li>pinctrl: single: fix missing error code in pcs_probe() (git-fixes).</li>
<li>platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable-fixes).</li>
<li>platform/surface: aggregator_registry: Add Support for Surface Pro 10 (stable-fixes).</li>
<li>platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes).</li>
<li>platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).</li>
<li>platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes).</li>
<li>platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-fixes).</li>
<li>platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes).</li>
<li>power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes).</li>
<li>power: supply: axp20x_battery: Remove design from min and max voltage (git-fixes).</li>
<li>power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).</li>
<li>power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes).</li>
<li>powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes).</li>
<li>powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656).</li>
<li>pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes).</li>
<li>r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).</li>
<li>regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes).</li>
<li>regmap: spi: Fix potential off-by-one when calculating reserved size (stable-fixes).</li>
<li>regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes).</li>
<li>regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value (git-fixes).</li>
<li>regulator: core: Fix short description for _regulator_check_status_enabled() (git-fixes).</li>
<li>regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR (git-fixes).</li>
<li>regulator: rt5120: Convert comma to semicolon (git-fixes).</li>
<li>regulator: wm831x-isink: Convert comma to semicolon (git-fixes).</li>
<li>remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes).</li>
<li>remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes).</li>
<li>remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes).</li>
<li>reset: berlin: fix OF node leak in probe() error path (git-fixes).</li>
<li>reset: k210: fix OF node leak in probe() error path (git-fixes).</li>
<li>resource: fix region_intersects() vs add_memory_driver_managed() (git-fixes).</li>
<li>rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc</li>
<li>rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).</li>
<li>s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694).</li>
<li>s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes).</li>
<li>s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562).</li>
<li>s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563).</li>
<li>s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564).</li>
<li>scripts: kconfig: merge_config: config files: add a trailing newline (stable-fixes).</li>
<li>scripts: sphinx-pre-install: remove unnecessary double check for $cur_version (git-fixes).</li>
<li>scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).</li>
<li>scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429 jsc#PED-9899).</li>
<li>scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899).</li>
<li>scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429 jsc#PED-9899).</li>
<li>scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429 jsc#PED-9899).</li>
<li>scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429 jsc#PED-9899).</li>
<li>scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429 jsc#PED-9899).</li>
<li>scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899).</li>
<li>scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429 jsc#PED-9899).</li>
<li>scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848).</li>
<li>selftests: lib: remove strscpy test (git-fixes).</li>
<li>selinux,smack: do not bypass permissions check in inode_setsecctx hook (stable-fixes).</li>
<li>soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes).</li>
<li>soc: versatile: integrator: fix OF node leak in probe() error path (git-fixes).</li>
<li>spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes).</li>
<li>spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes).</li>
<li>spi: bcm63xx: Enable module autoloading (stable-fixes).</li>
<li>spi: bcm63xx: Fix module autoloading (git-fixes).</li>
<li>spi: meson-spicc: convert comma to semicolon (git-fixes).</li>
<li>spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).</li>
<li>spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).</li>
<li>spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).</li>
<li>spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git-fixes).</li>
<li>spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).</li>
<li>spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).</li>
<li>spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes).</li>
<li>spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).</li>
<li>staging: iio: frequency: ad9834: Validate frequency parameter value (git-fixes).</li>
<li>supported.conf: mark adiantum and xctr crypto modules as supported (bsc#1231035)</li>
<li>thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes).</li>
<li>thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git-fixes).</li>
<li>thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git-fixes).</li>
<li>thunderbolt: There are only 5 basic router registers in pre-USB4 routers (git-fixes).</li>
<li>tomoyo: fallback to realpath if symlink's pathname does not exist (git-fixes).</li>
<li>tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load (git-fixes).</li>
<li>tpm: Clean up TPM space after command failure (git-fixes).</li>
<li>tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).</li>
<li>tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).</li>
<li>uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-fixes).</li>
<li>usb: cdnsp: Fix incorrect usb_request status (git-fixes).</li>
<li>usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).</li>
<li>usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).</li>
<li>usb: dwc3: Avoid waking up gadget during startxfer (git-fixes).</li>
<li>usb: dwc3: core: Prevent USB core invalid event buffer address access (git-fixes).</li>
<li>usb: dwc3: core: Prevent USB core invalid event buffer address access (stable-fixes).</li>
<li>usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes).</li>
<li>usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes).</li>
<li>usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).</li>
<li>usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes).</li>
<li>usb: uas: set host status byte on data completion error (stable-fixes).</li>
<li>usbip: Do not submit special requests twice (stable-fixes).</li>
<li>usbnet: ipheth: add CDC NCM support (git-fixes).</li>
<li>usbnet: ipheth: do not stop RX on failing RX callback (git-fixes).</li>
<li>usbnet: ipheth: drop RX URBs with no payload (git-fixes).</li>
<li>usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes).</li>
<li>usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes).</li>
<li>usbnet: ipheth: race between ipheth_close and error handling (stable-fixes).</li>
<li>usbnet: ipheth: remove extraneous rx URB length check (git-fixes).</li>
<li>usbnet: ipheth: transmit URBs without trailing padding (git-fixes).</li>
<li>usbnet: modern method to get random MAC (git-fixes).</li>
<li>virtio-net: synchronize probe with ndo_set_features (git-fixes).</li>
<li>virtio_net: Fix napi_skb_cache_put warning (git-fixes).</li>
<li>virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).</li>
<li>watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).</li>
<li>wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable-fixes).</li>
<li>wifi: ath12k: fix BSS chan info request WMI command (git-fixes).</li>
<li>wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes).</li>
<li>wifi: ath12k: fix invalid AMPDU factor calculation in ath12k_peer_assoc_h_he() (git-fixes).</li>
<li>wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he() (stable-fixes).</li>
<li>wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850() (stable-fixes).</li>
<li>wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable-fixes).</li>
