openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
- 3 participants
- 10614 discussions
19 Nov '24
# gh-2.62.0-1.1 on GA media
Announcement ID: openSUSE-SU-2024:14509-1
Rating: moderate
Cross-References:
* CVE-2024-52308
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the gh-2.62.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* gh 2.62.0-1.1
* gh-bash-completion 2.62.0-1.1
* gh-fish-completion 2.62.0-1.1
* gh-zsh-completion 2.62.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52308.html
1
0
SUSE-SU-2024:4037-1: important: Security update for bea-stax, xstream
by OPENSUSE-SECURITY-UPDATES 19 Nov '24
by OPENSUSE-SECURITY-UPDATES 19 Nov '24
19 Nov '24
# Security update for bea-stax, xstream
Announcement ID: SUSE-SU-2024:4037-1
Release Date: 2024-11-19T08:49:45Z
Rating: important
References:
* bsc#1233085
Cross-References:
* CVE-2024-47072
CVSS scores:
* CVE-2024-47072 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47072 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47072 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for bea-stax, xstream fixes the following issues:
* CVE-2024-47072: Fixed possible remote denial-of-service via a stack overflow
(bsc#1233085).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4037=1
* SUSE Manager Server 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-4037=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4037=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4037=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4037=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4037=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4037=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4037=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4037=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4037=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4037=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4037=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4037=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4037=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4037=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4037=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4037=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4037=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4037=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4037=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4037=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4037=1
## Package List:
* Development Tools Module 15-SP6 (noarch)
* xstream-1.4.21-150200.3.28.1
* SUSE Manager Server 4.3 Module 4.3 (noarch)
* xstream-1.4.21-150200.3.28.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Manager Proxy 4.3 (noarch)
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Manager Server 4.3 (noarch)
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* SUSE Enterprise Storage 7.1 (noarch)
* xstream-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* openSUSE Leap 15.5 (noarch)
* bea-stax-1.2.0-150200.11.3.1
* xstream-javadoc-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* xstream-benchmark-1.4.21-150200.3.28.1
* xstream-parent-1.4.21-150200.3.28.1
* xstream-1.4.21-150200.3.28.1
* openSUSE Leap 15.6 (noarch)
* bea-stax-1.2.0-150200.11.3.1
* xstream-javadoc-1.4.21-150200.3.28.1
* bea-stax-api-1.2.0-150200.11.3.1
* xstream-benchmark-1.4.21-150200.3.28.1
* xstream-parent-1.4.21-150200.3.28.1
* xstream-1.4.21-150200.3.28.1
* Basesystem Module 15-SP5 (noarch)
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* Basesystem Module 15-SP6 (noarch)
* bea-stax-api-1.2.0-150200.11.3.1
* bea-stax-1.2.0-150200.11.3.1
* Development Tools Module 15-SP5 (noarch)
* xstream-1.4.21-150200.3.28.1
## References:
* https://www.suse.com/security/cve/CVE-2024-47072.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233085
1
0
SUSE-SU-2024:4007-1: critical: Maintenance update for SUSE Manager 4.3 Release Notes
by OPENSUSE-SECURITY-UPDATES 18 Nov '24
by OPENSUSE-SECURITY-UPDATES 18 Nov '24
18 Nov '24
# Maintenance update for SUSE Manager 4.3 Release Notes
Announcement ID: SUSE-SU-2024:4007-1
Release Date: 2024-11-18T13:20:16Z
Rating: critical
References:
* bsc#1146701
* bsc#1211899
* bsc#1212985
* bsc#1217003
* bsc#1217338
* bsc#1217978
* bsc#1218090
* bsc#1219450
* bsc#1219645
* bsc#1219887
* bsc#1221435
* bsc#1221505
* bsc#1223312
* bsc#1223988
* bsc#1224108
* bsc#1224209
* bsc#1225603
* bsc#1225619
* bsc#1225960
* bsc#1226090
* bsc#1226439
* bsc#1226461
* bsc#1226478
* bsc#1226687
* bsc#1226917
* bsc#1227133
* bsc#1227334
* bsc#1227406
* bsc#1227526
* bsc#1227543
* bsc#1227599
* bsc#1227606
* bsc#1227746
* bsc#1228036
* bsc#1228101
* bsc#1228130
* bsc#1228147
* bsc#1228286
* bsc#1228326
* bsc#1228345
* bsc#1228412
* bsc#1228545
* bsc#1228638
* bsc#1228851
* bsc#1228945
* bsc#1229079
* bsc#1229178
* bsc#1229260
* bsc#1229339
* bsc#1231332
* bsc#1231852
* bsc#1231900
* bsc#1231922
* jsc#MSQA-863
Cross-References:
* CVE-2024-47533
* CVE-2024-49502
* CVE-2024-49503
CVSS scores:
* CVE-2024-47533 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49502 ( SUSE ): 4.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49502 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-49503 ( SUSE ): 4.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49503 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities, contains one feature and has 50
security fixes can now be installed.
## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3
### Description:
This update fixes the following issues:
release-notes-susemanager-proxy:
* Update to SUSE Manager 4.3.14
* Bugs mentioned: bsc#1217003, bsc#1221505, bsc#1225619, bsc#1225960,
bsc#1226917 bsc#1227606, bsc#1228036, bsc#1228345, bsc#1228851, bsc#1229079
bsc#1229260, bsc#1229339
## Security update for SUSE Manager Server 4.3
### Description:
This update fixes the following issues:
release-notes-susemanager:
* Update to SUSE Manager 4.3.14
* Ubuntu 24.04 support as client
* Product migration from RHEL and Clones to SUSE Liberty Linux
* POS image templates now produce compressed images
* Date format for API endpoints has been changed to ISO-8601 format
* Security issues fixed: CVE-2024-47533, CVE-2024-49502, CVE-2024-49503
* Bugs mentioned: bsc#1146701, bsc#1211899, bsc#1212985, bsc#1217003,