<li>wifi: ath12k: match WMI BSS chan info structure with firmware definition (git-fixes).</li>
<li>wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).</li>
<li>wifi: brcmfmac: introducing fwil query functions (git-fixes).</li>
<li>wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).</li>
<li>wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).</li>
<li>wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git-fixes).</li>
<li>wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-fixes).</li>
<li>wifi: cfg80211: make hash table duplicates more survivable (stable-fixes).</li>
<li>wifi: cfg80211: restrict operation during radar detection (stable-fixes).</li>
<li>wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).</li>
<li>wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: increase the time between ranging measurements (git-fixes).</li>
<li>wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes).</li>
<li>wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes).</li>
<li>wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD (stable-fixes).</li>
<li>wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes).</li>
<li>wifi: mac80211: fix the comeback long retry times (git-fixes).</li>
<li>wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable-fixes).</li>
<li>wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-fixes).</li>
<li>wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes).</li>
<li>wifi: mt76: mt7603: fix mixed declarations and code (git-fixes).</li>
<li>wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).</li>
<li>wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes).</li>
<li>wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes).</li>
<li>wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-fixes).</li>
<li>wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes).</li>
<li>wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change (stable-fixes).</li>
<li>wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage (git-fixes).</li>
<li>wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc (git-fixes).</li>
<li>wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes).</li>
<li>wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes).</li>
<li>wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he (git-fixes).</li>
<li>wifi: mt76: mt7996: fix traffic delay when switching back to working channel (git-fixes).</li>
<li>wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes).</li>
<li>wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes).</li>
<li>wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes).</li>
<li>wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes).</li>
<li>wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).</li>
<li>wifi: rtw88: always wait for both firmware loading attempts (git-fixes).</li>
<li>wifi: rtw88: remove CPT execution branch never used (git-fixes).</li>
<li>wifi: rtw88: usb: schedule rx work after everything is set up (stable-fixes).</li>
<li>wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes).</li>
<li>wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware (stable-fixes).</li>
<li>wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes).</li>
<li>x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).</li>
<li>x86/kaslr: Expose and use the end of the physical memory address space (bsc#1229443).</li>
<li>x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382).</li>
<li>x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382).</li>
<li>x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527).</li>
<li>x86/pat: Fix W^X violation false-positives when running as Xen PV guest (bsc#1221527).</li>
<li>x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527).</li>
<li>x86/pat: Restructure _lookup_address_cpa() (bsc#1221527).</li>
<li>xen/swiotlb: add alignment check for dma buffers (bsc#1229928).</li>
<li>xen/swiotlb: fix allocated size (git-fixes).</li>
<li>xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).</li>
<li>xen: allow mapping ACPI data using a different physical address (bsc#1226003).</li>
<li>xen: introduce generic helper checking for memory map conflicts (bsc#1226003).</li>
<li>xen: move checks for e820 conflicts further up (bsc#1226003).</li>
<li>xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).</li>
<li>xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003).</li>
<li>xen: use correct end address of kernel for conflict checking (bsc#1226003).</li>
<li>xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git-fixes).</li>
<li>xhci: Set quirky xHC PCI hosts to D3 <em>after</em> stopping and freeing them (git-fixes).</li>
<li>xz: cleanup CRC32 edits from 2018 (git-fixes).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.6
<br/>
<code>zypper in -t patch SUSE-2024-3561=1 openSUSE-SLE-15.6-2024-3561=1</code>
</li>
<li class="list-group-item">
Basesystem Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3561=1</code>
</li>
<li class="list-group-item">
Development Tools Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3561=1</code>
</li>
<li class="list-group-item">
Legacy Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3561=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3561=1</code>
<br/>
Please note that this is the initial kernel livepatch without fixes itself,
this package is later updated by separate standalone kernel livepatch
updates.
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 15 SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3561=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Workstation Extension 15 SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3561=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.6 (noarch nosrc)
<ul>
<li>kernel-docs-6.4.0-150600.23.25.2</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (noarch)
<ul>
<li>kernel-docs-html-6.4.0-150600.23.25.2</li>
<li>kernel-source-vanilla-6.4.0-150600.23.25.1</li>
<li>kernel-devel-6.4.0-150600.23.25.1</li>
<li>kernel-source-6.4.0-150600.23.25.1</li>
<li>kernel-macros-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (nosrc ppc64le x86_64)
<ul>
<li>kernel-debug-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (ppc64le x86_64)
<ul>
<li>kernel-debug-debugsource-6.4.0-150600.23.25.1</li>
<li>kernel-debug-devel-6.4.0-150600.23.25.1</li>
<li>kernel-debug-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-debug-livepatch-devel-6.4.0-150600.23.25.1</li>
<li>kernel-debug-devel-debuginfo-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (x86_64)
<ul>
<li>kernel-debug-vdso-6.4.0-150600.23.25.1</li>
<li>kernel-default-vdso-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-kvmsmall-vdso-6.4.0-150600.23.25.1</li>
<li>kernel-default-vdso-6.4.0-150600.23.25.1</li>
<li>kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-debug-vdso-debuginfo-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
<ul>
<li>kernel-kvmsmall-devel-6.4.0-150600.23.25.1</li>
<li>kernel-kvmsmall-debugsource-6.4.0-150600.23.25.1</li>
<li>kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-kvmsmall-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-base-rebuild-6.4.0-150600.23.25.1.150600.12.10.2</li>
<li>kernel-default-base-6.4.0-150600.23.25.1.150600.12.10.2</li>
<li>kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>kernel-obs-build-debugsource-6.4.0-150600.23.25.2</li>
<li>gfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>dlm-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-debugsource-6.4.0-150600.23.25.1</li>
<li>kernel-default-livepatch-devel-6.4.0-150600.23.25.1</li>
<li>gfs2-kmp-default-6.4.0-150600.23.25.1</li>
<li>kernel-obs-build-6.4.0-150600.23.25.2</li>
<li>kernel-default-devel-6.4.0-150600.23.25.1</li>
<li>dlm-kmp-default-6.4.0-150600.23.25.1</li>
<li>kernel-default-optional-6.4.0-150600.23.25.1</li>
<li>cluster-md-kmp-default-6.4.0-150600.23.25.1</li>
<li>kernel-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-optional-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-extra-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-devel-debuginfo-6.4.0-150600.23.25.1</li>
<li>kselftests-kmp-default-6.4.0-150600.23.25.1</li>
<li>reiserfs-kmp-default-6.4.0-150600.23.25.1</li>
<li>kernel-syms-6.4.0-150600.23.25.1</li>
<li>kselftests-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>reiserfs-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>ocfs2-kmp-default-6.4.0-150600.23.25.1</li>
<li>kernel-default-extra-6.4.0-150600.23.25.1</li>
<li>cluster-md-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-obs-qa-6.4.0-150600.23.25.1</li>
<li>ocfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-livepatch-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>
<li>kernel-default-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
<ul>
<li>kernel-kvmsmall-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (ppc64le s390x x86_64)
<ul>
<li>kernel-livepatch-SLE15-SP6_Update_5-debugsource-1-150600.13.3.1</li>
<li>kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-1-150600.13.3.1</li>
<li>kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (nosrc s390x)
<ul>
<li>kernel-zfcpdump-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (s390x)
<ul>
<li>kernel-zfcpdump-debugsource-6.4.0-150600.23.25.1</li>
<li>kernel-zfcpdump-debuginfo-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (nosrc)
<ul>
<li>dtb-aarch64-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64)
<ul>
<li>gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.25.1</li>
<li>dtb-cavium-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-optional-debuginfo-6.4.0-150600.23.25.1</li>
<li>dtb-broadcom-6.4.0-150600.23.25.1</li>
<li>dtb-renesas-6.4.0-150600.23.25.1</li>
<li>dlm-kmp-64kb-6.4.0-150600.23.25.1</li>
<li>dtb-nvidia-6.4.0-150600.23.25.1</li>
<li>dlm-kmp-64kb-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-livepatch-devel-6.4.0-150600.23.25.1</li>
<li>dtb-allwinner-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-extra-6.4.0-150600.23.25.1</li>
<li>reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.25.1</li>
<li>dtb-altera-6.4.0-150600.23.25.1</li>
<li>ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.25.1</li>
<li>reiserfs-kmp-64kb-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-devel-debuginfo-6.4.0-150600.23.25.1</li>
<li>kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.25.1</li>
<li>dtb-apple-6.4.0-150600.23.25.1</li>
<li>dtb-mediatek-6.4.0-150600.23.25.1</li>
<li>dtb-socionext-6.4.0-150600.23.25.1</li>
<li>dtb-hisilicon-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-extra-debuginfo-6.4.0-150600.23.25.1</li>
<li>cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.25.1</li>
<li>dtb-qcom-6.4.0-150600.23.25.1</li>
<li>kselftests-kmp-64kb-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-debuginfo-6.4.0-150600.23.25.1</li>
<li>dtb-amazon-6.4.0-150600.23.25.1</li>
<li>dtb-lg-6.4.0-150600.23.25.1</li>
<li>dtb-rockchip-6.4.0-150600.23.25.1</li>
<li>dtb-freescale-6.4.0-150600.23.25.1</li>
<li>ocfs2-kmp-64kb-6.4.0-150600.23.25.1</li>
<li>dtb-apm-6.4.0-150600.23.25.1</li>
<li>dtb-xilinx-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-optional-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-debugsource-6.4.0-150600.23.25.1</li>
<li>cluster-md-kmp-64kb-6.4.0-150600.23.25.1</li>
<li>dtb-sprd-6.4.0-150600.23.25.1</li>
<li>dtb-amlogic-6.4.0-150600.23.25.1</li>
<li>gfs2-kmp-64kb-6.4.0-150600.23.25.1</li>
<li>dtb-amd-6.4.0-150600.23.25.1</li>
<li>dtb-exynos-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-devel-6.4.0-150600.23.25.1</li>
<li>dtb-arm-6.4.0-150600.23.25.1</li>
<li>dtb-marvell-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 nosrc)
<ul>
<li>kernel-64kb-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (aarch64 nosrc)
<ul>
<li>kernel-64kb-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (aarch64)
<ul>
<li>kernel-64kb-debugsource-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-devel-6.4.0-150600.23.25.1</li>
<li>kernel-64kb-devel-debuginfo-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>
<li>kernel-default-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
<ul>
<li>kernel-default-base-6.4.0-150600.23.25.1.150600.12.10.2</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>kernel-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-devel-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-devel-6.4.0-150600.23.25.1</li>
<li>kernel-default-debugsource-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (noarch)
<ul>
<li>kernel-devel-6.4.0-150600.23.25.1</li>
<li>kernel-macros-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (nosrc s390x)
<ul>
<li>kernel-zfcpdump-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (s390x)
<ul>
<li>kernel-zfcpdump-debugsource-6.4.0-150600.23.25.1</li>
<li>kernel-zfcpdump-debuginfo-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Development Tools Module 15-SP6 (noarch nosrc)
<ul>
<li>kernel-docs-6.4.0-150600.23.25.2</li>
</ul>
</li>
<li>
Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>kernel-obs-build-6.4.0-150600.23.25.2</li>
<li>kernel-obs-build-debugsource-6.4.0-150600.23.25.2</li>
<li>kernel-syms-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Development Tools Module 15-SP6 (noarch)
<ul>
<li>kernel-source-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Legacy Module 15-SP6 (nosrc)
<ul>
<li>kernel-default-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>kernel-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>reiserfs-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>reiserfs-kmp-default-6.4.0-150600.23.25.1</li>
<li>kernel-default-debugsource-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
<ul>
<li>kernel-default-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
<ul>
<li>kernel-livepatch-SLE15-SP6_Update_5-debugsource-1-150600.13.3.1</li>
<li>kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1</li>
<li>kernel-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-1-150600.13.3.1</li>
<li>kernel-default-debugsource-6.4.0-150600.23.25.1</li>
<li>kernel-default-livepatch-devel-6.4.0-150600.23.25.1</li>
<li>kernel-default-livepatch-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>dlm-kmp-default-6.4.0-150600.23.25.1</li>
<li>gfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>dlm-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>cluster-md-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>cluster-md-kmp-default-6.4.0-150600.23.25.1</li>
<li>kernel-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-debugsource-6.4.0-150600.23.25.1</li>
<li>ocfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>gfs2-kmp-default-6.4.0-150600.23.25.1</li>
<li>ocfs2-kmp-default-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
<ul>
<li>kernel-default-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
<ul>
<li>kernel-default-6.4.0-150600.23.25.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
<ul>
<li>kernel-default-debuginfo-6.4.0-150600.23.25.1</li>
<li>kernel-default-extra-6.4.0-150600.23.25.1</li>
<li>kernel-default-debugsource-6.4.0-150600.23.25.1</li>
<li>kernel-default-extra-debuginfo-6.4.0-150600.23.25.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52610.html">https://www.suse.com/security/cve/CVE-2023-52610.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52752.html">https://www.suse.com/security/cve/CVE-2023-52752.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52915.html">https://www.suse.com/security/cve/CVE-2023-52915.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52916.html">https://www.suse.com/security/cve/CVE-2023-52916.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26640.html">https://www.suse.com/security/cve/CVE-2024-26640.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26759.html">https://www.suse.com/security/cve/CVE-2024-26759.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26804.html">https://www.suse.com/security/cve/CVE-2024-26804.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-36953.html">https://www.suse.com/security/cve/CVE-2024-36953.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38538.html">https://www.suse.com/security/cve/CVE-2024-38538.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38596.html">https://www.suse.com/security/cve/CVE-2024-38596.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-38632.html">https://www.suse.com/security/cve/CVE-2024-38632.