bsc#1217338 bsc#1217978, bsc#1218090, bsc#1219450, bsc#1219645, bsc#1219887
bsc#1221435, bsc#1221505, bsc#1223312, bsc#1223988, bsc#1224108 bsc#1224209,
bsc#1225603, bsc#1225619, bsc#1225960, bsc#1226090 bsc#1226439, bsc#1226461,
bsc#1226478, bsc#1226687, bsc#1226917 bsc#1227133, bsc#1227334, bsc#1227406,
bsc#1227526, bsc#1227543 bsc#1227599, bsc#1227606, bsc#1227746, bsc#1228036,
bsc#1228101 bsc#1228130, bsc#1228147, bsc#1228286, bsc#1228326, bsc#1228345
bsc#1228412, bsc#1228545, bsc#1228638, bsc#1228851, bsc#1228945 bsc#1229079,
bsc#1229178, bsc#1229260, bsc#1229339, bsc#1231332 bsc#1231852, bsc#1231922,
bsc#1231900
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4007=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4007=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4007=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4007=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* release-notes-susemanager-proxy-4.3.14-150400.3.90.1
* release-notes-susemanager-4.3.14-150400.3.122.1
* SUSE Manager Proxy 4.3 (noarch)
* release-notes-susemanager-proxy-4.3.14-150400.3.90.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* release-notes-susemanager-proxy-4.3.14-150400.3.90.1
* SUSE Manager Server 4.3 (noarch)
* release-notes-susemanager-4.3.14-150400.3.122.1
## References:
* https://www.suse.com/security/cve/CVE-2024-47533.html
* https://www.suse.com/security/cve/CVE-2024-49502.html
* https://www.suse.com/security/cve/CVE-2024-49503.html
* https://bugzilla.suse.com/show_bug.cgi?id=1146701
* https://bugzilla.suse.com/show_bug.cgi?id=1211899
* https://bugzilla.suse.com/show_bug.cgi?id=1212985
* https://bugzilla.suse.com/show_bug.cgi?id=1217003
* https://bugzilla.suse.com/show_bug.cgi?id=1217338
* https://bugzilla.suse.com/show_bug.cgi?id=1217978
* https://bugzilla.suse.com/show_bug.cgi?id=1218090
* https://bugzilla.suse.com/show_bug.cgi?id=1219450
* https://bugzilla.suse.com/show_bug.cgi?id=1219645
* https://bugzilla.suse.com/show_bug.cgi?id=1219887
* https://bugzilla.suse.com/show_bug.cgi?id=1221435
* https://bugzilla.suse.com/show_bug.cgi?id=1221505
* https://bugzilla.suse.com/show_bug.cgi?id=1223312
* https://bugzilla.suse.com/show_bug.cgi?id=1223988
* https://bugzilla.suse.com/show_bug.cgi?id=1224108
* https://bugzilla.suse.com/show_bug.cgi?id=1224209
* https://bugzilla.suse.com/show_bug.cgi?id=1225603
* https://bugzilla.suse.com/show_bug.cgi?id=1225619
* https://bugzilla.suse.com/show_bug.cgi?id=1225960
* https://bugzilla.suse.com/show_bug.cgi?id=1226090
* https://bugzilla.suse.com/show_bug.cgi?id=1226439
* https://bugzilla.suse.com/show_bug.cgi?id=1226461
* https://bugzilla.suse.com/show_bug.cgi?id=1226478
* https://bugzilla.suse.com/show_bug.cgi?id=1226687
* https://bugzilla.suse.com/show_bug.cgi?id=1226917
* https://bugzilla.suse.com/show_bug.cgi?id=1227133
* https://bugzilla.suse.com/show_bug.cgi?id=1227334
* https://bugzilla.suse.com/show_bug.cgi?id=1227406
* https://bugzilla.suse.com/show_bug.cgi?id=1227526
* https://bugzilla.suse.com/show_bug.cgi?id=1227543
* https://bugzilla.suse.com/show_bug.cgi?id=1227599
* https://bugzilla.suse.com/show_bug.cgi?id=1227606
* https://bugzilla.suse.com/show_bug.cgi?id=1227746
* https://bugzilla.suse.com/show_bug.cgi?id=1228036
* https://bugzilla.suse.com/show_bug.cgi?id=1228101
* https://bugzilla.suse.com/show_bug.cgi?id=1228130
* https://bugzilla.suse.com/show_bug.cgi?id=1228147
* https://bugzilla.suse.com/show_bug.cgi?id=1228286
* https://bugzilla.suse.com/show_bug.cgi?id=1228326
* https://bugzilla.suse.com/show_bug.cgi?id=1228345
* https://bugzilla.suse.com/show_bug.cgi?id=1228412
* https://bugzilla.suse.com/show_bug.cgi?id=1228545
* https://bugzilla.suse.com/show_bug.cgi?id=1228638
* https://bugzilla.suse.com/show_bug.cgi?id=1228851
* https://bugzilla.suse.com/show_bug.cgi?id=1228945
* https://bugzilla.suse.com/show_bug.cgi?id=1229079
* https://bugzilla.suse.com/show_bug.cgi?id=1229178
* https://bugzilla.suse.com/show_bug.cgi?id=1229260
* https://bugzilla.suse.com/show_bug.cgi?id=1229339
* https://bugzilla.suse.com/show_bug.cgi?id=1231332
* https://bugzilla.suse.com/show_bug.cgi?id=1231852
* https://bugzilla.suse.com/show_bug.cgi?id=1231900
* https://bugzilla.suse.com/show_bug.cgi?id=1231922
* https://jira.suse.com/browse/MSQA-863
1
0
SUSE-SU-2024:4011-1: moderate: Security update for SUSE Manager Client Tools
by OPENSUSE-SECURITY-UPDATES 18 Nov '24
by OPENSUSE-SECURITY-UPDATES 18 Nov '24
18 Nov '24
# Security update for SUSE Manager Client Tools
Announcement ID: SUSE-SU-2024:4011-1
Release Date: 2024-11-18T13:23:33Z
Rating: moderate
References:
* bsc#1213933
* bsc#1223142
* bsc#1226759
* bsc#1227341
* bsc#1227578
* bsc#1227606
* bsc#1228424
* bsc#1228685
* bsc#1229108
* bsc#1229260
* bsc#1229432
* bsc#1229437
* bsc#1229501
* bsc#1230136
* bsc#1230139
* bsc#1230285
* bsc#1230288
* bsc#1230745
* bsc#1231157
* bsc#1231206
* jsc#MSQA-863
Cross-References:
* CVE-2023-3978
CVSS scores:
* CVE-2023-3978 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2023-3978 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15
* SUSE Linux Enterprise Desktop 15 SP1
* SUSE Linux Enterprise Desktop 15 SP2
* SUSE Linux Enterprise Desktop 15 SP3
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.0
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP1
* SUSE Linux Enterprise Real Time 15 SP2
* SUSE Linux Enterprise Real Time 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Client Tools for SLE 15
* SUSE Manager Client Tools for SLE Micro 5
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 Module 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module 4.3
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability, contains one feature and has 19
security fixes can now be installed.
## Description:
This update fixes the following issues:
golang-github-lusitaniae-apache_exporter:
* Security issues fixed:
* CVE-2023-3978: Fixed security bug in x/net dependency (bsc#1213933)
* Other changes and issues fixed:
* Delete unpackaged debug files for RHEL
* Do not include source files in the package for RHEL 9
* Require Go 1.20 when building for RedHat derivatives
* Drop EnvironmentFile from the service definition
* Explicitly unset $ARGS environment variable. Setting environment variables
should be done in drop-in systemd configuration files.
* Drop go_nostrip macro. It is not needed with current binutils and Go.
* Migrate from `disabled` to `manual` source service type
* Drop BuildRequires: golang-packaging
* Upgrade to version 1.0.8 (bsc#1227341)
* Update prometheus/client_golang to version 1.19.1
* Update x/net to version 0.23.0
* Upgrade to version 1.0.7
* Update protobuf to version 1.33.0
* Update prometheus/client_golang to version 1.19.0
* Update prometheus/common to version 0.46.0
* Standardize landing page
* Upgrade to version 1.0.6
* Update prometheus/exporter-toolkit to version 0.11.0
* Update prometheus/client_golang to version 1.18.0
* Add User-Agent header
* Upgrade to version 1.0.4
* Update x/crypto to version 0.17.0
* Update alecthomas/kingpin/v2 to version 2.4.0
* Update prometheus/common to version 0.45.0
* Upgrade to version 1.0.3
* Update prometheus/client_golang to version 1.17.0
* Update x/net 0.17.0
* Upgrade to version 1.0.1
* Update prometheus/exporter-toolkit to version 0.10.0
* Update prometheus/common to version 0.44.0
* Update prometheus/client_golang to version 1.16.0
golang-github-prometheus-promu:
* Require Go >= 1.21 for building
* Packaging improvements:
* Drop export CGO_ENABLED="0". Use the default unless there is a defined
requirement or benefit (bsc#1230623).
* Update to version 0.16.0:
* Do not discover user/host for reproducible builds
* Fix example/prometheus build error
* Update to version 0.15.0:
* Add linux/riscv64 to default platforms
* Use yaml.Unmarshalstrict to validate configuration files
spacecmd:
* Version 5.0.10-0
* Speed up softwarechannel_removepackages (bsc#1227606)
* Fix error in 'kickstart_delete' when using wildcards (bsc#1227578)
* Spacecmd bootstrap now works with specified port (bsc#1229437)
* Fix sls backup creation as directory with spacecmd (bsc#1230745)
uyuni-common-libs:
* Version 5.0.5-0
* Enforce directory permissions at repo-sync when creating directories
(bsc#1229260)
uyuni-tools:
* version 0.1.23-0
* Ensure namespace is defined in all kubernetes commands
* Use SCC credentials to authenticate against registry.suse.com for kubernetes
(bsc#1231157)
* Fix namespace usage on mgrctl cp command
* version 0.1.22-0
* Set projectId also for test packages/images
* mgradm migration should not pull Confidential Computing and Hub image is
replicas == 0 (bsc#1229432, bsc#1230136)
* Do not allow SUSE Manager downgrade
* Prevent completion issue when /var/log/uyuni-tools.log is missing
* Fix proxy shared volume flag
* During migration, exclude mgr-sync configuration file (bsc#1228685)
* Migrate from PostgreSQL 14 to PostgreSQL 16 pg_hba.conf and postgresql.conf
files (bsc#1231206)
* During migration, handle empty autoinstallation path (bsc#1230285)
* During migration, handle symlinks (bsc#1230288)
* During migration, trust the remote sender's file list (bsc#1228424)
* Use SCC flags during podman pull
* Restore SELinux permission after migration (bsc#1229501)
* Share volumes between containers (bsc#1223142)
* Save supportconfig in current directory (bsc#1226759)
* Fix error code handling on reinstallation (bsc#1230139)
* Fix creating first user and organization
* Add missing variable quotes for install vars (bsc#1229108)
* Add API login and logout calls to allow persistent login
Changes that only impact SUSE Manager 4.3:
mgr-daemon:
* Version 4.3.11-0
* Update translation strings
spacewalk-client-tools:
* Version 4.3.21-0
* Update translation strings
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4011=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4011=1
* SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-4011=1
* SUSE Manager Client Tools for SLE Micro 5
zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-4011=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4011=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4011=1
* SUSE Manager Proxy 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-4011=1
* SUSE Manager Server 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-4011=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-promu-0.16.0-150000.3.21.4
* wire-debuginfo-0.6.0-150000.1.17.4
* golang-github-lusitaniae-apache_exporter-debuginfo-1.0.8-150000.1.23.3
* golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
* wire-0.6.0-150000.1.17.4
* openSUSE Leap 15.5 (noarch)
* spacecmd-5.0.10-150000.3.127.3
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-promu-0.16.0-150000.3.21.4
* wire-debuginfo-0.6.0-150000.1.17.4
* golang-github-lusitaniae-apache_exporter-debuginfo-1.0.8-150000.1.23.3
* golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
* wire-0.6.0-150000.1.17.4
* openSUSE Leap 15.6 (noarch)
* spacecmd-5.0.10-150000.3.127.3
* SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
* mgrctl-debuginfo-0.1.23-150000.1.13.3
* mgrctl-0.1.23-150000.1.13.3
* golang-github-lusitaniae-apache_exporter-debuginfo-1.0.8-150000.1.23.3
* golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
* python3-uyuni-common-libs-5.0.5-150000.1.45.3
* SUSE Manager Client Tools for SLE 15 (noarch)
* mgrctl-zsh-completion-0.1.23-150000.1.13.3
* python3-spacewalk-client-setup-4.3.21-150000.3.97.4
* python3-spacewalk-check-4.3.21-150000.3.97.4
* spacewalk-client-tools-4.3.21-150000.3.97.4
* mgr-daemon-4.3.11-150000.1.53.5
* spacecmd-5.0.10-150000.3.127.3
* spacewalk-check-4.3.21-150000.3.97.4
* python3-spacewalk-client-tools-4.3.21-150000.3.97.4
* mgrctl-lang-0.1.23-150000.1.13.3
* mgrctl-bash-completion-0.1.23-150000.1.13.3
* spacewalk-client-setup-4.3.21-150000.3.97.4
* SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64)
* mgrctl-0.1.23-150000.1.13.3
* mgrctl-debuginfo-0.1.23-150000.1.13.3
* SUSE Manager Client Tools for SLE Micro 5 (noarch)
* mgrctl-lang-0.1.23-150000.1.13.3
* mgrctl-bash-completion-0.1.23-150000.1.13.3
* mgrctl-zsh-completion-0.1.23-150000.1.13.3
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-promu-0.16.0-150000.3.21.4
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* golang-github-prometheus-promu-0.16.0-150000.3.21.4
* SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64)
* golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
* golang-github-lusitaniae-apache_exporter-debuginfo-1.0.8-150000.1.23.3
* SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64)
* golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3
* golang-github-lusitaniae-apache_exporter-debuginfo-1.0.8-150000.1.23.3