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40965.html">https://www.suse.com/security/cve/CVE-2024-40965.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40973.html">https://www.suse.com/security/cve/CVE-2024-40973.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-40983.html">https://www.suse.com/security/cve/CVE-2024-40983.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42154.html">https://www.suse.com/security/cve/CVE-2024-42154.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42243.html">https://www.suse.com/security/cve/CVE-2024-42243.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42252.html">https://www.suse.com/security/cve/CVE-2024-42252.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42265.html">https://www.suse.com/security/cve/CVE-2024-42265.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42294.html">https://www.suse.com/security/cve/CVE-2024-42294.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42304.html">https://www.suse.com/security/cve/CVE-2024-42304.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42305.html">https://www.suse.com/security/cve/CVE-2024-42305.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-42306.html">https://www.suse.com/security/cve/CVE-2024-42306.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43828.html">https://www.suse.com/security/cve/CVE-2024-43828.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43832.html">https://www.suse.com/security/cve/CVE-2024-43832.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43835.html">https://www.suse.com/security/cve/CVE-2024-43835.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43845.html">https://www.suse.com/security/cve/CVE-2024-43845.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43870.html">https://www.suse.com/security/cve/CVE-2024-43870.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43890.html">https://www.suse.com/security/cve/CVE-2024-43890.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43898.html">https://www.suse.com/security/cve/CVE-2024-43898.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43904.html">https://www.suse.com/security/cve/CVE-2024-43904.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-43914.html">https://www.suse.com/security/cve/CVE-2024-43914.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44935.html">https://www.suse.com/security/cve/CVE-2024-44935.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44944.html">https://www.suse.com/security/cve/CVE-2024-44944.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44946.html">https://www.suse.com/security/cve/CVE-2024-44946.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44947.html">https://www.suse.com/security/cve/CVE-2024-44947.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44948.html">https://www.suse.com/security/cve/CVE-2024-44948.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44950.html">https://www.suse.com/security/cve/CVE-2024-44950.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44951.html">https://www.suse.com/security/cve/CVE-2024-44951.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44952.html">https://www.suse.com/security/cve/CVE-2024-44952.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44954.html">https://www.suse.com/security/cve/CVE-2024-44954.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44960.html">https://www.suse.com/security/cve/CVE-2024-44960.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44961.html">https://www.suse.com/security/cve/CVE-2024-44961.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44962.html">https://www.suse.com/security/cve/CVE-2024-44962.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44965.html">https://www.suse.com/security/cve/CVE-2024-44965.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44967.html">https://www.suse.com/security/cve/CVE-2024-44967.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44969.html">https://www.suse.com/security/cve/CVE-2024-44969.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44970.html">https://www.suse.com/security/cve/CVE-2024-44970.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44971.html">https://www.suse.com/security/cve/CVE-2024-44971.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44977.html">https://www.suse.com/security/cve/CVE-2024-44977.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44982.html">https://www.suse.com/security/cve/CVE-2024-44982.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44984.html">https://www.suse.com/security/cve/CVE-2024-44984.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44985.html">https://www.suse.com/security/cve/CVE-2024-44985.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44986.html">https://www.suse.com/security/cve/CVE-2024-44986.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44987.html">https://www.suse.com/security/cve/CVE-2024-44987.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44988.html">https://www.suse.com/security/cve/CVE-2024-44988.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44989.html">https://www.suse.com/security/cve/CVE-2024-44989.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44990.html">https://www.suse.com/security/cve/CVE-2024-44990.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44991.html">https://www.suse.com/security/cve/CVE-2024-44991.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44997.html">https://www.suse.com/security/cve/CVE-2024-44997.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44998.html">https://www.suse.com/security/cve/CVE-2024-44998.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-44999.html">https://www.suse.com/security/cve/CVE-2024-44999.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45000.html">https://www.suse.com/security/cve/CVE-2024-45000.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45001.html">https://www.suse.com/security/cve/CVE-2024-45001.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45002.html">https://www.suse.com/security/cve/CVE-2024-45002.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45003.html">https://www.suse.com/security/cve/CVE-2024-45003.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45005.html">https://www.suse.com/security/cve/CVE-2024-45005.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45006.html">https://www.suse.com/security/cve/CVE-2024-45006.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45007.html">https://www.suse.com/security/cve/CVE-2024-45007.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45008.html">https://www.suse.com/security/cve/CVE-2024-45008.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45011.html">https://www.suse.com/security/cve/CVE-2024-45011.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45012.html">https://www.suse.com/security/cve/CVE-2024-45012.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45013.html">https://www.suse.com/security/cve/CVE-2024-45013.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45015.html">https://www.suse.com/security/cve/CVE-2024-45015.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45017.html">https://www.suse.com/security/cve/CVE-2024-45017.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45018.html">https://www.suse.com/security/cve/CVE-2024-45018.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45019.html">https://www.suse.com/security/cve/CVE-2024-45019.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45020.html">https://www.suse.com/security/cve/CVE-2024-45020.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45021.html">https://www.suse.com/security/cve/CVE-2024-45021.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45022.html">https://www.suse.com/security/cve/CVE-2024-45022.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45023.html">https://www.suse.com/security/cve/CVE-2024-45023.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45026.html">https://www.suse.com/security/cve/CVE-2024-45026.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45028.html">https://www.suse.com/security/cve/CVE-2024-45028.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45029.html">https://www.suse.com/security/cve/CVE-2024-45029.