## References:
* https://www.suse.com/security/cve/CVE-2023-3978.html
* https://bugzilla.suse.com/show_bug.cgi?id=1213933
* https://bugzilla.suse.com/show_bug.cgi?id=1223142
* https://bugzilla.suse.com/show_bug.cgi?id=1226759
* https://bugzilla.suse.com/show_bug.cgi?id=1227341
* https://bugzilla.suse.com/show_bug.cgi?id=1227578
* https://bugzilla.suse.com/show_bug.cgi?id=1227606
* https://bugzilla.suse.com/show_bug.cgi?id=1228424
* https://bugzilla.suse.com/show_bug.cgi?id=1228685
* https://bugzilla.suse.com/show_bug.cgi?id=1229108
* https://bugzilla.suse.com/show_bug.cgi?id=1229260
* https://bugzilla.suse.com/show_bug.cgi?id=1229432
* https://bugzilla.suse.com/show_bug.cgi?id=1229437
* https://bugzilla.suse.com/show_bug.cgi?id=1229501
* https://bugzilla.suse.com/show_bug.cgi?id=1230136
* https://bugzilla.suse.com/show_bug.cgi?id=1230139
* https://bugzilla.suse.com/show_bug.cgi?id=1230285
* https://bugzilla.suse.com/show_bug.cgi?id=1230288
* https://bugzilla.suse.com/show_bug.cgi?id=1230745
* https://bugzilla.suse.com/show_bug.cgi?id=1231157
* https://bugzilla.suse.com/show_bug.cgi?id=1231206
* https://jira.suse.com/browse/MSQA-863
1
0
18 Nov '24
# Security update for expat
Announcement ID: SUSE-SU-2024:4035-1
Release Date: 2024-11-18T15:23:17Z
Rating: moderate
References:
* bsc#1232579
Cross-References:
* CVE-2024-50602
CVSS scores:
* CVE-2024-50602 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for expat fixes the following issues:
* CVE-2024-50602: Fixed a denial of service via XML_ResumeParser
(bsc#1232579).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4035=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4035=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4035=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4035=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4035=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4035=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4035=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4035=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4035=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4035=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4035=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* expat-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat-devel-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* expat-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* openSUSE Leap 15.4 (x86_64)
* libexpat1-32bit-2.4.4-150400.3.25.1
* libexpat-devel-32bit-2.4.4-150400.3.25.1
* expat-32bit-debuginfo-2.4.4-150400.3.25.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.25.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libexpat1-64bit-2.4.4-150400.3.25.1
* libexpat1-64bit-debuginfo-2.4.4-150400.3.25.1
* libexpat-devel-64bit-2.4.4-150400.3.25.1
* expat-64bit-debuginfo-2.4.4-150400.3.25.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat-devel-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* expat-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* openSUSE Leap 15.5 (x86_64)
* libexpat1-32bit-2.4.4-150400.3.25.1
* libexpat-devel-32bit-2.4.4-150400.3.25.1
* expat-32bit-debuginfo-2.4.4-150400.3.25.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.25.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat-devel-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* expat-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* openSUSE Leap 15.6 (x86_64)
* libexpat1-32bit-2.4.4-150400.3.25.1
* libexpat-devel-32bit-2.4.4-150400.3.25.1
* expat-32bit-debuginfo-2.4.4-150400.3.25.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.25.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat-devel-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* expat-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* Basesystem Module 15-SP5 (x86_64)
* libexpat1-32bit-2.4.4-150400.3.25.1
* expat-32bit-debuginfo-2.4.4-150400.3.25.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.25.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* expat-debuginfo-2.4.4-150400.3.25.1
* expat-debugsource-2.4.4-150400.3.25.1
* libexpat-devel-2.4.4-150400.3.25.1
* libexpat1-2.4.4-150400.3.25.1
* expat-2.4.4-150400.3.25.1
* libexpat1-debuginfo-2.4.4-150400.3.25.1
* Basesystem Module 15-SP6 (x86_64)
* libexpat1-32bit-2.4.4-150400.3.25.1
* expat-32bit-debuginfo-2.4.4-150400.3.25.1
* libexpat1-32bit-debuginfo-2.4.4-150400.3.25.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50602.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232579
1
0
SUSE-SU-2024:4036-1: moderate: Security update for httpcomponents-client, httpcomponents-core
by OPENSUSE-SECURITY-UPDATES 18 Nov '24
by OPENSUSE-SECURITY-UPDATES 18 Nov '24
18 Nov '24
# Security update for httpcomponents-client, httpcomponents-core
Announcement ID: SUSE-SU-2024:4036-1
Release Date: 2024-11-18T15:24:16Z
Rating: moderate
References:
* bsc#1177488
Cross-References:
* CVE-2020-13956
CVSS scores:
* CVE-2020-13956 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
* CVE-2020-13956 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for httpcomponents-client, httpcomponents-core fixes the following
issues:
httpcomponents-client: \- Update to version 4.5.14 * HTTPCLIENT-2206: Corrected
resource de-allocation by fluent response objects. * HTTPCLIENT-2174: URIBuilder
to return a new empty list instead of unmodifiable Collections#emptyList. *
Don't retry requests in case of NoRouteToHostException. * HTTPCLIENT-2144:
RequestBuilder fails to correctly copy charset of requests with form url-encoded
body. * PR #269: 4.5.x use array fill and more. \+ Use Arrays.fill(). \+ Remove
redundant modifiers. \+ Use Collections.addAll() and Collection.addAll() APIs
instead of loops. \+ Remove redundant returns. \+ No need to explicitly declare
an array when calling a vararg method. \+ Remote extra semicolons (;). \+ Use a
'L' instead of 'l' to make long literals more readable. *
PublicSuffixListParser.parseByType(Reader) allocates but does not use a 256 char
StringBuilder. * Incorrect handling of malformed authority component by
URIUtils#extractHost (bsc#1177488, CVE-2020-13956). * Avoid updating Content-
Length header in a 304 response. * Bug fix: BasicExpiresHandler is annotated as
immutable but is not (#239) * HTTPCLIENT-2076: Fixed NPE in LaxExpiresHandler.