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-45030.html">https://www.suse.com/security/cve/CVE-2024-45030.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46672.html">https://www.suse.com/security/cve/CVE-2024-46672.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46673.html">https://www.suse.com/security/cve/CVE-2024-46673.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46674.html">https://www.suse.com/security/cve/CVE-2024-46674.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46675.html">https://www.suse.com/security/cve/CVE-2024-46675.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46676.html">https://www.suse.com/security/cve/CVE-2024-46676.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46677.html">https://www.suse.com/security/cve/CVE-2024-46677.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46679.html">https://www.suse.com/security/cve/CVE-2024-46679.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46685.html">https://www.suse.com/security/cve/CVE-2024-46685.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46686.html">https://www.suse.com/security/cve/CVE-2024-46686.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46687.html">https://www.suse.com/security/cve/CVE-2024-46687.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46689.html">https://www.suse.com/security/cve/CVE-2024-46689.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46691.html">https://www.suse.com/security/cve/CVE-2024-46691.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46692.html">https://www.suse.com/security/cve/CVE-2024-46692.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46693.html">https://www.suse.com/security/cve/CVE-2024-46693.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46694.html">https://www.suse.com/security/cve/CVE-2024-46694.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46695.html">https://www.suse.com/security/cve/CVE-2024-46695.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46702.html">https://www.suse.com/security/cve/CVE-2024-46702.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46706.html">https://www.suse.com/security/cve/CVE-2024-46706.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46707.html">https://www.suse.com/security/cve/CVE-2024-46707.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46709.html">https://www.suse.com/security/cve/CVE-2024-46709.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46710.html">https://www.suse.com/security/cve/CVE-2024-46710.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46714.html">https://www.suse.com/security/cve/CVE-2024-46714.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46715.html">https://www.suse.com/security/cve/CVE-2024-46715.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46716.html">https://www.suse.com/security/cve/CVE-2024-46716.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46717.html">https://www.suse.com/security/cve/CVE-2024-46717.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46719.html">https://www.suse.com/security/cve/CVE-2024-46719.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46720.html">https://www.suse.com/security/cve/CVE-2024-46720.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46722.html">https://www.suse.com/security/cve/CVE-2024-46722.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46723.html">https://www.suse.com/security/cve/CVE-2024-46723.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46724.html">https://www.suse.com/security/cve/CVE-2024-46724.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46725.html">https://www.suse.com/security/cve/CVE-2024-46725.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46726.html">https://www.suse.com/security/cve/CVE-2024-46726.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46728.html">https://www.suse.com/security/cve/CVE-2024-46728.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46729.html">https://www.suse.com/security/cve/CVE-2024-46729.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46730.html">https://www.suse.com/security/cve/CVE-2024-46730.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46731.html">https://www.suse.com/security/cve/CVE-2024-46731.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46732.html">https://www.suse.com/security/cve/CVE-2024-46732.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46734.html">https://www.suse.com/security/cve/CVE-2024-46734.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46735.html">https://www.suse.com/security/cve/CVE-2024-46735.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46737.html">https://www.suse.com/security/cve/CVE-2024-46737.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46738.html">https://www.suse.com/security/cve/CVE-2024-46738.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46739.html">https://www.suse.com/security/cve/CVE-2024-46739.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46741.html">https://www.suse.com/security/cve/CVE-2024-46741.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46743.html">https://www.suse.com/security/cve/CVE-2024-46743.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46744.html">https://www.suse.com/security/cve/CVE-2024-46744.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46745.html">https://www.suse.com/security/cve/CVE-2024-46745.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46746.html">https://www.suse.com/security/cve/CVE-2024-46746.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46747.html">https://www.suse.com/security/cve/CVE-2024-46747.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46749.html">https://www.suse.com/security/cve/CVE-2024-46749.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46750.html">https://www.suse.com/security/cve/CVE-2024-46750.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46751.html">https://www.suse.com/security/cve/CVE-2024-46751.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46752.html">https://www.suse.com/security/cve/CVE-2024-46752.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46753.html">https://www.suse.com/security/cve/CVE-2024-46753.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46755.html">https://www.suse.com/security/cve/CVE-2024-46755.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46756.html">https://www.suse.com/security/cve/CVE-2024-46756.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46757.html">https://www.suse.com/security/cve/CVE-2024-46757.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46758.html">https://www.suse.com/security/cve/CVE-2024-46758.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46759.html">https://www.suse.com/security/cve/CVE-2024-46759.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46760.html">https://www.suse.com/security/cve/CVE-2024-46760.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46761.html">https://www.suse.com/security/cve/CVE-2024-46761.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46767.html">https://www.suse.com/security/cve/CVE-2024-46767.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46771.html">https://www.suse.com/security/cve/CVE-2024-46771.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46772.html">https://www.suse.com/security/cve/CVE-2024-46772.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46773.html">https://www.suse.com/security/cve/CVE-2024-46773.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46774.html">https://www.suse.com/security/cve/CVE-2024-46774.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46776.html">https://www.suse.com/security/cve/CVE-2024-46776.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46778.html">https://www.suse.com/security/cve/CVE-2024-46778.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46780.html">https://www.suse.com/security/cve/CVE-2024-46780.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46781.html">https://www.suse.com/security/cve/CVE-2024-46781.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46783.html">https://www.suse.com/security/cve/CVE-2024-46783.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46784.html">https://www.suse.com/security/cve/CVE-2024-46784.