httpcomponents-core: \- Upgraded to version 4.4.14 * PR #231: 4.4.x Use better
map apis and more. \+ Remove redundant modifiers. \+ Use Collections.addAll()
API instead of loops. \+ Remove redundant returns. \+ No need to explicitly
declare an array when calling a vararg method. \+ Remote extra semicolons (;). *
Bug fix: Non-blocking TLSv1.3 connections can end up in an infinite event spin
when closed concurrently by the local and the remote endpoints. * HTTPCORE-647:
Non-blocking connection terminated due to 'java.io.IOException: Broken pipe' can
enter an infinite loop flushing buffered output data. * PR #201, HTTPCORE-634:
Fix race condition in AbstractConnPool that can cause internal state corruption
when persistent connections are manually removed from the pool.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4036=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4036=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4036=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4036=1
* SUSE Manager Server 4.3 Module 4.3
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-4036=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* httpcomponents-client-cache-4.5.14-150200.3.9.1
* httpcomponents-core-4.4.14-150200.3.9.1
* httpcomponents-client-4.5.14-150200.3.9.1
* httpcomponents-client-javadoc-4.5.14-150200.3.9.1
* httpcomponents-core-javadoc-4.4.14-150200.3.9.1
* openSUSE Leap 15.6 (noarch)
* httpcomponents-client-cache-4.5.14-150200.3.9.1
* httpcomponents-core-4.4.14-150200.3.9.1
* httpcomponents-client-4.5.14-150200.3.9.1
* httpcomponents-client-javadoc-4.5.14-150200.3.9.1
* httpcomponents-core-javadoc-4.4.14-150200.3.9.1
* Development Tools Module 15-SP5 (noarch)
* httpcomponents-client-4.5.14-150200.3.9.1
* httpcomponents-core-4.4.14-150200.3.9.1
* Development Tools Module 15-SP6 (noarch)
* httpcomponents-client-4.5.14-150200.3.9.1
* httpcomponents-core-4.4.14-150200.3.9.1
* SUSE Manager Server 4.3 Module 4.3 (noarch)
* httpcomponents-client-4.5.14-150200.3.9.1
* httpcomponents-core-4.4.14-150200.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2020-13956.html
* https://bugzilla.suse.com/show_bug.cgi?id=1177488
1
0
16 Nov '24
# python39-3.9.20-6.1 on GA media
Announcement ID: openSUSE-SU-2024:14508-1
Rating: moderate
Cross-References:
* CVE-2024-11168
CVSS scores:
* CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the python39-3.9.20-6.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* python39 3.9.20-6.1
* python39-curses 3.9.20-6.1
* python39-dbm 3.9.20-6.1
* python39-idle 3.9.20-6.1
* python39-tk 3.9.20-6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-11168.html
1
0
openSUSE-SU-2024:14502-1: moderate: postgresql13-13.17-1.1 on GA media
by meissner@suse.com 16 Nov '24
by meissner@suse.com 16 Nov '24
16 Nov '24
# postgresql13-13.17-1.1 on GA media
Announcement ID: openSUSE-SU-2024:14502-1
Rating: moderate
Cross-References:
* CVE-2024-10976
* CVE-2024-10977
* CVE-2024-10978
* CVE-2024-10979
CVSS scores:
* CVE-2024-10976 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-10977 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-10978 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-10979 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 4 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the postgresql13-13.17-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* postgresql13 13.17-1.1
* postgresql13-contrib 13.17-1.1
* postgresql13-devel 13.17-1.1
* postgresql13-docs 13.17-1.1
* postgresql13-llvmjit 13.17-1.1
* postgresql13-llvmjit-devel 13.17-1.1
* postgresql13-plperl 13.17-1.1
* postgresql13-plpython 13.17-1.1
* postgresql13-pltcl 13.17-1.1
* postgresql13-server 13.17-1.1
* postgresql13-server-devel 13.17-1.1
* postgresql13-test 13.17-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-10976.html
* https://www.suse.com/security/cve/CVE-2024-10977.html
* https://www.suse.com/security/cve/CVE-2024-10978.html
* https://www.suse.com/security/cve/CVE-2024-10979.html
1
0
openSUSE-SU-2024:14505-1: moderate: postgresql16-16.5-1.1 on GA media
by meissner@suse.com 16 Nov '24
by meissner@suse.com 16 Nov '24
16 Nov '24
# postgresql16-16.5-1.1 on GA media
Announcement ID: openSUSE-SU-2024:14505-1
Rating: moderate
Cross-References:
* CVE-2024-10976
* CVE-2024-10977
* CVE-2024-10978
* CVE-2024-10979
CVSS scores:
* CVE-2024-10976 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-10977 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-10978 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-10979 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Tumbleweed
An update that solves 4 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the postgresql16-16.5-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* postgresql16 16.5-1.1
* postgresql16-contrib 16.5-1.1
* postgresql16-devel 16.5-1.1
* postgresql16-docs 16.5-1.1
* postgresql16-llvmjit 16.5-1.1
* postgresql16-llvmjit-devel 16.5-1.1
* postgresql16-plperl 16.5-1.1
* postgresql16-plpython 16.5-1.1
* postgresql16-pltcl 16.5-1.1
* postgresql16-server 16.5-1.1
* postgresql16-server-devel 16.5-1.1
* postgresql16-test 16.5-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-10976.html
* https://www.suse.com/security/cve/CVE-2024-10977.html
* https://www.suse.com/security/cve/CVE-2024-10978.html
* https://www.suse.com/security/cve/CVE-2024-10979.html
1
0
openSUSE-SU-2024:14500-1: moderate: kernel-devel-6.11.8-1.1 on GA media
by meissner@suse.com 16 Nov '24
by meissner@suse.com 16 Nov '24
16 Nov '24
# kernel-devel-6.11.8-1.1 on GA media
Announcement ID: openSUSE-SU-2024:14500-1
Rating: moderate
Cross-References:
* CVE-2023-52917
* CVE-2024-46869
* CVE-2024-47671
* CVE-2024-47675
* CVE-2024-47676
* CVE-2024-47677
* CVE-2024-47678
* CVE-2024-47679
* CVE-2024-47680
* CVE-2024-47681
* CVE-2024-47682
* CVE-2024-47683
* CVE-2024-47684
* CVE-2024-47685
* CVE-2024-47686
* CVE-2024-47687
* CVE-2024-47688
* CVE-2024-47689
* CVE-2024-47690
* CVE-2024-47691
* CVE-2024-47692
* CVE-2024-47693
* CVE-2024-47694
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47700
* CVE-2024-47701
* CVE-2024-47702
* CVE-2024-47703
* CVE-2024-47704
* CVE-2024-47705
* CVE-2024-47706
* CVE-2024-47707
* CVE-2024-47708
* CVE-2024-47709
* CVE-2024-47710
* CVE-2024-47711
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47714
* CVE-2024-47715
* CVE-2024-47716
* CVE-2024-47717
* CVE-2024-47718
* CVE-2024-47719
* CVE-2024-47720
* CVE-2024-47721
* CVE-2024-47723
* CVE-2024-47724
* CVE-2024-47726
* CVE-2024-47727
* CVE-2024-47728
* CVE-2024-47729
* CVE-2024-47730
* CVE-2024-47731
* CVE-2024-47732
* CVE-2024-47733
* CVE-2024-47734
* CVE-2024-47735
* CVE-2024-47736
* CVE-2024-47737
* CVE-2024-47738
* CVE-2024-47739
* CVE-2024-47740
* CVE-2024-47741
* CVE-2024-47742
* CVE-2024-47743
* CVE-2024-47744
* CVE-2024-47745
* CVE-2024-47746
* CVE-2024-47747
* CVE-2024-47748
* CVE-2024-47749
* CVE-2024-47750
* CVE-2024-47751
* CVE-2024-47752
* CVE-2024-47753
* CVE-2024-47754
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49852
* CVE-2024-49853
* CVE-2024-49854
* CVE-2024-49855
* CVE-2024-49856
* CVE-2024-49857
* CVE-2024-49858
* CVE-2024-49859
* CVE-2024-49860
* CVE-2024-49861
* CVE-2024-49862
* CVE-2024-49863
* CVE-2024-49864
* CVE-2024-49865
* CVE-2024-49866
* CVE-2024-49867
* CVE-2024-49868
* CVE-2024-49869
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49872
* CVE-2024-49873
* CVE-2024-49874
* CVE-2024-49875
* CVE-2024-49876
* CVE-2024-49877
* CVE-2024-49878
* CVE-2024-49879
* CVE-2024-49880
* CVE-2024-49881
* CVE-2024-49882
* CVE-2024-49883
* CVE-2024-49884
* CVE-2024-49885
* CVE-2024-49886
* CVE-2024-49887
* CVE-2024-49888
* CVE-2024-49889
* CVE-2024-49890
* CVE-2024-49891
* CVE-2024-49892
* CVE-2024-49893
* CVE-2024-49894
* CVE-2024-49895
* CVE-2024-49896
* CVE-2024-49897
* CVE-2024-49898
* CVE-2024-49899
* CVE-2024-49900
* CVE-2024-49901
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49904
* CVE-2024-49905
* CVE-2024-49906
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49909
* CVE-2024-49910
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49913
* CVE-2024-49914
* CVE-2024-49915
* CVE-2024-49916
* CVE-2024-49917
* CVE-2024-49918
* CVE-2024-49919
* CVE-2024-49920
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49924
* CVE-2024-49925
* CVE-2024-49926
* CVE-2024-49927
* CVE-2024-49928
* CVE-2024-49929
* CVE-2024-49930
* CVE-2024-49931
* CVE-2024-49932
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49935
* CVE-2024-49936
* CVE-2024-49937
* CVE-2024-49938
* CVE-2024-49939
* CVE-2024-49940
* CVE-2024-49941
* CVE-2024-49942
* CVE-2024-49943
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49946
* CVE-2024-49947
* CVE-2024-49948
* CVE-2024-49949
* CVE-2024-49950
* CVE-2024-49951
* CVE-2024-49952
* CVE-2024-49953
* CVE-2024-49954
* CVE-2024-49955
* CVE-2024-49956
* CVE-2024-49957
* CVE-2024-49958
* CVE-2024-49959
* CVE-2024-49960
* CVE-2024-49961
* CVE-2024-49962
* CVE-2024-49963
* CVE-2024-49964
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49967
* CVE-2024-49968
* CVE-2024-49969
* CVE-2024-49970
* CVE-2024-49971
* CVE-2024-49972
* CVE-2024-49973
* CVE-2024-49974
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49977
* CVE-2024-49978
* CVE-2024-49979
* CVE-2024-49980
* CVE-2024-49981
* CVE-2024-49982
* CVE-2024-49983
* CVE-2024-49984
* CVE-2024-49985
* CVE-2024-49986
* CVE-2024-49987
* CVE-2024-49988
* CVE-2024-49989
* CVE-2024-49990
* CVE-2024-49991
* CVE-2024-49992
* CVE-2024-49994
* CVE-2024-49995
* CVE-2024-49996
* CVE-2024-49997
* CVE-2024-49998
* CVE-2024-49999
* CVE-2024-50000
* CVE-2024-50001
* CVE-2024-50002
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50005
* CVE-2024-50006
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50009
* CVE-2024-50010
* CVE-2024-50011
* CVE-2024-50012
* CVE-2024-50013
* CVE-2024-50014
* CVE-2024-50015
* CVE-2024-50016
* CVE-2024-50017
* CVE-2024-50018
* CVE-2024-50019
* CVE-2024-50020
* CVE-2024-50021
* CVE-2024-50022
* CVE-2024-50023
* CVE-2024-50024
* CVE-2024-50025
* CVE-2024-50026
* CVE-2024-50027
* CVE-2024-50028
* CVE-2024-50029
* CVE-2024-50030
* CVE-2024-50031
* CVE-2024-50032
* CVE-2024-50033
* CVE-2024-50034
* CVE-2024-50035
* CVE-2024-50036
* CVE-2024-50037
* CVE-2024-50038
* CVE-2024-50039
* CVE-2024-50040
* CVE-2024-50041
* CVE-2024-50042
* CVE-2024-50043
* CVE-2024-50044
* CVE-2024-50045
* CVE-2024-50046
* CVE-2024-50047
* CVE-2024-50048
* CVE-2024-50049
* CVE-2024-50055
* CVE-2024-50056
* CVE-2024-50057
* CVE-2024-50058
* CVE-2024-50059
* CVE-2024-50060
* CVE-2024-50061
* CVE-2024-50062
* CVE-2024-50063
* CVE-2024-50064
* CVE-2024-50065
* CVE-2024-50066
* CVE-2024-50067
* CVE-2024-50068
* CVE-2024-50069
* CVE-2024-50070
* CVE-2024-50071
* CVE-2024-50072
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50075
* CVE-2024-50076
* CVE-2024-50077
* CVE-2024-50078
* CVE-2024-50079
* CVE-2024-50080
* CVE-2024-50081
* CVE-2024-50082
* CVE-2024-50083
* CVE-2024-50084
* CVE-2024-50085
* CVE-2024-50086
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50090
* CVE-2024-50091
* CVE-2024-50092
* CVE-2024-50093
* CVE-2024-50094
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50097
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50104
* CVE-2024-50105
* CVE-2024-50106
* CVE-2024-50107
* CVE-2024-50108
* CVE-2024-50109
* CVE-2024-50110
* CVE-2024-50111
* CVE-2024-50112
* CVE-2024-50113
* CVE-2024-50114
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50118
* CVE-2024-50119
* CVE-2024-50120
* CVE-2024-50121
* CVE-2024-50122
* CVE-2024-50123
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50126
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50129
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50132
* CVE-2024-50133
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50137
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50140
* CVE-2024-50141
* CVE-2024-50142
* CVE-2024-50143
* CVE-2024-50144
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50149
* CVE-2024-50150
* CVE-2024-50151
* CVE-2024-50152
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50161
* CVE-2024-50162
* CVE-2024-50163
* CVE-2024-50164
* CVE-2024-50165
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50168
* CVE-2024-50170
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50173
* CVE-2024-50174
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50178
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50185
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50190
* CVE-2024-50191
* CVE-2024-50192
* CVE-2024-50193
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50197
* CVE-2024-50198
* CVE-2024-50199
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50206
* CVE-2024-50207
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50211
* CVE-2024-50212
* CVE-2024-50213
* CVE-2024-50214
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50217
* CVE-2024-50218
* CVE-2024-50220
* CVE-2024-50221
* CVE-2024-50222
* CVE-2024-50223
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50226
* CVE-2024-50227
* CVE-2024-50228
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50238
* CVE-2024-50239
* CVE-2024-50240
* CVE-2024-50241
* CVE-2024-50242
* CVE-2024-50243
* CVE-2024-50244
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50247
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50251
* CVE-2024-50252
* CVE-2024-50253
* CVE-2024-50254
* CVE-2024-50255
* CVE-2024-50256
* CVE-2024-50257
* CVE-2024-50258
* CVE-2024-50259
* CVE-2024-50260
* CVE-2024-50261
* CVE-2024-50262
* CVE-2024-50263
CVSS scores:
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-46869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47676 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47676 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47677 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-47677 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47680 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47683 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47686 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47689 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47689 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47690 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-47690 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47691 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47691 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( SUSE ): 0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47694 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47700 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47706 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47710 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47711 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47717 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47721 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47721 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47734 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47734 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-47740 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47741 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47746 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47747 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49854 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49856 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49856 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49857 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49859 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-49859 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49865 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49865 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49867 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49869 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49872 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49872 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49873 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( SUSE ): 0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49876 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49876 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49878 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-49878 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49880 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49887 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49889 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49889 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49893 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-49895 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49904 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49910 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49926 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49927 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49932 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49936 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49970 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-49971 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49988 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49988 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49990 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49992 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49992 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49995 ( SUSE ): 0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49995 ( SUSE ): 0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( SUSE ): 0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50057 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50059 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50083 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50086 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50086 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50112 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-50112 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-50113 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50113 ( SUSE ): 2 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50114 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50114 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50120 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50120 ( SUSE ): 6 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50122 