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46786.html">https://www.suse.com/security/cve/CVE-2024-46786.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46787.html">https://www.suse.com/security/cve/CVE-2024-46787.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46791.html">https://www.suse.com/security/cve/CVE-2024-46791.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46794.html">https://www.suse.com/security/cve/CVE-2024-46794.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46797.html">https://www.suse.com/security/cve/CVE-2024-46797.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46798.html">https://www.suse.com/security/cve/CVE-2024-46798.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46822.html">https://www.suse.com/security/cve/CVE-2024-46822.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1012628">https://bugzilla.suse.com/show_bug.cgi?id=1012628</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1183045">https://bugzilla.suse.com/show_bug.cgi?id=1183045</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215199">https://bugzilla.suse.com/show_bug.cgi?id=1215199</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216223">https://bugzilla.suse.com/show_bug.cgi?id=1216223</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216776">https://bugzilla.suse.com/show_bug.cgi?id=1216776</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220382">https://bugzilla.suse.com/show_bug.cgi?id=1220382</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221527">https://bugzilla.suse.com/show_bug.cgi?id=1221527</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221610">https://bugzilla.suse.com/show_bug.cgi?id=1221610</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221650">https://bugzilla.suse.com/show_bug.cgi?id=1221650</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222629">https://bugzilla.suse.com/show_bug.cgi?id=1222629</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223600">https://bugzilla.suse.com/show_bug.cgi?id=1223600</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223848">https://bugzilla.suse.com/show_bug.cgi?id=1223848</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225487">https://bugzilla.suse.com/show_bug.cgi?id=1225487</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225812">https://bugzilla.suse.com/show_bug.cgi?id=1225812</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225903">https://bugzilla.suse.com/show_bug.cgi?id=1225903</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226003">https://bugzilla.suse.com/show_bug.cgi?id=1226003</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226507">https://bugzilla.suse.com/show_bug.cgi?id=1226507</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226606">https://bugzilla.suse.com/show_bug.cgi?id=1226606</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226666">https://bugzilla.suse.com/show_bug.cgi?id=1226666</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226846">https://bugzilla.suse.com/show_bug.cgi?id=1226846</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1226860">https://bugzilla.suse.com/show_bug.cgi?id=1226860</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227487">https://bugzilla.suse.com/show_bug.cgi?id=1227487</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227694">https://bugzilla.suse.com/show_bug.cgi?id=1227694</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227726">https://bugzilla.suse.com/show_bug.cgi?id=1227726</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227819">https://bugzilla.suse.com/show_bug.cgi?id=1227819</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227885">https://bugzilla.suse.com/show_bug.cgi?id=1227885</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227890">https://bugzilla.suse.com/show_bug.cgi?id=1227890</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227962">https://bugzilla.suse.com/show_bug.cgi?id=1227962</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228090">https://bugzilla.suse.com/show_bug.cgi?id=1228090</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228140">https://bugzilla.suse.com/show_bug.cgi?id=1228140</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228244">https://bugzilla.suse.com/show_bug.cgi?id=1228244</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228507">https://bugzilla.suse.com/show_bug.cgi?id=1228507</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228771">https://bugzilla.suse.com/show_bug.cgi?id=1228771</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229001">https://bugzilla.suse.com/show_bug.cgi?id=1229001</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229004">https://bugzilla.suse.com/show_bug.cgi?id=1229004</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229019">https://bugzilla.suse.com/show_bug.cgi?id=1229019</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229086">https://bugzilla.suse.com/show_bug.cgi?id=1229086</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229167">https://bugzilla.suse.com/show_bug.cgi?id=1229167</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229169">https://bugzilla.suse.com/show_bug.cgi?id=1229169</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229289">https://bugzilla.suse.com/show_bug.cgi?id=1229289</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229334">https://bugzilla.suse.com/show_bug.cgi?id=1229334</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229362">https://bugzilla.suse.com/show_bug.cgi?id=1229362</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229363">https://bugzilla.suse.com/show_bug.cgi?id=1229363</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229364">https://bugzilla.suse.com/show_bug.cgi?id=1229364</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229371">https://bugzilla.suse.com/show_bug.cgi?id=1229371</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229380">https://bugzilla.suse.com/show_bug.cgi?id=1229380</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229389">https://bugzilla.suse.com/show_bug.cgi?id=1229389</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229394">https://bugzilla.suse.com/show_bug.cgi?id=1229394</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229429">https://bugzilla.suse.com/show_bug.cgi?id=1229429</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229443">https://bugzilla.suse.com/show_bug.cgi?id=1229443</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229452">https://bugzilla.suse.com/show_bug.cgi?id=1229452</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229455">https://bugzilla.suse.com/show_bug.cgi?id=1229455</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229456">https://bugzilla.suse.com/show_bug.cgi?id=1229456</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229494">https://bugzilla.suse.com/show_bug.cgi?id=1229494</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229585">https://bugzilla.suse.com/show_bug.cgi?id=1229585</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229753">https://bugzilla.suse.com/show_bug.cgi?id=1229753</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229764">https://bugzilla.suse.com/show_bug.cgi?id=1229764</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229768">https://bugzilla.suse.com/show_bug.cgi?id=1229768</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229790">https://bugzilla.suse.com/show_bug.cgi?id=1229790</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229810">https://bugzilla.suse.com/show_bug.cgi?id=1229810</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229899">https://bugzilla.suse.com/show_bug.cgi?id=1229899</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229928">https://bugzilla.suse.com/show_bug.cgi?id=1229928</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230015">https://bugzilla.suse.com/show_bug.cgi?id=1230015</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230119">https://bugzilla.suse.com/show_bug.cgi?id=1230119</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230123">https://bugzilla.suse.com/show_bug.cgi?id=1230123</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230124">https://bugzilla.suse.com/show_bug.cgi?id=1230124</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230125">https://bugzilla.suse.com/show_bug.cgi?id=1230125</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230169">https://bugzilla.suse.com/show_bug.cgi?id=1230169</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230170">https://bugzilla.suse.com/show_bug.cgi?id=1230170</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230171">https://bugzilla.suse.com/show_bug.cgi?id=1230171</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230173">https://bugzilla.suse.com/show_bug.cgi?id=1230173</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230174">https://bugzilla.suse.com/show_bug.cgi?id=1230174</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230175">https://bugzilla.suse.com/show_bug.cgi?id=1230175</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230176">https://bugzilla.suse.com/show_bug.cgi?id=1230176</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230178">https://bugzilla.suse.com/show_bug.cgi?id=1230178</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230180">https://bugzilla.suse.com/show_bug.cgi?id=1230180</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230181">https://bugzilla.suse.com/show_bug.cgi?id=1230181</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230185">https://bugzilla.suse.com/show_bug.cgi?id=1230185</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230191">https://bugzilla.suse.com/show_bug.cgi?id=1230191</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230192">https://bugzilla.suse.com/show_bug.cgi?id=1230192</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230193">https://bugzilla.suse.com/show_bug.cgi?id=1230193</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230194">https://bugzilla.suse.com/show_bug.cgi?id=1230194</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230195">https://bugzilla.suse.com/show_bug.cgi?id=1230195</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230200">https://bugzilla.suse.com/show_bug.cgi?id=1230200</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230204">https://bugzilla.suse.com/show_bug.cgi?id=1230204</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230206">https://bugzilla.suse.com/show_bug.cgi?id=1230206</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230207">https://bugzilla.suse.com/show_bug.cgi?id=1230207</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230209">https://bugzilla.suse.com/show_bug.cgi?id=1230209</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230211">https://bugzilla.suse.com/show_bug.cgi?id=1230211</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230213">https://bugzilla.suse.com/show_bug.cgi?id=1230213</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230217">https://bugzilla.suse.com/show_bug.cgi?id=1230217</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230221">https://bugzilla.suse.com/show_bug.cgi?id=1230221</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230224">https://bugzilla.suse.com/show_bug.cgi?id=1230224</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230230">https://bugzilla.suse.com/show_bug.cgi?id=1230230</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230232">https://bugzilla.suse.com/show_bug.cgi?id=1230232</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230233">https://bugzilla.suse.com/show_bug.cgi?id=1230233</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230240">https://bugzilla.suse.com/show_bug.cgi?id=1230240</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230244">https://bugzilla.suse.com/show_bug.cgi?id=1230244</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230245">https://bugzilla.suse.com/show_bug.cgi?id=1230245</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230247">https://bugzilla.suse.com/show_bug.cgi?id=1230247</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230248">https://bugzilla.suse.com/show_bug.cgi?id=1230248</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230269">https://bugzilla.suse.com/show_bug.cgi?id=1230269</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230270">https://bugzilla.suse.com/show_bug.cgi?id=1230270</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230295">https://bugzilla.suse.com/show_bug.cgi?id=1230295</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230340">https://bugzilla.suse.com/show_bug.cgi?id=1230340</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230426">https://bugzilla.suse.com/show_bug.cgi?id=1230426</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230430">https://bugzilla.suse.com/show_bug.cgi?id=1230430</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230431">https://bugzilla.suse.com/show_bug.cgi?id=1230431</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230432">https://bugzilla.suse.com/show_bug.cgi?id=1230432</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230433">https://bugzilla.suse.com/show_bug.cgi?id=1230433</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230434">https://bugzilla.suse.com/show_bug.cgi?id=1230434</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230435">https://bugzilla.suse.com/show_bug.cgi?id=1230435</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230440">https://bugzilla.suse.com/show_bug.cgi?id=1230440</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230441">https://bugzilla.suse.com/show_bug.cgi?id=1230441</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230442">https://bugzilla.suse.com/show_bug.cgi?id=1230442</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230444">https://bugzilla.suse.com/show_bug.cgi?id=1230444</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230450">https://bugzilla.suse.com/show_bug.cgi?id=1230450</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230451">https://bugzilla.suse.com/show_bug.cgi?id=1230451</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230454">https://bugzilla.suse.com/show_bug.cgi?id=1230454</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230455">https://bugzilla.suse.com/show_bug.cgi?id=1230455</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230457">https://bugzilla.suse.com/show_bug.cgi?id=1230457</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230459">https://bugzilla.suse.com/show_bug.cgi?id=1230459</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230506">https://bugzilla.suse.com/show_bug.cgi?id=1230506</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230507">https://bugzilla.suse.com/show_bug.cgi?id=1230507</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230511">https://bugzilla.suse.com/show_bug.cgi?id=1230511</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230515">https://bugzilla.suse.com/show_bug.cgi?id=1230515</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230517">https://bugzilla.suse.com/show_bug.cgi?id=1230517</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230518">https://bugzilla.suse.com/show_bug.cgi?id=1230518</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230519">https://bugzilla.suse.com/show_bug.cgi?id=1230519</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230520">https://bugzilla.suse.com/show_bug.cgi?id=1230520</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230521">https://bugzilla.suse.com/show_bug.cgi?id=1230521</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230524">https://bugzilla.suse.com/show_bug.cgi?id=1230524</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230526">https://bugzilla.suse.com/show_bug.cgi?id=1230526</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230533">https://bugzilla.suse.com/show_bug.cgi?id=1230533</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230535">https://bugzilla.suse.com/show_bug.cgi?id=1230535</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230539">https://bugzilla.suse.com/show_bug.cgi?id=1230539</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230540">https://bugzilla.suse.com/show_bug.cgi?id=1230540</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230549">https://bugzilla.suse.com/show_bug.cgi?id=1230549</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230556">https://bugzilla.suse.com/show