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50127 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( SUSE ): 0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50137 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50144 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50144 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50162 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50162 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50163 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50163 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50164 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50164 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50168 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50168 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50206 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50206 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50207 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50207 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50228 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50228 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50242 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50242 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50244 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50244 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50247 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50247 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50254 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50259 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50263 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50263 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 486 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the kernel-devel-6.11.8-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* kernel-devel 6.11.8-1.1
* kernel-macros 6.11.8-1.1
* kernel-source 6.11.8-1.1
* kernel-source-vanilla 6.11.8-1.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2024-46869.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47675.html
* https://www.suse.com/security/cve/CVE-2024-47676.html
* https://www.suse.com/security/cve/CVE-2024-47677.html
* https://www.suse.com/security/cve/CVE-2024-47678.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47680.html
* https://www.suse.com/security/cve/CVE-2024-47681.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47683.html
* https://www.suse.com/security/cve/CVE-2024-47684.html
* https://www.suse.com/security/cve/CVE-2024-47685.html
* https://www.suse.com/security/cve/CVE-2024-47686.html
* https://www.suse.com/security/cve/CVE-2024-47687.html
* https://www.suse.com/security/cve/CVE-2024-47688.html
* https://www.suse.com/security/cve/CVE-2024-47689.html
* https://www.suse.com/security/cve/CVE-2024-47690.html
* https://www.suse.com/security/cve/CVE-2024-47691.html
* https://www.suse.com/security/cve/CVE-2024-47692.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47694.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47700.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47702.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-47704.html
* https://www.suse.com/security/cve/CVE-2024-47705.html
* https://www.suse.com/security/cve/CVE-2024-47706.html
* https://www.suse.com/security/cve/CVE-2024-47707.html
* https://www.suse.com/security/cve/CVE-2024-47708.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47710.html
* https://www.suse.com/security/cve/CVE-2024-47711.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47714.html
* https://www.suse.com/security/cve/CVE-2024-47715.html
* https://www.suse.com/security/cve/CVE-2024-47716.html
* https://www.suse.com/security/cve/CVE-2024-47717.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47719.html
* https://www.suse.com/security/cve/CVE-2024-47720.html
* https://www.suse.com/security/cve/CVE-2024-47721.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47724.html
* https://www.suse.com/security/cve/CVE-2024-47726.html
* https://www.suse.com/security/cve/CVE-2024-47727.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47729.html
* https://www.suse.com/security/cve/CVE-2024-47730.html
* https://www.suse.com/security/cve/CVE-2024-47731.html
* https://www.suse.com/security/cve/CVE-2024-47732.html
* https://www.suse.com/security/cve/CVE-2024-47733.html
* https://www.suse.com/security/cve/CVE-2024-47734.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47736.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47738.html
* https://www.suse.com/security/cve/CVE-2024-47739.html
* https://www.suse.com/security/cve/CVE-2024-47740.html
* https://www.suse.com/security/cve/CVE-2024-47741.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47743.html
* https://www.suse.com/security/cve/CVE-2024-47744.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47746.html
* https://www.suse.com/security/cve/CVE-2024-47747.html
* https://www.suse.com/security/cve/CVE-2024-47748.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47750.html
* https://www.suse.com/security/cve/CVE-2024-47751.html
* https://www.suse.com/security/cve/CVE-2024-47752.html
* https://www.suse.com/security/cve/CVE-2024-47753.html
* https://www.suse.com/security/cve/CVE-2024-47754.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49853.html
* https://www.suse.com/security/cve/CVE-2024-49854.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49856.html
* https://www.suse.com/security/cve/CVE-2024-49857.html
* https://www.suse.com/security/cve/CVE-2024-49858.html
* https://www.suse.com/security/cve/CVE-2024-49859.html
* https://www.suse.com/security/cve/CVE-2024-49860.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49862.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49864.html
* https://www.suse.com/security/cve/CVE-2024-49865.html
* https://www.suse.com/security/cve/CVE-2024-49866.html
* https://www.suse.com/security/cve/CVE-2024-49867.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49869.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49872.html
* https://www.suse.com/security/cve/CVE-2024-49873.html
* https://www.suse.com/security/cve/CVE-2024-49874.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49876.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49878.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49880.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49882.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49885.html
* https://www.suse.com/security/cve/CVE-2024-49886.html
* https://www.suse.com/security/cve/CVE-2024-49887.html
* https://www.suse.com/security/cve/CVE-2024-49888.html
* https://www.suse.com/security/cve/CVE-2024-49889.html
* https://www.suse.com/security/cve/CVE-2024-49890.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49892.html
* https://www.suse.com/security/cve/CVE-2024-49893.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49895.html
* https://www.suse.com/security/cve/CVE-2024-49896.html
* https://www.suse.com/security/cve/CVE-2024-49897.html
* https://www.suse.com/security/cve/CVE-2024-49898.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49904.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49906.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49909.html
* https://www.suse.com/security/cve/CVE-2024-49910.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49913.html
* https://www.suse.com/security/cve/CVE-2024-49914.html
* https://www.suse.com/security/cve/CVE-2024-49915.html
* https://www.suse.com/security/cve/CVE-2024-49916.html
* https://www.suse.com/security/cve/CVE-2024-49917.html
* https://www.suse.com/security/cve/CVE-2024-49918.html
* https://www.suse.com/security/cve/CVE-2024-49919.html
* https://www.suse.com/security/cve/CVE-2024-49920.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49926.html
* https://www.suse.com/security/cve/CVE-2024-49927.html
* https://www.suse.com/security/cve/CVE-2024-49928.html
* https://www.suse.com/security/cve/CVE-2024-49929.html
* https://www.suse.com/security/cve/CVE-2024-49930.html
* https://www.suse.com/security/cve/CVE-2024-49931.html
* https://www.suse.com/security/cve/CVE-2024-49932.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49936.html
* https://www.suse.com/security/cve/CVE-2024-49937.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49939.html
* https://www.suse.com/security/cve/CVE-2024-49940.html
* https://www.suse.com/security/cve/CVE-2024-49941.html
* https://www.suse.com/security/cve/CVE-2024-49942.html
* https://www.suse.com/security/cve/CVE-2024-49943.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49946.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49948.html
* https://www.suse.com/security/cve/CVE-2024-49949.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49951.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49953.html
* https://www.suse.com/security/cve/CVE-2024-49954.html
* https://www.suse.com/security/cve/CVE-2024-49955.html
* https://www.suse.com/security/cve/CVE-2024-49956.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49958.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49960.html
* https://www.suse.com/security/cve/CVE-2024-49961.html