_bug.cgi?id=1230556</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230562">https://bugzilla.suse.com/show_bug.cgi?id=1230562</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230563">https://bugzilla.suse.com/show_bug.cgi?id=1230563</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230564">https://bugzilla.suse.com/show_bug.cgi?id=1230564</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230580">https://bugzilla.suse.com/show_bug.cgi?id=1230580</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230582">https://bugzilla.suse.com/show_bug.cgi?id=1230582</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230589">https://bugzilla.suse.com/show_bug.cgi?id=1230589</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230602">https://bugzilla.suse.com/show_bug.cgi?id=1230602</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230699">https://bugzilla.suse.com/show_bug.cgi?id=1230699</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230700">https://bugzilla.suse.com/show_bug.cgi?id=1230700</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230701">https://bugzilla.suse.com/show_bug.cgi?id=1230701</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230702">https://bugzilla.suse.com/show_bug.cgi?id=1230702</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230703">https://bugzilla.suse.com/show_bug.cgi?id=1230703</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230704">https://bugzilla.suse.com/show_bug.cgi?id=1230704</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230705">https://bugzilla.suse.com/show_bug.cgi?id=1230705</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230706">https://bugzilla.suse.com/show_bug.cgi?id=1230706</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230709">https://bugzilla.suse.com/show_bug.cgi?id=1230709</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230711">https://bugzilla.suse.com/show_bug.cgi?id=1230711</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230712">https://bugzilla.suse.com/show_bug.cgi?id=1230712</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230715">https://bugzilla.suse.com/show_bug.cgi?id=1230715</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230719">https://bugzilla.suse.com/show_bug.cgi?id=1230719</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230722">https://bugzilla.suse.com/show_bug.cgi?id=1230722</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230724">https://bugzilla.suse.com/show_bug.cgi?id=1230724</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230725">https://bugzilla.suse.com/show_bug.cgi?id=1230725</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230726">https://bugzilla.suse.com/show_bug.cgi?id=1230726</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230727">https://bugzilla.suse.com/show_bug.cgi?id=1230727</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230730">https://bugzilla.suse.com/show_bug.cgi?id=1230730</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230731">https://bugzilla.suse.com/show_bug.cgi?id=1230731</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230732">https://bugzilla.suse.com/show_bug.cgi?id=1230732</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230747">https://bugzilla.suse.com/show_bug.cgi?id=1230747</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230748">https://bugzilla.suse.com/show_bug.cgi?id=1230748</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230749">https://bugzilla.suse.com/show_bug.cgi?id=1230749</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230751">https://bugzilla.suse.com/show_bug.cgi?id=1230751</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230752">https://bugzilla.suse.com/show_bug.cgi?id=1230752</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230753">https://bugzilla.suse.com/show_bug.cgi?id=1230753</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230756">https://bugzilla.suse.com/show_bug.cgi?id=1230756</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230761">https://bugzilla.suse.com/show_bug.cgi?id=1230761</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230766">https://bugzilla.suse.com/show_bug.cgi?id=1230766</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230767">https://bugzilla.suse.com/show_bug.cgi?id=1230767</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230768">https://bugzilla.suse.com/show_bug.cgi?id=1230768</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230771">https://bugzilla.suse.com/show_bug.cgi?id=1230771</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230772">https://bugzilla.suse.com/show_bug.cgi?id=1230772</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230775">https://bugzilla.suse.com/show_bug.cgi?id=1230775</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230776">https://bugzilla.suse.com/show_bug.cgi?id=1230776</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230780">https://bugzilla.suse.com/show_bug.cgi?id=1230780</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230783">https://bugzilla.suse.com/show_bug.cgi?id=1230783</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230786">https://bugzilla.suse.com/show_bug.cgi?id=1230786</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230787">https://bugzilla.suse.com/show_bug.cgi?id=1230787</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230791">https://bugzilla.suse.com/show_bug.cgi?id=1230791</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230794">https://bugzilla.suse.com/show_bug.cgi?id=1230794</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230796">https://bugzilla.suse.com/show_bug.cgi?id=1230796</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230802">https://bugzilla.suse.com/show_bug.cgi?id=1230802</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230806">https://bugzilla.suse.com/show_bug.cgi?id=1230806</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230808">https://bugzilla.suse.com/show_bug.cgi?id=1230808</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230809">https://bugzilla.suse.com/show_bug.cgi?id=1230809</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230810">https://bugzilla.suse.com/show_bug.cgi?id=1230810</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230812">https://bugzilla.suse.com/show_bug.cgi?id=1230812</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230813">https://bugzilla.suse.com/show_bug.cgi?id=1230813</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230814">https://bugzilla.suse.com/show_bug.cgi?id=1230814</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230815">https://bugzilla.suse.com/show_bug.cgi?id=1230815</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230821">https://bugzilla.suse.com/show_bug.cgi?id=1230821</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230825">https://bugzilla.suse.com/show_bug.cgi?id=1230825</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230830">https://bugzilla.suse.com/show_bug.cgi?id=1230830</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230831">https://bugzilla.suse.com/show_bug.cgi?id=1230831</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230854">https://bugzilla.suse.com/show_bug.cgi?id=1230854</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230948">https://bugzilla.suse.com/show_bug.cgi?id=1230948</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231008">https://bugzilla.suse.com/show_bug.cgi?id=1231008</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231035">https://bugzilla.suse.com/show_bug.cgi?id=1231035</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231120">https://bugzilla.suse.com/show_bug.cgi?id=1231120</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231146">https://bugzilla.suse.com/show_bug.cgi?id=1231146</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231182">https://bugzilla.suse.com/show_bug.cgi?id=1231182</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231183">https://bugzilla.suse.com/show_bug.cgi?id=1231183</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-10954">https://jira.suse.com/browse/PED-10954</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-9899">https://jira.suse.com/browse/PED-9899</a>
</li>
</ul>
</div>