* https://www.suse.com/security/cve/CVE-2024-49962.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49964.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49967.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49969.html
* https://www.suse.com/security/cve/CVE-2024-49970.html
* https://www.suse.com/security/cve/CVE-2024-49971.html
* https://www.suse.com/security/cve/CVE-2024-49972.html
* https://www.suse.com/security/cve/CVE-2024-49973.html
* https://www.suse.com/security/cve/CVE-2024-49974.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49977.html
* https://www.suse.com/security/cve/CVE-2024-49978.html
* https://www.suse.com/security/cve/CVE-2024-49979.html
* https://www.suse.com/security/cve/CVE-2024-49980.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49982.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49984.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49986.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49988.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-49990.html
* https://www.suse.com/security/cve/CVE-2024-49991.html
* https://www.suse.com/security/cve/CVE-2024-49992.html
* https://www.suse.com/security/cve/CVE-2024-49994.html
* https://www.suse.com/security/cve/CVE-2024-49995.html
* https://www.suse.com/security/cve/CVE-2024-49996.html
* https://www.suse.com/security/cve/CVE-2024-49997.html
* https://www.suse.com/security/cve/CVE-2024-49998.html
* https://www.suse.com/security/cve/CVE-2024-49999.html
* https://www.suse.com/security/cve/CVE-2024-50000.html
* https://www.suse.com/security/cve/CVE-2024-50001.html
* https://www.suse.com/security/cve/CVE-2024-50002.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50005.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50010.html
* https://www.suse.com/security/cve/CVE-2024-50011.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50015.html
* https://www.suse.com/security/cve/CVE-2024-50016.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50018.html
* https://www.suse.com/security/cve/CVE-2024-50019.html
* https://www.suse.com/security/cve/CVE-2024-50020.html
* https://www.suse.com/security/cve/CVE-2024-50021.html
* https://www.suse.com/security/cve/CVE-2024-50022.html
* https://www.suse.com/security/cve/CVE-2024-50023.html
* https://www.suse.com/security/cve/CVE-2024-50024.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50027.html
* https://www.suse.com/security/cve/CVE-2024-50028.html
* https://www.suse.com/security/cve/CVE-2024-50029.html
* https://www.suse.com/security/cve/CVE-2024-50030.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50032.html
* https://www.suse.com/security/cve/CVE-2024-50033.html
* https://www.suse.com/security/cve/CVE-2024-50034.html
* https://www.suse.com/security/cve/CVE-2024-50035.html
* https://www.suse.com/security/cve/CVE-2024-50036.html
* https://www.suse.com/security/cve/CVE-2024-50037.html
* https://www.suse.com/security/cve/CVE-2024-50038.html
* https://www.suse.com/security/cve/CVE-2024-50039.html
* https://www.suse.com/security/cve/CVE-2024-50040.html
* https://www.suse.com/security/cve/CVE-2024-50041.html
* https://www.suse.com/security/cve/CVE-2024-50042.html
* https://www.suse.com/security/cve/CVE-2024-50043.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50045.html
* https://www.suse.com/security/cve/CVE-2024-50046.html
* https://www.suse.com/security/cve/CVE-2024-50047.html
* https://www.suse.com/security/cve/CVE-2024-50048.html
* https://www.suse.com/security/cve/CVE-2024-50049.html
* https://www.suse.com/security/cve/CVE-2024-50055.html
* https://www.suse.com/security/cve/CVE-2024-50056.html
* https://www.suse.com/security/cve/CVE-2024-50057.html
* https://www.suse.com/security/cve/CVE-2024-50058.html
* https://www.suse.com/security/cve/CVE-2024-50059.html
* https://www.suse.com/security/cve/CVE-2024-50060.html
* https://www.suse.com/security/cve/CVE-2024-50061.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50063.html
* https://www.suse.com/security/cve/CVE-2024-50064.html
* https://www.suse.com/security/cve/CVE-2024-50065.html
* https://www.suse.com/security/cve/CVE-2024-50066.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50068.html
* https://www.suse.com/security/cve/CVE-2024-50069.html
* https://www.suse.com/security/cve/CVE-2024-50070.html
* https://www.suse.com/security/cve/CVE-2024-50071.html
* https://www.suse.com/security/cve/CVE-2024-50072.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50075.html
* https://www.suse.com/security/cve/CVE-2024-50076.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://www.suse.com/security/cve/CVE-2024-50079.html
* https://www.suse.com/security/cve/CVE-2024-50080.html
* https://www.suse.com/security/cve/CVE-2024-50081.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50083.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50085.html
* https://www.suse.com/security/cve/CVE-2024-50086.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50090.html
* https://www.suse.com/security/cve/CVE-2024-50091.html
* https://www.suse.com/security/cve/CVE-2024-50092.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50094.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50097.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50104.html
* https://www.suse.com/security/cve/CVE-2024-50105.html
* https://www.suse.com/security/cve/CVE-2024-50106.html
* https://www.suse.com/security/cve/CVE-2024-50107.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50109.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50111.html
* https://www.suse.com/security/cve/CVE-2024-50112.html
* https://www.suse.com/security/cve/CVE-2024-50113.html
* https://www.suse.com/security/cve/CVE-2024-50114.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50118.html
* https://www.suse.com/security/cve/CVE-2024-50119.html
* https://www.suse.com/security/cve/CVE-2024-50120.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50122.html
* https://www.suse.com/security/cve/CVE-2024-50123.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50126.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50129.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50132.html
* https://www.suse.com/security/cve/CVE-2024-50133.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50137.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50140.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50142.html
* https://www.suse.com/security/cve/CVE-2024-50143.html
* https://www.suse.com/security/cve/CVE-2024-50144.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50149.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50151.html
* https://www.suse.com/security/cve/CVE-2024-50152.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50161.html
* https://www.suse.com/security/cve/CVE-2024-50162.html
* https://www.suse.com/security/cve/CVE-2024-50163.html
* https://www.suse.com/security/cve/CVE-2024-50164.html
* https://www.suse.com/security/cve/CVE-2024-50165.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50168.html
* https://www.suse.com/security/cve/CVE-2024-50170.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50173.html
* https://www.suse.com/security/cve/CVE-2024-50174.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50178.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50185.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50190.html
* https://www.suse.com/security/cve/CVE-2024-50191.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50193.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50197.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50199.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50206.html
* https://www.suse.com/security/cve/CVE-2024-50207.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50211.html
* https://www.suse.com/security/cve/CVE-2024-50212.html
* https://www.suse.com/security/cve/CVE-2024-50213.html
* https://www.suse.com/security/cve/CVE-2024-50214.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50217.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50220.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50222.html
* https://www.suse.com/security/cve/CVE-2024-50223.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50226.html
* https://www.suse.com/security/cve/CVE-2024-50227.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50238.html
* https://www.suse.com/security/cve/CVE-2024-50239.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50241.html
* https://www.suse.com/security/cve/CVE-2024-50242.html
* https://www.suse.com/security/cve/CVE-2024-50243.html
* https://www.suse.com/security/cve/CVE-2024-50244.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50247.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50251.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50253.html
* https://www.suse.com/security/cve/CVE-2024-50254.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50256.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50258.html
* https://www.suse.com/security/cve/CVE-2024-50259.html
* https://www.suse.com/security/cve/CVE-2024-50260.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50262.html
* https://www.suse.com/security/cve/CVE-2024-50263.html
1
0